Next Article in Journal
Iterative Learning-Based Path and Speed Profile Optimization for an Unmanned Surface Vehicle
Previous Article in Journal
Performance Enhancement of a Quartz Tuning Fork Sensor Using a Cellulose Nanocrystal-Reinforced Nanoporous Polymer Fiber
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region

1
State Key Laboratory of Integrated Service Network, Xidian University, Xi’an 710071, China
2
Department of Electrical and Computer Engineering, Memorial University, St. John’s, NL A1B 3X5, Canada
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(2), 438; https://doi.org/10.3390/s20020438
Submission received: 13 November 2019 / Revised: 6 January 2020 / Accepted: 8 January 2020 / Published: 13 January 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
The security problem in wireless sensor networks faces severe challenges, due to the openness of the sensor network channel and the mobility and diversity of the terminals. When facing randomly located eavesdroppers, the situation is much more complex. This paper studies the security performance of a wireless sensor network where randomly located passive and active eavesdroppers are both considered. Compared to a passive eavesdropper, an active eavesdropper can perform both eavesdropping and malicious jamming simultaneously in a wireless sensor network. Based on beamforming and artificial noise (AN), we propose a practical way to defend against the eavesdropper by establishing a protecting region. An appropriate metric, the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration, is utilized to evaluate the security performance. In addition, the concept of safe transmission range is defined to evaluate the security performance. Simulation results are provided to depict the insecure region and verify the harm of the active eavesdropper to the transmission in the wireless sensor network.

1. Introduction

Along with the emergence of numerous wireless devices and various wireless services, wireless security has become a critical design issue in the implementation and operation of wireless sensor networks [1,2,3,4]. Against this background, physical layer security (PLS) has been receiving great research attention [5]. Compared to traditional key-based cryptographic techniques applied to upper layers which can be deciphered, PLS which exploits the channel characters to enhance security, can safeguard wireless data transmissions without requiring secret keys and complex algorithms [6,7,8]. The main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes in the wireless sensor networks [9]. In particular, beamforming and artificial noise (AN) are exploited to improve the security performance [10,11,12,13]. Most works assume that eavesdroppers work with a passive way in the wireless sensor networks. However, there are also active eavesdroppers who can eavesdrop information in a more "smart" way. An active eavesdropper, which can perform both eavesdropping and malicious jamming simultaneously, brings an intractable challenging security problem [14,15,16,17,18,19,20,21,22,23,24].
One of the active eavesdropping methods is pilot contamination in a wireless sensor network. The eavesdropper attacked the training phase to cause pilot contamination in wireless communication to improve its eavesdropping performance [14,15,16]. Another active eavesdropping method is jamming. In the presence of an active eavesdropper, the authors in [17,18] calculated an optimal power allocation to improve the security performance of transmission. In [19,20], the properties of the game equilibrium were exploited to design a transmission strategy and a jamming strategy, where the eavesdropper took action first as the leader and the legitimate user acts as the follower in the wireless network. In [21], a three-stage Stackelberg game approach was proposed to improve the security performance under the competitions among the transmitter, relays and active eavesdropper. Finding the Stackelberg equilibrium of the scheme, and the legitimate users can achieve cooperative communication to improve the secrecy capacity and to defend against full-duplex active eavesdropping attacks. A novel transmission outage constrained scheme for both reliability and security was proposed to evaluate the secrecy performance and to gain valuable design insights in [22]. An optimal relay selection scheme was developed to improve the security performance with an active eavesdropper in cooperative wireless networks in [23,24].
These works mainly focused on adjusting the transmission strategies to obtain a better performance under the effect of self interference at the active eavesdropper and neglected the location of the eavesdropper in the wireless sensor networks. However, in practice, the location of the eavesdropper is unknown and this can change its location to cause severe interference for the transmission with small power. In this case, the above transmission strategies do not work well, which brings an intractable challenge for the transmission. Hence, the location of the active eavesdropper, as a vital parameter, has to be considered.
Under the assumption that the eavesdropper is passive, the authors in [25,26] revealed that the uncertainty on the location of the eavesdropper should be seriously taken into account for deploying a wireless sensor network system. A piecewise function was proposed to approximate the line-of-sight (LoS) probability for the air-to-ground links, which provides a better approximation than using the existing sigmoid-based fitting under randomly located unmanned aerial vehicle eavesdroppers [27]. The secrecy outage analysis of the randomly located eavesdroppers, which act independently and collude to intercept the transmitted message, was studied in [28]. The insecure region refers to a geographical area where certain security metrics such as average secrecy capacity and secrecy outage probability are not satisfied [29,30,31,32,33,34]. In [29], both the legitimate receiver and transmitter generated AN to impair the eavesdropper’s channel, and the insecure region was defined by the average secrecy capacity to characterise the security performance when the eavesdropper’s channel was unknown. A concept of outage secrecy region to evaluate the secrecy performance from a geometrical perspective was proposed in [30], where the legitimate receiver generated AN to impair the eavesdropper’s channel. However, the approximate secrecy capacity was not accurate to define the insecure region. Then, outage probability, as a more appropriate metric, was exploited to determine the insecure region [31,32,33,34]. Authors examined the impact of the unmanned aerial vehicle jamming power and its three-dimensional spatial deployment on the outage probability of the legitimate receiver and the intercept probability of the eavesdropper. The security region was defined by the intercept probability [31]. In [32], one relay node in the sensor networks can improve the security by decreasing the area in which the eavesdropper can reside and listen to the information transmitted to the destination. This region was called vulnerability region with its characterization. In [33,34], with the design of AN, high outage performance around the around the transmitter was achieved.
Inspired by the above works, we propose a practical way to defend against an active eavesdropper by establishing a protecting region to restrict the location of an active eavesdropper in a wireless sensor network. Since the eavesdropper is able to emit a jamming signal to interfere with the transmission, the traditional metrics are not appropriate in this case, and a new metric, namely hybrid outage probability, is exploited to evaluate the security performance. Specifically, we derive the expression of the hybrid outage probability which takes both the transmission outage probability and the secrecy outage probability into consideration both for active and passive eavesdropper. Based on it, the insecure region is defined to confront the eavesdropper. And the concept safe transmission range, as a valuable indicator, is proposed. In our system, the AN is generated from receiver. This method has the following advantages. (a) The CSI is not needed by Alice, so there is no feedback channel and thus the bandwidth resource is saved; (b) The AN can be generated by either multiple antennas or a single antenna, which is more practical than the existing AN methods which need multiple antennas at the transmitter; (c) It is particularly useful when the receiver has a stronger ability than the transmitter; (d) It is efficient if Eves are located around Bob [29,30,35]. Our analysis can be used in various practical sensor networks to provide valuable basis for establishing the protecting region and achieve secure transmission.

