Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

  • 3665 Accesses

Abstract

In the new generation wireless communication systems, when multiple users are served, information security among them should be considered to protect each user’s privacy. In this case, physical layer security techniques can be adopted for this mutual confidence problem. Unlike other traditional physical layer security methods, the proposed scheme improves secrecy rate with the information of users’ access statuses (i.e., being served or idle), and it is denoted as SRT-AS. In the SRT-AS, appropriate parameters expressing users’ actual access statuses are introduced, and an adaptive transmitter and receiver design strategy is used to increase security. It can be found that no iterative process is included in the SRT-AS, moreover, performance analysis and simulation results illustrate that the SRT-AS is feasible for the multi-user system.

The research reported in this paper was supported in part by the National Natural Science Foundation of China (NSFC) under Grant No. 61431011, and the Opening Project of Key Laboratory of Cognitive Radio and Information Processing (Guilin University of Electronic Technology), Ministry of Education, under Grant No. 2013KF04.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. 3GPP (v 0.0.6).: Overview of 3GPP Release 13 (2014)

    Google Scholar 

  2. Zhu, H.J., Du, S.G., Gao, Z.Y., Dong, M.X., Cao, Z.F.: A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22–32 (2014)

    Article  Google Scholar 

  3. Xu, Q.C., Su, Z., Han, B., Fang, D.F., Xu, Z.J., Gan, X.Y.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. (2015). doi:10.1007/s12083-015-0330-6

  4. Su, Z., Xu, Q.C., Zhu, H.J., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)

    Google Scholar 

  5. Calabuig, J., Monserrat, J.F., Gomez-Barquero, D.: 5th generation mobile networks: a new opportunity for the convergence of mobile broadband and broadcast services. IEEE Commun. Mag. 53(2), 198–205 (2015)

    Article  Google Scholar 

  6. Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1550–1573 (2014)

    Article  Google Scholar 

  7. Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. proc. ieee. 100(11), 3056–3076 (2012)

    Article  Google Scholar 

  8. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Renzo, M.D.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)

    Article  Google Scholar 

  9. Zhang, J., Yuen, C., Wen, C.K., Jin, S., Gao, X.: Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: large system analysis. IEEE Commun. Lett. 18(9), 1627–1630 (2014)

    Article  Google Scholar 

  10. Fakoorian, S.A.A., Swindlehurst, A.L.: On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J. Sel. Areas Commun. 31(9), 1701–1713 (2013)

    Article  Google Scholar 

  11. Geraci, G., Couillet, R., Yuan, J., Debbah, M., Collings, I.B.: Large system analysis of linear precoding in MISO broadcast channels with confidential messages. IEEE J. Sel. Areas Commun. 31(9), 1660–1671 (2013)

    Article  Google Scholar 

  12. Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.B.: Secrecy sumrates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472–3482 (2012)

    Article  Google Scholar 

  13. Liu, R., Liu, T., Poor, H.V., Shamai, S.: Multiple-input multiple-output Gaussian broadcast channels with confidential messages. IEEE Trans. Inf. Theory 56(9), 4215–4227 (2010)

    Article  MathSciNet  Google Scholar 

  14. Jungnickel, V., Manolakis, K., Zirwas, W., et al.: The role of small cells, coordinated multipoint, and massive MIMO in 5G. IEEE Commun. Mag. 52(5), 44–51 (2014)

    Article  Google Scholar 

  15. Ho, W.W.L., Quek, T.Q.S., Sun, S., Heath, R.W.: Decentralized precoding for multicell MIMO downlink. IEEE Trans. Wirel. Commun. 10(6), 1798–1809 (2011)

    Article  Google Scholar 

  16. Lutkepohl, H.: Handbook of Matrixes. Wiley, Chichester (1997)

    Google Scholar 

  17. Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. The John Hopkins University Press, Baltimore (1996)

    MATH  Google Scholar 

  18. Li, Q., Yang, Y., Ma, W.K., Lin, M., Ge, J.H., Lin, J.R.: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 63(1), 206–220 (2015)

    Article  MathSciNet  Google Scholar 

  19. 3GPP TS 36.104 (v11.3.0).: Evolved universal terrestrial radio access (E-UTRA); Base station (BS) radio transmission and reception. Release 11 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pinyi Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, D., Ren, P., Du, Q., Sun, L. (2015). Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics