Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 1832051, 11 pages
Research Article

A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers

1School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
2School of Computer Science, Chongqing University, Chongqing, China
3Department of Computer Science, The George Washington University, Washington, DC, USA

Correspondence should be addressed to Yan Huo; nc.ude.utjb@ouhy

Received 20 July 2017; Revised 14 October 2017; Accepted 31 October 2017; Published 4 December 2017

Academic Editor: Chaokun Wang

Copyright © 2017 Yan Huo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.