2. System Model

We consider a multiple-input single-output (MISO) system in the presence of a full-duplex active eavesdropper (We assume that the distribution of location of eavesdropper is a homogeneous Poisson point process, and the eavesdropper works independently. In this case, an eavesdropper with changeable location can be popularized to multiple randomly located eavesdroppers.), as shown in Figure 1. Alice with N a uniform linear array (ULA) antennas aims to transmit a confidential signal to Bob. In order to enhance the secrecy performance, beamforming is utilized at Alice. Bob and randomly located Eve are both equipped with one receiving antenna and one transmitting antenna [17,18]. Bob simultaneously receives the signal from Alice and emits the AN signal omnidirectionally to confuse the potential eavesdropper, while Eve simultaneously eavesdrops the signal from Alice and transmits jamming signal to interfere with the transmission. Since the full duplex capability at Bob, we assume the cancellation is not perfect. h b b is the residual self interference after the self-interference cancellation. It is often assumed that the self-interference can be significantly suppressed [36], so that h b b can be regarded as an independent Rayleigh distributed variable [37]; and ρ 0 , 1 is the linear residual self-interference coefficient. As for Eve, since the legitimate users cannot obtain the information of Eve, the worst case that Eve’s self-interference can be eliminated perfectly is considered for the robust design.
The main channel and the wiretap channel can be expressed as 1 × N a vector h a b and h a e , respectively. Besides, the scalar h b e and h e b represent the channels from Bob to Eve and Eve to Bob, respectively. All channels are assumed to be the flat Rayleigh fading. We assume that the Eve’s CSI and location are unknown to both Alice and Bob and the full CSI of Bob is available for Alice. The received signals at Bob and Eve are respectively expressed as
y b act = ϕ P h a b w a x a + P e h e b x e + ρ 1 ϕ P h b b x b + n b
and
y e = ϕ P h a e w a x a + 1 ϕ P h b e x b + n e ,
where w a represents the N a × 1 beamforming vector at Alice, and the superscript · H represents Hermitian conjugate. Under the assumption that perfect CSI of Bob is assumed to be known for Alice, the optimal beamforming is designed as w a = h a b H h a b H h a b h a b to enhance the receiving performance of Bob [38]. The confidential signal from Alice, the AN from Bob, and the jamming signal from Eve are respectively denoted by scalar x a , x b , and x e with unit power, i.e., E x a 2 = E x b 2 = E x e 2 = 1 . The total transmission power is denoted by P, which includes the confidential signal power from Alice and the AN power from Bob; and ϕ is the power allocation factor between the confidential signal from Alice and the AN signal from Bob. The jamming signal power from Eve is denoted by P e . n b and n e are additive white Gaussian noises with powers σ b 2 and σ e 2 , respectively. As our system model is also compatible with the passive Eve, i.e., when P e = 0 , Eve becomes passive. Then, the received signal at Bob is
y b pas = ϕ P h a b w a x a + ρ 1 ϕ P h b b x b + n b .

