Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone
- Authors: Giti, Jishan , Sakzad, Amin , Srinivasan, Bala , Kamruzzaman, Joarder , Gaire, Raj
- Date: 2020
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 165, no. (2020), p.
- Full Text: false
- Reviewed:
- Description: In this paper, we consider deceptive friendly jammers in a half-duplex random wireless network against a group of adaptive eavesdroppers. The destinations, eavesdroppers and friendly jammers are distributed according to homogeneous Poisson point process (HPPP). To the best of our knowledge, we are the first to study such a system model. As we may combine hostile jamming and passive eavesdropping, the secrecy of legitimate communication might be compromised. To combat this and improve secrecy of transmission, a group of friendly jammers thus transmit a source-like signal to deceive the eavesdroppers and try to force them to be passive listeners as much as possible. We derive the secrecy capacity for this scenario. The secrecy performance is evaluated for different parameters and with a secrecy protected zone surrounding the source. Performance evaluation through illustrative numerical results demonstrates that the friendly jammers can enhance the secrecy of a random wireless network. The advantages of friendly jammers are particularly prominent if the secrecy protected zone is very small and/or the node intensity of the destinations is low. The results show that the friendly jammers can restore the secrecy in a hostile environment if sufficient friendly jammers (e.g., 0.01 km−2 for the provided system model) are hired. © 2020
- Description: Funding details: Australian Research Council, ARC Funding text 1: Joarder Kamruzzaman received the BSc and MSc degrees in Electrical and Electronic Engineering from Bangladesh University of Engineering and Technology, Dhaka, and the PhD degree in Information Systems Engineering from Muroran Institute of Technology, Hokkaido, Japan. He is currently a Professor in the School of Science, Engineering and Information Technology, Federation University Australia. Previously, he served as the Director of the Centre for Multimedia Computing, Communications and Artificial Intelligence Research hosted first by Monash University and later by Federation University. His research interests include distributed computing, Internet of Things, machine learning and cyber security. He has published 260+ peer-reviewed publications which include over 80 journal papers, 170 conferences, 11 book chapters and two edited reference books. He is the recipient of Best Paper award in four international conferences: ICICS′15, Singapore; APCC′14, Thailand; IEEE WCNC′10, Sydney, Australia and in the IEEE-ICNNSP′03, Nanjing, China. He has received nearly A$2.3m competitive research funding, including prestigious ARC (Australian Research Council) grant and large CRC (Collaborative Research Centre) grant. He was the founding Program co-Chair of the first International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys), China in 2015. He has served 32 conferences in leadership capacities including Program co-Chair, Publicity Chair, Track Chair and Session Chairs, and since 2012 as an Editor of the Elsevier Journal of Network and Computer Applications, and had served as the lead Guest of Elsevier Journal Future Generation Computer Systems.
Exclusive use spectrum access trading models in cognitive radio networks : A survey
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2017
- Type: Text , Journal article , Review
- Relation: IEEE Communications Surveys and Tutorials Vol. 19, no. 4 (2017), p. 2192-2231
- Full Text: false
- Reviewed:
- Description: Spectrum frequency is a valuable resource for wireless communication but very limited in its availability. Due to the extensive use and ever increasing demand of spectrum bands by wireless devices and newer applications, unlicensed band is becoming congested, while licensed bands are found mostly underutilized. To solve this problem of spectrum scarcity, cognitive radio (CR) devices can share licensed bands opportunistically in several ways. We analyze the three main dynamic sharing models (commons, shared-use, and exclusive-use) proposed in literature with extensive analysis of the exclusive-use model, which is the most promising as it provides benefits to both licensed and unlicensed users. In this model, CR-enabled service providers, also known as secondary service providers, can buy or lease spectrum from licensed, known as primary service providers, for both short and long duration and gain exclusive rights to access the spectrum. In this survey paper, exclusive-use trading approaches, namely, game theory, market equilibrium, and classical, hybrid and other models are reviewed extensively and their characteristics and differences are highlighted and compared. We also propose possible future research directions on exclusive-use CR model. © 1998-2012 IEEE.
