Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 1832051, 11 pages
https://doi.org/10.1155/2017/1832051
Research Article

A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers

1School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
2School of Computer Science, Chongqing University, Chongqing, China
3Department of Computer Science, The George Washington University, Washington, DC, USA

Correspondence should be addressed to Yan Huo; nc.ude.utjb@ouhy

Received 20 July 2017; Revised 14 October 2017; Accepted 31 October 2017; Published 4 December 2017

Academic Editor: Chaokun Wang

Copyright © 2017 Yan Huo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the internet of things: a survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–454, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. Cai, Z. He, X. Guan, and Y. Li, “Collective data-sanitization for preventing sensitive information inference attacks in social networks,” IEEE Transactions on Dependable and Secure Computing, 2016. View at Publisher · View at Google Scholar
  4. Z. He, Z. Cai, J. Yu, X. Wang, Y. Sun, and Y. Li, “Cost-efficient strategies for restraining rumor spreading in mobile social networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2789–2800, 2017. View at Publisher · View at Google Scholar
  5. L. Zhang, Z. Cai, and X. Wang, “FakeMask: A Novel Privacy Preserving Approach for Smartphones,” IEEE Transactions on Network and Service Management, vol. 13, no. 2, pp. 335–348, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Zheng, Z. Cai, J. Li, and H. Gao, “Location-privacy-aware review publication mechanism for local business service systems,” in Proceedings of the IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9, Atlanta, GA, USA, May 2017. View at Publisher · View at Google Scholar
  7. C. Hu, H. Li, Y. Huo, T. Xiang, and X. Liao, “Secure and Efficient Data Communication Protocol for Wireless Body Area Networks,” IEEE Transactions on Multi-Scale Computing Systems, vol. 2, no. 2, pp. 94–107, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. S. A. A Mukherjee, J. Fakoorian, and A. L. Huang, “Principles of physical layer security in multiuser wireless networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014. View at Publisher · View at Google Scholar
  9. Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Communications Magazine, vol. 18, no. 2, pp. 66–74, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. A. D. Wyner, “The wire-tap channel,” Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. Z. Li, T. Jing, X. Cheng, Y. Huo, W. Zhou, and D. Chen, “Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks,” in Proceedings of the IEEE International Conference on Communications, ICC 2015, pp. 7609–7614, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, “On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728–1740, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. H.-M. Wang and F. Liu, “Secrecy signal and artificial noise designs in cellular network,” in Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015, pp. 273–277, China, July 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Jamming-Aided Secure Communication in Massive MIMO Rician Channels,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6854–6868, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Khisti and D. Zhang, “Artificial-noise alignment for secure multicast using multiple antennas,” IEEE Communications Letters, vol. 17, no. 8, pp. 1568–1571, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. Tian, Y. Huo, C. Hu, Q. Gao, and T. Jing, “A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers,” in Wireless Algorithms, Systems, and Applications, vol. 10251 of Lecture Notes in Computer Science, pp. 854–859, Springer International Publishing, Cham, 2017. View at Publisher · View at Google Scholar
  18. S. Kim, “Cognitive radio anti-jamming scheme for security provisioning IoT communications,” KSII Transactions on Internet and Information Systems, vol. 9, no. 10, Article ID A4177, pp. 4177–4190, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. R. Negi and S. Goel, “Secret communication using artificial noise,” in Proceedings of the 62nd Vehicular Technology Conference, VTC 2005, pp. 1906–1910, USA, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  20. C.-L. Wang, T.-N. Cho, and F. Liu, “Power allocation and jammer selection of a cooperative jamming strategy for physical-layer security,” in Proceedings of the 2014 79th IEEE Vehicular Technology Conference, VTC 2014-Spring, Republic of Korea, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Cooperative networking towards secure communications for CRNs,” in Proceedings of the 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013, pp. 1691–1696, China, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. Q. Li and W.-K. Ma, “Spatially selective artificial-noise aided transmit optimization for {MISO} multi-eves secrecy rate maximization,” IEEE Transactions on Signal Processing, vol. 61, no. 10, pp. 2704–2717, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  23. K. Jiang, T. Jing, F. Zhang, Y. Huo, and Z. Li, “ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel,” IEEE Access, vol. 5, pp. 7244–7253, 2017. View at Publisher · View at Google Scholar
  24. Z. Li, T. Jing, L. Ma, Y. Huo, and J. Qian, “Worst-case cooperative jamming for secure communications in CIoT networks,” Sensors, vol. 16, no. 3, article no. 339, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Yang, Q. Li, Y. Cai, Y. Zou, L. Hanzo, and B. Champagne, “Joint Secure AF Relaying and Artificial Noise Optimization: A Penalized Difference-of-Convex Programming Framework,” IEEE Access, vol. 4, pp. 10076–10095, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Xiong, Y. Tang, D. Ma, P. Xiao, and K.-K. Wong, “Secrecy performance analysis for tas-mrc system with imperfect feedback,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1617–1629, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. Zhu, Z. Chu, Z. Wang, and I. Lee, “Outage Constrained Robust Beamforming for Secure Broadcasting Systems with Energy Harvesting,” IEEE Transactions on Wireless Communications, vol. PP, no. 99, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. P. Fazio and S. Marano, “Mobility prediction and resource reservation in cellular networks with distributed Markov chains,” in Proceedings of the 8th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2012, pp. 878–882, Cyprus, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Bitam and A. Mellouk, “Markov-history based modeling for realistic mobility of vehicles in VANETs,” in Proceedings of the 2013 IEEE 77th Vehicular Technology Conference, VTC Spring 2013, Germany, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. H. Li, X. Wang, and W. Hou, “Security enhancement in cooperative Jamming using compromised secrecy region minimization,” in Proceedings of the 2013 13th Canadian Workshop on Information Theory, CWIT 2013, pp. 214–218, Canada, June 2013. View at Publisher · View at Google Scholar · View at Scopus