3. Insecure Region Analysis

In this section, the correctness of the hybrid outage probability for active Eve is verified firstly. Subsequently, the expression of the hybrid outage probability is derived. Based on it, the insecure region and safe transmission range are defined to evaluate the security performance.

3.1. Hybrid Outage Probability

From (1) and (2), the signal-to-interference-noise ratio (SINR) at Bob and active Eve can be respectively calculated as (This paper aims to establish the insecure region to defend against the active eavesdropper and achieve a higher security performance. The self-interference is beyond our main focus. This is modeled as a variable depending on the ability of Bob, according to [18,22]. The value of self-interference is changed with ρ .)
γ b act = ϕ P a λ d a b β h a b w a 2 P e λ d b e β h e b 2 + ρ 1 ϕ P + σ b 2
and
γ e = ϕ P λ d a e β h a e w a 2 1 ϕ P λ d b e β h b e 2 + σ e 2 ,
where · denotes the Euclidean norm, d a b , d a e , and d b e represent the distances between Alice and Bob, Alice and Eve, Bob and Eve, respectively, λ is a constant which depends on the propagation model and carrier frequency, β 2 is the path-loss exponent. When Eve is passive, from (3), the SINR at Bob is
γ b pas = ϕ P a λ d a b β h a b w a 2 ρ 1 ϕ P + σ b 2 .
The secrecy capacity is expressed as [29,30]
C s = C b C e , u n d e r C b > C e ; 0 , u n d e r C b C e ,
where C b = log 2 1 + γ b is the main channel capacity between Alice and Bob. C e = log 2 1 + γ e is the wiretap channel capacity between Alice and Eve. Since the CSI of the wiretap channel is unavailable, the instantaneous secrecy capacity is unobtainable. Thus, the outage probability is a more suitable metric for our system.
If the secrecy transmission rate is assumed to be R s , the entire event space of communication can be divided into three mutually exclusive events [39]:
  • Transmission outage event occurs when C b R s . In this case, we find C e = C b R s < 0 , which conflicts with the fact that C e > 0 . As such, R s is not supported by the main channel and Alice can not transmit a signal.
  • Secrecy outage event occurs when C s < R s and C b > R s . In this case, as some information on the confidential signal can be known by Eve, perfect secrecy cannot be achieved.
  • Secure transmission event occurs when C s R s . In this case, perfect secrecy can be guaranteed.
In the conventional scenario where Eve is passive, the main performance metric is secrecy outage probability. However, in our system, Eve can emit malicious interference to destroy the transmission, which causes the transmission outage event. In this case, the secrecy outage probability cannot evaluate the performance comprehensively. Hence, we adopt the hybrid outage probability as performance metric, as follows
P ho θ , d a e , d b e = P to θ , d a e , d b e + P so θ , d a e , d b e ,
where P to θ , d a e , d b e represents the transmission outage probability and P so θ , d a e , d b e represents the secrecy outage probability. Meanwhile, the hybrid outage probability is also applicable to passive Eve.