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Authors: Giti, Jishan , Srinivasan, Bala , Kamruzzaman, Joarder
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 2017 IEEE Globecom Workshops, 36th IEEE Global Communications Conference; Singapore, Singapore; 4th-8th December 2017
- Full Text: false
- Reviewed:
- Description: We consider the problem of security in wireless multicasting for a multiple-input multiple-output (MIMO) relay-aided system. The network suffers from a group of adaptive eavesdroppers who can act as both simple eavesdroppers and hostile jammers. This paper formulates the impact of friendly jammers to improve secured communication. We derived the expressions for secrecy multicast capacities considering the absence and presence of friendly jammers. The best relay for transmission is chosen from a group of relays that aids to achieve the maximum secrecy capacity while the best jammer is selected based on competitive interference price. Numerical results show that the achievable secrecy multicast capacity increases significantly in the presence of jammer to nullify the effect of adversaries. Results under different scenarios of varying jamming and relay powers demonstrate the efficacy of friendly jammers in providing physical layer security.
- Description: We consider the problem of security in wireless multicasting for a
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2015
- Type: Text , Journal article
- Relation: Computer Networks Vol. 84, no. (2015), p. 17-31
- Full Text:
- Reviewed:
- Description: In the exclusive-use model of spectrum trading, cognitive radio devices or secondary users can buy spectrum resources from licensed users or primary users for a short or long period of time. Considering such spectrum access, a trading model is introduced where a buyer can select a set of candidate sellers based on their reputation and their offers in fulfilling its requirements, namely, offered signal quality, contract duration, coverage and bandwidth. Similarly, a seller can assess a buyer as a potential trading partner considering the buyer's reliability, which the seller can derive from the buyer's reputation and financial profile. In our scheme, seller reputation or buyer reliability can be either obtained from a reputation brokerage service, if one exists, or calculated using our model. Since in a competitive market, the price of a seller depends on that of other sellers, game theory is used to model the competition among multiple sellers. An optimization technique is used by a buyer to select the best seller(s) and optimize purchase to maximize its utility. This may result in buying from multiple sellers of certain amount of bandwidth from each, depending on price and meeting requirements and budget constraints. Stability of the model is analyzed and performance evaluation shows that it benefits sellers and buyers in terms of profit and throughput, respectively. © 2015 Elsevier B.V. All rights reserved.
Security and privacy issues in RFID systems
- Authors: Kamruzzaman, Joarder , Azad, Arman , Karmakar, Nemai , Karmakar, Gour , Srinivasan, Bala
- Date: 2012
- Type: Text , Book chapter
- Relation: Advanced RFID Systems, Security, and Applications Chapter 2 p. 16-40
- Full Text: false
- Reviewed:
- Description: Security and privacy protection are very critical requirements for the widespread deployment of RFID technologies for commercial applications. In this chapter, the authors first present the security and privacy requirement of any commercial system, and then highlight the security and privacy threats that are unique to an RFID system. The security and privacy preserving protocols for RFID system proposed in literature are elaborately discussed, analyzing their strengths, vulnerabilities, and implementation issues. The open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications, are also presented.
Query processing over distributed heterogeneous sensor networks in Future Internet : Scalable architecture and challenges
- Authors: Azad, Arman , Kamruzzaman, Joarder , Srinivasan, Bala , Alam, K. , Pervin, Shaila
- Date: 2010
- Type: Text , Conference paper
- Relation: Second International Conference on Advances in Future Internet p. 75-81
- Full Text: false
- Reviewed:
- Description: The wireless networked sensors embedded with everyday objects will become an integral part of Future Internet, where the interaction among people, computer and those objects will shift the current Internet to a new paradigm, namely the Internet of Things. The terabyte torrent of data generated by billions of sensors belonging to a large number of distributed heterogeneous sensor networks in Future Internet will only be valuable if they can be effectively used on purpose, which leads to the necessity of an Internet scale query processing framework. In this paper, firstly, we focus on the distinct challenges present in Internet scale query processing over distributed sensor networks. Then, we propose a flexible and scalable system architecture capable of handling the complex scenario that might arise from the integration of a large number of such networks in Future Internet. Finally, we discuss the overall query processing methodology over such system and present some directions on the possible solutions to a number of identified research challenges. The outcome of this paper would foster the sensor network research in Future Internet domain