Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming

被引:17
|
作者
Shen, Yulong [1 ]
Zhang, Yuanyu [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
关键词
Big data; Security; Wireless network; Cooperative jamming; Energy balance; PHYSICAL LAYER SECURITY; SECRET COMMUNICATION;
D O I
10.1016/j.ins.2014.05.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communications nowadays are increasingly becoming irreplaceable networking technologies for military, governmental and financial communications where the data is exploding in volume, variety and velocity, called big data. This poses great challenges to ensuring security through cryptography. Recently, cooperative jamming has been proved as a promising physical layer technique to provide the everlasting security for wireless networks. Based on this scheme, this paper proposes a two-hop transmission protocol with parameters l, k, r and tau (2HR-(l, k,r, tau)) to ensure secure and reliable big data transmissions in wireless networks with multiple eavesdroppers. We first determine the relay selection region (RSR) as the square of side-length I centered at the middle point between the source and the destination. Then one of the k best relays located in the RSR is randomly selected as the message relay. During the forwarding in both hops, the remaining relays at least distance r away from the intended receivers and with channel gain to the intended receivers less than tau are selected to generate jamming signals to confuse the eavesdroppers. The results in this paper indicate that our protocol can provide flexible control of security, reliability and the energy balance performance, which characterizes how energy consumption for forwarding message is balanced among all the relays. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:201 / 210
页数:10
相关论文
共 50 条
  • [1] Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks
    Thiagarajan, K.
    Saranya, K.
    Veeraiah, A.
    Sudha, B.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 32 - 36
  • [2] Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks and Markov Process
    Kittappa, Thiagarajan
    Karuppusamy, Saranya
    Alagu, Veeraiah
    Karunakaran, Sarukesi
    Balakrishnan, Sudha
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE, MULTIMEDIA AND COMMUNICATION ENGINEERING (SMCE 2015), 2015, : 211 - 217
  • [3] Cooperative Secure Transmission for Two-Hop Relay Networks With Limited Feedback
    Wang, Dawei
    Ren, Pinyi
    Cheng, Julian
    Wang, Yichen
    Sun, Li
    Du, Qinghe
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [4] Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication
    Lee, Kisong
    Hong, Jun-Pyo
    Choi, Hyun-Ho
    Levorato, Marco
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2793 - 2803
  • [5] Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming
    Zhang, Yuanyu
    Shen, Yulong
    Zhu, Jinxiao
    Jiang, Xiaohong
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 29 (1-4) : 113 - 131
  • [6] Secure Communications via Cooperative Jamming in Two-hop Relay Systems
    Huang, Jing
    Swindlehurst, A. Lee
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [7] Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
    Shen, Yulong
    Zhang, Yuanyu
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2014, 1 (02): : 1 - 19
  • [8] Secure Cooperative Communication via Artificial Noise for Wireless Two-Hop Relaying Networks
    Nan Run Zhou
    Zhi Juan Kang
    Xiao Rong Liang
    [J]. Wireless Personal Communications, 2015, 82 : 1759 - 1771
  • [9] Secure Cooperative Communication via Artificial Noise for Wireless Two-Hop Relaying Networks
    Zhou, Nan Run
    Kang, Zhi Juan
    Liang, Xiao Rong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1759 - 1771
  • [10] Two-hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
    He, Xiang
    Yener, Aylin
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,