In order to obtain the expressions of the outage probabilities, we present the statistics of γ b act and γ e . From the right hand side of (4), we find the numerator follows a chisquared distribution since h a b 2 is a sum of the squares of N a independent Gaussian random variables; and the denominator follows an exponential distribution. Meanwhile, as the numerator and denominator are independent, we apply
F X Y + 1 γ = Pr x y + 1 < γ = 0 y + 1 f X γ y + 1 f Y y d y
to obtain the cumulative distribution functions (CDF) of γ b act as
F γ b act γ = 1 1 k 2 exp γ k 1 n = 1 N a 1 n 1 ! γ k 1 n 1 m = 0 n 1 n 1 ! n m 1 ! 1 k 2 + γ k 1 m + 1 ,
where
k 1 = λ d a b β ϕ P ρ 1 ϕ P + σ b 2
and
k 2 = λ d b e β P e ρ 1 ϕ P + σ b 2 .
We now derive the CDF of γ e . Due to the fact that the beamforming vector w a at Alice is independent from eavesdropper’s channel h a e , the denominator follows exponentially distributed; and the numerator is also exponentially distributed. Similarly, the numerator and denominator are independent. With the help of (9), the CDF of γ e is
F γ e γ = 1 k 3 k 4 γ + k 3 exp γ k 3 ,
where
k 3 = λ d a e β ϕ P σ e 2
and
k 4 = λ d b e β 1 ϕ P σ e 2 .
According to the definition of the transmission outage event with active Eve, we have
P to act θ , d a e , d b e = Pr 0 < C b R s = Pr 0 < γ 2 R s 1 = F γ b act 2 R s 1 = 1 1 k 2 exp 2 R s 1 k 1 n = 1 N a 1 n 1 ! 2 R s 1 k 1 n 1 m = 0 n 1 n 1 ! n m 1 ! 1 k 2 + 2 R s 1 k 1 m + 1 .
The hybrid outage probability in (8) can be re-expressed as
P ho θ , d a e , d b e = P to θ , d a e , d b e + P so θ , d a e , d b e = Pr C b R s + Pr C b < R s + C e , C b > R s = Pr 0 < C b < R s + C e = Pr 0 < γ b < 2 R s 1 + γ e 1 = 0 0 2 R s 1 + γ e 1 f γ b γ b f γ e γ e d γ b d γ e = 0 f γ e γ e F γ b 2 R s 1 + γ e 1 d γ e .
Then, from (11), the probability density function (PDF) of γ e can be derived as
f γ e γ = k 3 k 4 k 3 + k 4 γ 2 + 1 k 3 + k 4 γ exp γ k 3 .
By substituting (9) and (13) into (12), the hybrid outage probability in the presence of an active Eve is derived as
P ho act θ , d a e , d b e = 1 1 k 2 0 exp γ e k 3 + 2 R s 1 + γ e 1 k 1 n = 1 N a 2 R s 1 + γ e 1 k 1 n 1 m = 0 n 1 1 n m 1 ! 1 k 2 + 2 R s 1 + γ e 1 k 1 m + 1 k 3 k 4 k 4 γ e + k 3 2 + 1 k 4 γ e + k 3 d γ e .
It is clear that the secrecy outage probability can be calculated through (15) and (12) with the help of (8).
From (6), h a b 2 is a sum of the squares of N a independent Gaussian random variables, the CDF of γ b pas is
F γ b pas γ = 1 exp γ k 1 n = 0 N a 1 1 n ! γ k 1 n
The analysis of the outage probability expressions with passive Eve are similar. The transmission outage probability and the hybrid outage probability are derived, as follows
P to pas θ , d a e , d b e = 1 exp 2 R s 1 k 1 n = 0 N a 1 1 n ! 2 R s 1 k 1 n
and
P ho pas θ , d a e , d b e = 1 0 exp γ e k 3 + 2 R s 1 + γ e 1 k 1 k 3 k 4 k 4 γ e + k 3 2 + 1 k 4 γ e + k 3 n = 0 N a 1 1 n ! 2 R s 1 + γ e 1 k 1 n d γ e
where Ei · is the exponential integral function [40].

