Skip to main content
Top
Published in: Wireless Networks 5/2020

12-10-2019

Dispersed beamforming approach for secure communication in UDN

Authors: Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain

Published in: Wireless Networks | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless communication systems are prone to many security breaches due to open nature of the medium and exponential a rise in subscribers. Hence, physical layer security (PLS) has emerged as one of the dominant low complexity alternatives to overcome the impact of eavesdropping by managing the physical characteristics of the medium. In this paper, we ensure PLS to moving users which tends to experience rise in handover, as a result of proximity between users and base station. This study is based on ultra-dense network (UDN). To tackle this challenge, novel secure beamforming named as beam broadening and beam merging have been proposed. Besides, we propose a synchronization approach called synchronized mobility clustering for UDN to reduce the overheads generated due to the exchange of information about moving users. More specifically, we derive an analytical expression for secrecy outage probability—an important security metric. The effect of proposed approaches have been validated through numerical results and the results show the effectiveness of the proposed approaches against eavesdropping. Finally, the performance of the proposed scheme is evaluated and compared with the conventional beamforming approach. However, this proposed approach works well for a varied density of users and location to be targeted.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Secrecy rate can be termed as the data rate (in bps/Hz) which can be securely transmitted from one node to another, without being intercepted by the eavesdropper.
 
2
HPBW: Half Power Beam Width.
 
Literature
1.
go back to reference Paper, W. (2018). Cisco ultra 5G packet core solution. Paper, W. (2018). Cisco ultra 5G packet core solution.
2.
go back to reference Wang, Y., et al. (2017). A data-driven architecture for personalized QoE management in 5G wireless networks. IEEE Wireless Communications,24(1), 102–110.CrossRef Wang, Y., et al. (2017). A data-driven architecture for personalized QoE management in 5G wireless networks. IEEE Wireless Communications,24(1), 102–110.CrossRef
3.
go back to reference Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology,61(8), 3693–3704.CrossRef Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology,61(8), 3693–3704.CrossRef
4.
go back to reference Su, Z., Hui, Y., & Guo, S. (2016). D2D-based content delivery with parked vehicles in vehicular social networks. IEEE Wireless Communications,23(4), 90–95.CrossRef Su, Z., Hui, Y., & Guo, S. (2016). D2D-based content delivery with parked vehicles in vehicular social networks. IEEE Wireless Communications,23(4), 90–95.CrossRef
5.
go back to reference Jiang, L., et al. (2016). Social-aware energy harvesting device-to-device communications in 5G networks. IEEE Wireless Communications,23(4), 20–27.CrossRef Jiang, L., et al. (2016). Social-aware energy harvesting device-to-device communications in 5G networks. IEEE Wireless Communications,23(4), 20–27.CrossRef
6.
go back to reference Su, Z., Xu, Q., Hui, Y., Wen, M., & Guo, S. (2017). A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,66(7), 6461–6474.CrossRef Su, Z., Xu, Q., Hui, Y., Wen, M., & Guo, S. (2017). A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,66(7), 6461–6474.CrossRef
7.
go back to reference Osseiran, A., et al. (2014). Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Communications Magazine,52(5), 26–35.CrossRef Osseiran, A., et al. (2014). Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Communications Magazine,52(5), 26–35.CrossRef
8.
go back to reference Kamel, M., Hamouda, W., & Youssef, A. (2016). Ultra-dense networks: A survey. IEEE Communications Surveys & Tutorials,18(4), 2522–2545.CrossRef Kamel, M., Hamouda, W., & Youssef, A. (2016). Ultra-dense networks: A survey. IEEE Communications Surveys & Tutorials,18(4), 2522–2545.CrossRef
9.
go back to reference Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Communications Magazine,53(4), 28–35.CrossRef Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Communications Magazine,53(4), 28–35.CrossRef
10.
go back to reference Shiu, Y. S., Chang, S. Y., Wu, H. C., Huang, S. C. H., & Chen, H. H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications,18(2), 66–74.CrossRef Shiu, Y. S., Chang, S. Y., Wu, H. C., Huang, S. C. H., & Chen, H. H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications,18(2), 66–74.CrossRef
11.
go back to reference Chopra, G., Jha, R. K., & Jain, S. (2017). A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions. Journal of Network and Computer Applications,95, 54–78.CrossRef Chopra, G., Jha, R. K., & Jain, S. (2017). A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions. Journal of Network and Computer Applications,95, 54–78.CrossRef
12.
go back to reference Chopra, G., Jain, S., & Jha, R. K. (2018). Possible security attack modeling in ultradense networks using high-speed handover management. IEEE Transactions on Vehicular Technology,67(3), 2178–2192.CrossRef Chopra, G., Jain, S., & Jha, R. K. (2018). Possible security attack modeling in ultradense networks using high-speed handover management. IEEE Transactions on Vehicular Technology,67(3), 2178–2192.CrossRef
13.
go back to reference Sivanesan, K., Zou, J., Vasudevan, S., & Palat, S. (2015). Mobility performance optimization for 3GPP LTE HetNets. In Design and deployment of small cell networks (pp. 1–30). Sivanesan, K., Zou, J., Vasudevan, S., & Palat, S. (2015). Mobility performance optimization for 3GPP LTE HetNets. In Design and deployment of small cell networks (pp. 1–30).
14.
go back to reference Kutty, S., & Sen, D. (2016). Beamforming for millimeter wave communications: An inclusive survey. IEEE Communications Surveys & Tutorials,18(2), 949–973.CrossRef Kutty, S., & Sen, D. (2016). Beamforming for millimeter wave communications: An inclusive survey. IEEE Communications Surveys & Tutorials,18(2), 949–973.CrossRef
15.
go back to reference Sun, L., & Du, Q. (2017). Physical layer security with its applications in 5G networks: A review. China Communications,14(12), 1–14.CrossRef Sun, L., & Du, Q. (2017). Physical layer security with its applications in 5G networks: A review. China Communications,14(12), 1–14.CrossRef
16.
go back to reference Lv, T., Gao, H., & Yang, S. (2015). Secrecy transmit beamforming for heterogeneous networks. IEEE Journal on Selected Areas in Communications,33(6), 1154–1170.CrossRef Lv, T., Gao, H., & Yang, S. (2015). Secrecy transmit beamforming for heterogeneous networks. IEEE Journal on Selected Areas in Communications,33(6), 1154–1170.CrossRef
17.
go back to reference Zhang, Y., Ko, Y., Woods, R., & Marshall, A. (2017). Defining spatial secrecy outage probability for exposure region-based beamforming. IEEE Transactions on Wireless Communications,16(2), 900–912.CrossRef Zhang, Y., Ko, Y., Woods, R., & Marshall, A. (2017). Defining spatial secrecy outage probability for exposure region-based beamforming. IEEE Transactions on Wireless Communications,16(2), 900–912.CrossRef
18.
go back to reference Han, B., Li, J., Su, J., Guo, M., & Zhao, B. (2015). Secrecy capacity optimization via cooperative relaying and jamming for WANETs. IEEE Transactions on Parallel and Distributed Systems,26(4), 1117–1128.CrossRef Han, B., Li, J., Su, J., Guo, M., & Zhao, B. (2015). Secrecy capacity optimization via cooperative relaying and jamming for WANETs. IEEE Transactions on Parallel and Distributed Systems,26(4), 1117–1128.CrossRef
19.
go back to reference Costello, D. J. (2009) Fundamentals of wireless communication (Tse, D. and Viswanath, P.) [book review], 55(2). Costello, D. J. (2009) Fundamentals of wireless communication (Tse, D. and Viswanath, P.) [book review], 55(2).
20.
go back to reference Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In IEEE international symposium on information theory—Proceedings (pp. 356–360). Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In IEEE international symposium on information theoryProceedings (pp. 356–360).
21.
go back to reference Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory,54(6), 2470–2492.MathSciNetMATHCrossRef Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory,54(6), 2470–2492.MathSciNetMATHCrossRef
22.
go back to reference Gopala, P. K., Lai, L., & El Gamal, H. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory,54(10), 4687–4698.MathSciNetMATHCrossRef Gopala, P. K., Lai, L., & El Gamal, H. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory,54(10), 4687–4698.MathSciNetMATHCrossRef
23.
go back to reference Cumanan, K., Ding, Z., Sharif, B., Tian, G. Y., & Leung, K. K. (2014). Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Transactions on Vehicular Technology,63(4), 1678–1690.CrossRef Cumanan, K., Ding, Z., Sharif, B., Tian, G. Y., & Leung, K. K. (2014). Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Transactions on Vehicular Technology,63(4), 1678–1690.CrossRef
24.
go back to reference Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory,54(6), 2493–2507.MathSciNetMATHCrossRef Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory,54(6), 2493–2507.MathSciNetMATHCrossRef
25.
go back to reference Choi, J. (2016). A robust beamforming approach to guarantee instantaneous secrecy rate. IEEE Transactions on Wireless Communications,15(2), 1076–1085.CrossRef Choi, J. (2016). A robust beamforming approach to guarantee instantaneous secrecy rate. IEEE Transactions on Wireless Communications,15(2), 1076–1085.CrossRef
26.
go back to reference Xiong, K., Wang, B., Jiang, C., & Liu, K. J. R. (2017). A broad beamforming approach for high-mobility communications. IEEE Transactions on Vehicular Technology,66(11), 10546–10550.CrossRef Xiong, K., Wang, B., Jiang, C., & Liu, K. J. R. (2017). A broad beamforming approach for high-mobility communications. IEEE Transactions on Vehicular Technology,66(11), 10546–10550.CrossRef
27.
go back to reference Zhu, F., & Yao, M. (2016). Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Transactions on Vehicular Technology,65(3), 1835–1841.CrossRef Zhu, F., & Yao, M. (2016). Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Transactions on Vehicular Technology,65(3), 1835–1841.CrossRef
28.
go back to reference Eltayeb, M. E., Choi, J., Al-Naffouri, T. Y., & Heath, R. W. (2017). Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Transactions on Vehicular Technology,66(9), 8139–8151.CrossRef Eltayeb, M. E., Choi, J., Al-Naffouri, T. Y., & Heath, R. W. (2017). Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Transactions on Vehicular Technology,66(9), 8139–8151.CrossRef
29.
go back to reference Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in rician wiretap channels. IEEE Transactions on Wireless Communications,15(4), 2780–2791.CrossRef Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in rician wiretap channels. IEEE Transactions on Wireless Communications,15(4), 2780–2791.CrossRef
30.
go back to reference Tsai, J. A., Buehrer, R. M., & Woerner, B. D. (2004). BER performance of a uniform circular array versus a uniform linear array in a mobile radio environment. IEEE Transactions on Wireless Communications,3(3), 695–700.CrossRef Tsai, J. A., Buehrer, R. M., & Woerner, B. D. (2004). BER performance of a uniform circular array versus a uniform linear array in a mobile radio environment. IEEE Transactions on Wireless Communications,3(3), 695–700.CrossRef
Metadata
Title
Dispersed beamforming approach for secure communication in UDN
Authors
Garima Chopra
Rakesh Kumar Jha
Sanjeev Jain
Publication date
12-10-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02147-8

Other articles of this Issue 5/2020

Wireless Networks 5/2020 Go to the issue