3.2. Insecure Region and Safe Transmission Range

As mentioned above, the insecure region Ω is the set of the eavesdropper’s locations where the hybrid outage probability is larger than a given threshold denoted by 0 < ε < 1 ; this is expressed as
Ω = θ , d a e , d b e P ho θ , d a e , d b e > ε .
According to the definition of insecure region, we can establish the protecting region, where Eve is not allowed to enter to achieve secure transmission in a real communication scenario.
Eve emitting a jamming signal also brings the risk of being detected. We assume that if the jamming power from Eve increases to a certain threshold P e th , it will be exposed. When Eve is located near Alice, it can intercept the confidential signal easily; when Eve is located near Bob, it can damage the legitimate transmission with small power. Hence, not only the region around Alice but also around Bob is insecure. When the jamming signal power from Eve P e equals P e th , the boundary of the insecure region can be obtained.
In addition, for the worst case that Eve appears on the line between Alice and Bob, it can also obtain the power gain from Alice’s beamforming. The safe transmission range is defined by P ho < ε , as shown in Figure 2. This range is denoted by d s , and helps delineating the circular protecting region around Alice and Bob.

4. Numerical Results

Simulation results are conducted to show the insecure region defined by the hybrid outage probability. Unless otherwise mentioned, the default simulation parameters are as listed in Table 1. All channels experience Rayleigh fading, i.e, λ = 1 . The boundary of the insecure region is obtained when the jamming signal power P e = P e th . The outage probabilities are calculated over 1000 trials of Monte Carlo simulations.
Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7 show the insecure regions with active Eve and passive Eve, respectively. The region represents the secure region where P ho < ε , while the yellow region represents the insecure region where P ho > ε . Compared with the passive Eve in Figure 7, one can see that the active Eve increases the insecure region, and the region around Bob is also insecure. Since the jamming signal from Eve can interfere with Bob, which makes the insecure region also look approximately like a disc around Bob. On the other hand, the confidential signal is transmitted from Alice, Eve appears around Alice can eavesdrop the confidential signal, which makes the insecure region look approximately like a disc around Alice. As for the active Eve in Figure 3 and Figure 4, when a large number of antennas are applied in Alice, the size of insecure region will diminish. Because the multi-antenna gain makes Bob receive the confidential signal more easily. Although it also benefits to the eavesdropper to eavesdrop the confidential signal, the gain from beamforming increases the performance difference between the link of the legitimate receiver and that of the eavesdropper, and from Figure 3 and Figure 5, when P e th increases, the insecure region enlarges, since Eve can interfere with the transmission at a further location. It is noted that the insecure region enlarges when ρ increases from Figure 3 and Figure 6 since that the AN from Bob effects itself much more. When the insecure region is determined, the secure transmission can be achieved by protecting the insecure region, which is easy to conduct due to its regular circular shape.
In the following, we consider that Eve is located on the line between Alice and Bob, and the change trend between Alice and Bob is analyzed.
Figure 8 presents the hybrid outage probability P ho and the transmission outage probability P to versus d a e with different P e th . For passive Eve, P ho pas decreases with the increase of d a e , due to the fact that the power of the received confidential signal decreases and the power of the received AN from Bob increases. On the other hand, P to pas is a constant, which is easily verified from (17). For active Eve, when increasing d a e , the significant difference of P ho act from passive Eve P ho pas is the change around Bob. The main reason is that P to act dramatically increases around Bob, since the jamming signal from Eve causes significant damage to Bob. When P e th decreases, one notices that the width of the peak around Bob decreases, which means that the insecure region around Bob diminishes, and the safe transmission range d s increases. According to the safe transmission range, the circular protecting region around Alice and Bob can be conducted.
Figure 9 depicts the transmission outage probability P to and the secrecy outage probability P so versus d a e with different ϕ . As ϕ increases, P so increases while P to decreases; this is because increasing the power of the confidential signal is beneficial to the establishment of transmission between Alice and Bob, but also increases the risk of eavesdropping. Note that P to represents the reliability of the transmission. Thus, a reasonable trade-off between transmission reliability and security should be considered. Meanwhile, the variation trend of P so is the same for both active and passive Eve, which means that the active Eve mainly interferes with the establishment of the legitimate transmission link between Alice and Bob, and it can dramatically increase P to act by moving around Bob.
Figure 10 shows the influence of β , R s , and ρ on the hybrid outage probability, respectively. It is clear that when β increases, the security performance decreases, since the communication condition is worse. When R s decreases, the security performance increases, as more power can be used to transmit the AN signal. As ρ increases, the security performance decreases, since the self-interference at Bob causes more damage to the transmission. It is worth noting that numerical results are consistent with the simulation results.
Figure 11 shows the influence of P e th and ϕ on d s . The top and bottom surfaces represent the positions of the right and left endpoints of the safe transmission range, respectively, with distance d s between them. The insecure region around Bob corresponding to the top surface mainly depends on P e th , while the insecure region around Alice corresponding to the bottom surface mainly depends on ϕ . Furthermore, when P e th increases, Eve can interfere with Bob from a further location, which causes the decrease of d s . The increase of ϕ makes it easier to intercept, which causes the decrease of d s as well. Obviously, all simulation results show that the active Eve can cause a higher outage probability, and is more harmful to the secure transmission.

5. Conclusions

This paper has proposed a valuable way to defend against an eavesdropper by establishing the protecting region to prevent the eavesdropper from entering in the wireless sensor networks. We have analyzed the insecure region based on the metric of the hybrid outage probability which takes both the transmission outage probability and the secrecy outage probability into consideration, under the assumption that the eavesdropper is passive and active. Subsequently, the hybrid outage probability expressions have been derived to define the insecure region. The safe transmission range, as an effective indicator, has been defined to conduct the circular protecting region around transceiver. The analysis of the insecure region can also be integrated with existing transmission strategies to achieve a higher security performance in wireless sensor networks.

Author Contributions

T.L. and C.X. performed the simulation results and wrote the paper; Y.L. conceived the model; O.A.D. provided some suggestions and revised the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Postdoctoral Science Foundation of China under Grant 2019M663630, in part by the National Key R&D Program of China under Grant 2016YF-B1200202 and 254, in part by the National Natural Science Foundation of China under Grant 61771365, in part by the 111 Project under Grant B08038, in part by the Fundamental Research Funds for the Central Universities under Grant JBF180101.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zheng, J.; Cai, Y.; Shen, X.; Zheng, Z.; Yang, W. Green energy optimization in energy harvesting wireless sensor networks. IEEE Commun. Mag. 2015, 53, 150–157. [Google Scholar] [CrossRef]
  2. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
  3. Chen, G.; Gong, Y.; Xiao, P.; Chambers, J.A. Dual antenna selection in secure cognitive radio networks. IEEE Trans. Veh. Technol. 2016, 65, 7993–8002. [Google Scholar] [CrossRef] [Green Version]
  4. Chen, G.; Coon, J.P.; Tajbakhsh, S.E. Secure routing for multihop Ad Hoc networks with inhomogeneous eavesdropper clusters. IEEE Trans. Veh. Technol. 2018, 67, 10660–10670. [Google Scholar] [CrossRef] [Green Version]
  5. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
  6. Hu, H.; Gao, Z.; Liao, X.; Leung, V.C.M. Secure communications in CIoT networks with a wireless energy harvesting untrusted relay. Sensors 2017, 17, 2023. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Zhu, F.; Yao, M. Improving physical-layer security for CRNs using sinr-based cooperative beamforming. IEEE Trans. Veh. Technol. 2016, 65, 1835–1841. [Google Scholar] [CrossRef]
  8. Lee, J. Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Commun. Lett. 2015, 19, 525–528. [Google Scholar] [CrossRef]
  9. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  10. Son, W.; Jang, H.S.; Jung, B.C. A pseudo-random beamforming technique for improving physical-layer security of MIMO cellular networks. Entropy 2019, 21, 1038. [Google Scholar] [CrossRef] [Green Version]
  11. Zeng, M.; Nguyen, N.; Dobre, O.A.; Poor, H.V. Securing downlink massive MIMO-NOMA networks with artificial noise. IEEE J. Sel. Top. Signal Process. 2019, 13, 685–699. [Google Scholar] [CrossRef] [Green Version]
  12. Nguyen, V.; Nguyen, H.V.; Dobre, O.A.; Shin, O. A new design paradigm for secure full-duplex multiuser systems. IEEE J. Sel. Areas Commun. 2018, 36, 1480–1498. [Google Scholar] [CrossRef]
  13. Lin, S.H.; Lu, R.R.; Fu, X.T.; Tong, A.L.; Wang, J.Y. Physical-layer security analysis over m-distributed fading channels. Entropy 2019, 21, 998. [Google Scholar] [CrossRef] [Green Version]
  14. Tugnait, J.K. Self-contamination for detection of pilot contamination attack in multiple antenna systems. IEEE Wirel. Commun. Lett. 2015, 4, 525–528. [Google Scholar] [CrossRef]
  15. Zhou, X.; Maham, B.; Hjorungnes, A. Pilot contamination for active eavesdropping. IEEE Trans. Wirel. Commun. 2012, 11, 903–907. [Google Scholar] [CrossRef]
  16. Zhang, W.; Lin, H.; Zhang, R. Detection of pilot contamination attack based on uncoordinated frequency shifts. IEEE Trans. Commun. 2018, 66, 2658–2670. [Google Scholar] [CrossRef]
  17. Liu, C.; Lee, J.; Quek, T.Q.S. Secure transmission in the presence of full-duplex active eavesdropper. In Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  18. Liu, Z.; Li, N.; Tao, X.; Li, S.; Xu, J.; Zhang, B. Artificial-noise-aided secure communication with full-duplex active eavesdropper. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–7. [Google Scholar]
  19. Tang, X.; Ren, P.; Han, Z. Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework. IEEE Access 2017, 5, 24632–24645. [Google Scholar] [CrossRef]
  20. Tang, X.; Ren, P.; Wang, Y.; Han, Z. Combating full-duplex active eavesdropper: A hierarchical game perspective. IEEE Trans. Commun. 2017, 65, 1379–1395. [Google Scholar] [CrossRef]
  21. Fang, H.; Xu, L.; Zou, Y.; Wang, X.; Choo, K.R. Three-stage stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 2018, 67, 10788–10799. [Google Scholar] [CrossRef]
  22. Lv, L.; Ding, Z.; Chen, J.; Al-Dhahir, N. Design of secure NOMA against full-duplex proactive eavesdropping. IEEE Wirel. Commun. Lett. 2019, 8, 1090–1094. [Google Scholar] [CrossRef]
  23. Zhou, H.; He, D.; Wang, H.; Yang, D. Optimal relay selection with a full-duplex active eavesdropper in cooperative wireless networks. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar]
  24. Chen, G.; Gong, Y.; Xiao, P.; Chambers, J.A. Physical Layer Network Security in the Full-Duplex Relay System. IEEE Trans. Inf. Forensics Secur. 2015, 10, 574–583. [Google Scholar] [CrossRef] [Green Version]
  25. Karas, D.S.; Boulogeorgos, A.A.; Karagiannidis, G.K. Physical layer security with uncertainty on the location of the eavesdropper. IEEE Wirel. Commun. Lett. 2016, 5, 540–543. [Google Scholar] [CrossRef] [Green Version]
  26. Karas, D.S.; Boulogeorgos, A.A.; Karagiannidis, G.K.; Nallanathan, A. Physical Layer security in the presence of interference. IEEE Wirel. Commun. Lett. 2017, 6, 802–805. [Google Scholar] [CrossRef]
  27. Tang, J.; Chen, G.; Coon, J.P. Secrecy performance analysis of wireless communications in the presence of uav jammer and randomly located uav eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3026–3041. [Google Scholar] [CrossRef] [Green Version]
  28. Chen, G.; Coon, J.P.; Di Renzo, M. Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1195–1206. [Google Scholar] [CrossRef] [Green Version]
  29. Li, W.; Tang, Y.; Ghogho, M.; Wei, J.; Xiong, C. Secure communications via sending artificial noise by both transmitter and receiver: Optimum power allocation to minimise the insecure region. IET Commun. 2014, 8, 2858–2862. [Google Scholar] [CrossRef]
  30. Li, W.; Ghogho, M.; Chen, B.; Xiong, C. Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis. IEEE Commun. Lett. 2012, 16, 1628–1631. [Google Scholar] [CrossRef]
  31. Zhou, Y.; Yeoh, P.L.; Chen, H.; Li, Y.; Schober, R.; Zhuo, L.; Vucetic, B. Improving physical layer security via a uav friendly jammer for unknown eavesdropper location. IEEE Trans. Veh. Technol. 2018, 67, 11280–11284. [Google Scholar] [CrossRef]
  32. Marina, N.; Hjorungnes, A. Characterization of the secrecy region of a single relay cooperative system. In Proceedings of the 2010 IEEE Wireless Communication and Networking Conference (WCNC), Sydney, Australia, 18–21 April 2010; pp. 1–6. [Google Scholar]
  33. Zheng, T.; Wang, H.; Yin, Q. On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers. IEEE Commun. Lett. 2014, 18, 1299–1302. [Google Scholar] [CrossRef]
  34. Mao, L.; Li, Y.; Li, T.; Gao, M.; Zhang, H. Security region analysis with artificial noise based on secrecy outage probability. In Proceedings of the 2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 336–340. [Google Scholar]
  35. Tugnait, J.K. Using artificial noise to improve detection performance for wireless user authentication in time-variant channels. IEEE Wirel. Commun. Lett. 2014, 3, 377–380. [Google Scholar] [CrossRef]
  36. Ju, H.; Oh, E.; Hong, D. Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation. IEEE Trans. Wirel. Commun. 2009, 8, 3933–3938. [Google Scholar]
  37. Krikidis, I.; Suraweera, H.A.; Smith, P.J.; Yuen, C. Full-Duplex Relay Selection for Amplify-and-Forward Cooperative Networks. IEEE Trans. Wirel. Commun. 2012, 11, 4381–4393. [Google Scholar] [CrossRef]
  38. Gerbracht, S.; Scheunert, C.; Jorswieck, E.A. Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf. Forensics Secur. 2012, 7, 704–716. [Google Scholar] [CrossRef]
  39. Yang, N.; Yan, S.; Yuan, J.; Malaney, R.; Subramanian, R.; Land, I. Artificial noise: Transmission optimization in multi-input single-output wiretap channels. IEEE Trans. Commun. 2015, 63, 1771–1783. [Google Scholar] [CrossRef]
  40. Gradshteyn, I.S.; Ryzhik, I.M. Tabel of Integrals, Series, and Products, 7th ed.; Academic Press: Cambridge, MA, USA, 2007. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Sensors 20 00438 g001
Figure 2. Safe transmission range.
Figure 2. Safe transmission range.
Sensors 20 00438 g002
Figure 3. Insecure region with P e th = 15 dBm, N a = 4 and ρ = 10 8 .
Figure 3. Insecure region with P e th = 15 dBm, N a = 4 and ρ = 10 8 .
Sensors 20 00438 g003
Figure 4. Insecure region with P e th = 15 dBm, N a = 10 and ρ = 10 8 .
Figure 4. Insecure region with P e th = 15 dBm, N a = 10 and ρ = 10 8 .
Sensors 20 00438 g004
Figure 5. Insecure region with P e th = 20 dBm, N a = 4 and ρ = 10 8 .
Figure 5. Insecure region with P e th = 20 dBm, N a = 4 and ρ = 10 8 .
Sensors 20 00438 g005
Figure 6. Insecure region with P e th = 20 dBm, N a = 4 and ρ = 10 6 .
Figure 6. Insecure region with P e th = 20 dBm, N a = 4 and ρ = 10 6 .
Sensors 20 00438 g006
Figure 7. Insecure region with passive Eve and N a = 4 and ρ = 10 8 .
Figure 7. Insecure region with passive Eve and N a = 4 and ρ = 10 8 .
Sensors 20 00438 g007
Figure 8. The influence of P e th on the outage probability.
Figure 8. The influence of P e th on the outage probability.
Sensors 20 00438 g008
Figure 9. The influence of ϕ on the outage probability.
Figure 9. The influence of ϕ on the outage probability.
Sensors 20 00438 g009
Figure 10. The influence of R s , β , and ρ on the hybrid outage probability P ho act .
Figure 10. The influence of R s , β , and ρ on the hybrid outage probability P ho act .
Sensors 20 00438 g010
Figure 11. The influence of P e th and ϕ on d s .
Figure 11. The influence of P e th and ϕ on d s .
Sensors 20 00438 g011
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParametersValues
Number of antennas in Alice N a 4
Distance between Alice and Bob d a b 100 m
Total transmission power P10 W
Power allocation factor ϕ 0.1
Jamming signal power P e th 15 dBm
Secrecy transmission rate R s 0.3 bps/Hz
Threshold ε 0.2
Path loss exponent β 2
Linear residual coefficient ρ 10 8

Share and Cite

MDPI and ACS Style

Li, T.; Xue, C.; Li, Y.; Dobre, O.A. Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region. Sensors 2020, 20, 438. https://doi.org/10.3390/s20020438

AMA Style

Li T, Xue C, Li Y, Dobre OA. Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region. Sensors. 2020; 20(2):438. https://doi.org/10.3390/s20020438

Chicago/Turabian Style

Li, Tao, Chaozheng Xue, Yongzhao Li, and Octavia A. Dobre. 2020. "Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region" Sensors 20, no. 2: 438. https://doi.org/10.3390/s20020438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop