Please wait a minute...
Tsinghua Science and Technology  2021, Vol. 26 Issue (4): 523-535    doi: 10.26599/TST.2020.9010020
    
A Cross-Layer Cooperative Jamming Scheme for Social Internet of Things
Yan Huo*(),Jingjing Fan(),Yingkun Wen(),Ruinian Li()
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Department of Computer Science, Bowling Green State University, Bowling Green, OH 43403, USA.
Download: PDF (5555 KB)      HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

In this paper, we design a friendly jammer selection scheme for the social Internet of Things (IoT). A typical social IoT is composed of a cellular network with underlaying Device-to-Device (D2D) communications. In our scheme, we consider signal characteristics over a physical layer and social attribute information of an application layer simultaneously. Using signal characteristics, one of the D2D gadgets is selected as a friendly jammer to improve the secrecy performance of a cellular device. In return, the selected D2D gadget is allowed to reuse spectrum resources of the cellular device. Using social relationship, we analyze and quantify the social intimacy degree among the nodes in IoT to design an adaptive communication time threshold. Applying an artificial intelligence forecasting model, we further forecast and update the intimacy degree, and then screen and filter potential devices to effectively reduce the detection and calculation costs. Finally, we propose an optimal scheme to integrate the virtual social relationship with actual communication systems. To select the optimal D2D gadget as a friendly jammer, we apply Kuhn-Munkres (KM) algorithm to solve the maximization problem of social intimacy and cooperative jamming. Comprehensive numerical results are presented to validate the performance of our scheme.



Key wordsInternet of Things (IoT)      artificial intelligence      Device-to-Device (D2D) communications      social network      cooperative jamming     
Received: 22 April 2020      Published: 12 January 2021
Fund:  National Natural Science Foundation of China(61871023);Beijing Natural Science Foundation(4202054)
Corresponding Authors: Yan Huo     E-mail: yhuo@bjtu.edu.cn;18120050@bjtu.edu.cn;wenyingkun@bjtu.edu.cn;lir@bgsu.edu
About author: Yan Huo received the BEng and PhD degrees in communication and information system from Beijing Jiaotong University, Beijing, China in 2004 and 2009, respectively. He has been a faculty member at the School of Electronics and Information Engineering, Beijing Jiaotong University since 2011, where he is currently a professor. His current research interests include wireless communication theory, security and privacy, cognitive radio, and signal processing. He is a senior member of IEEE.|Jingjing Fan received the BEng degree from Beijing Jiaotong University, Beijing, China in 2018. She is currently a master student in Beijing Jiaotong University. Her research interests include wireless networks, social networks, and physical layer security.|Yingkun Wen received the BS degree from North China Electric Power University, Baoding, China in 2015. He is currently pursuing the PhD degree in the School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China. His current research interests include cognitive radio networks, physical layer security, and cooperative communication.|Ruinian Li received the PhD degree in computer science from the George Washington University in 2018. He is currently an assistant professor at the Department of Computer Science, Bowling Green State University (BGSU), USA. His research interests include security and privacy-preserving computations, applied cryptography, and blockchain technology. He has been working in a wide area of social networks, auction systems, and IoT, and his work has been published in top-tier journals, such as IEEE Transactions on Services Computing, and IEEE Transactions on Network Science and Engineering.
Cite this article:

Yan Huo,Jingjing Fan,Yingkun Wen,Ruinian Li. A Cross-Layer Cooperative Jamming Scheme for Social Internet of Things. Tsinghua Science and Technology, 2021, 26(4): 523-535.

URL:

http://tst.tsinghuajournals.com/10.26599/TST.2020.9010020     OR     http://tst.tsinghuajournals.com/Y2021/V26/I4/523

Fig. 1 Heterogeneous IoT system supporting D2D communication.
NotationDescription
Ci, DjThe i-th cellular device and the j-th D2D transmitter, respectively
hcbi, hcei, hcd𝑖𝑗, hdbj, hdej, hddjChannel fading from Ci and Dj to the MBS, the eavesdropper, and the D2D receiver
αPath loss factor
σ2Variance of additive white Gaussian noise
αij, ΩBinary matching indicator and its set of cooperative jamming
pci, pdjTransmission power of Ci and Dj, respectively
γcbi, γcei, γddjReceived Signal to Interference plus Noise Ratio (SINR) at the MBS, the eavesdropper, and the D2D receiver
Rci,RdjAchievable data rate of Ci and Dj, respectively
ωPh𝑖𝑗, ωSo𝑖𝑗, ucd𝑖𝑗Utility of physical, social, and physical-social layers, respectively
Table 1 Notation and the corresponding description.
Fig. 2 Framework of proposed scheme.
Fig. 3 Framework to update the optimal scheme.
ParameterDescriptionValue
RMaximum cell coverage100 m
DmaxMaximum D2D distance5 m
αPath loss factor4
σ2Noise power10-10 W
NdNumber of D2D gadgets15
pmaxMaximum D2D power30 dBm
RcthThreshold for cellular devices1 bps/Hz
RdthThreshold for D2D gadgets1 bps/Hz
NNumber of repeated experiments100
Table 2 Simulation parameter.
Nc on the sum utility.
">
Fig. 4 Influence of the number of cellular users Nc on the sum utility.
Nc on the sum rate.
">
Fig. 5 Effect of the number of cellular users Nc on the sum rate.
pc on the sum utility.
">
Fig. 6 Effect of the power of cellular users pc on the sum utility.
pc on the sum rate.
">
Fig. 7 Effect of the power of cellular users pc on the sum rate.
[30]   Zhang R., Cheng X., and Yang L., Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks, IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5651-5663, 2016.
[31]   Wang H., Zhao B., and Zheng T., Adaptive full-duplex jamming receiver for secure D2D links in random networks, IEEE Transactions on Communications, vol. 67, no. 2, pp. 1254-1267, 2019.
[32]   Li Q., Ren P., Du Q., Xu D., and Xie Y., Safeguarding NOMA enhanced cooperative D2D communications via friendly jamming, in Proc. of IEEE 90th Vehicular Technology Conference, Honolulu, HI, USA, 2019, pp. 1-5.
[33]   Zhu S., Li W., Li H., Tian L., Luo G., and Cai Z., Coin hopping attack in blockchain-based IoT, IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4614-4626, 2019.
[34]   Wang L., Wu H., Liu L., Song M., and Cheng Y., Secrecy-oriented partner selection based on social trust in device-to-device communications, in Proc. of IEEE International Conference on Communications, London, UK, 2015, pp. 7275-7279.
[35]   Wen Y., Huo Y., Ma L., Jing T., and Gao Q., A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks, IEEE Transactions on Vehicular Technology, vol. 68, no. 4, pp. 3500-3512, 2019.
[36]   Wang H., Xu Y., Huang K., Han Z., and Tsiftsis T. A., Cooperative secure transmission by exploiting social ties in random networks, IEEE Transactions on Communications, vol. 66, no. 8, pp. 3610-3622, 2018.
[37]   Zhao Y., Li Y., Cao Y., Jiang T., and Ge N., Social-aware resource allocation for device-to-device communications underlaying cellular networks, IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6621-6634, 2015.
[38]   Zhao Y. and Song W., Energy-aware incentivized data dissemination via wireless D2D communications with weighted social communities, IEEE Transactions on Green Communications and Networking, vol. 2, no. 4, pp. 945-957, 2018.
[39]   Wang F., Li Y., Wang Z., and Yang Z., Social-community-aware resource allocation for D2D communications underlaying cellular networks, IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3628-3640, 2016.
[40]   He Z., Cai Z., and Yu J., Latent-data privacy preserving with customized data utility for social network data, IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 665-673, 2018.
[41]   Zheng X., Cai Z., Yu J., Wang C., and Li Y., Follow but no track: Privacy preserved profile publishing in cyber-physical social systems, IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1868-1878, 2017.
[1]   Khalfi B., Hamdaoui B., and Guizani M., Extracting and exploiting inherent sparsity for efficient IoT support in 5G: Challenges and potential solutions, IEEE Wireless Communications, vol. 24, no. 5, pp. 68-73, 2017.
[2]   Zhang Y., Wu B., Liu Y., and Lv J., Local community detection based on network motifs, Tsinghua Science and Technology, vol. 24, no. 6, pp. 716-727, 2019.
[42]   Wang J., Cai Z., and Yu J., Achieving personalized k-anonymity-based content privacy for autonomous vehicles in CPS, IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4242-4251, 2020.
[43]   Yi C., Huang S., and Cai J., An incentive mechanism integrating joint power, channel and link management for social-aware D2D content sharing and proactive caching, IEEE Transactions on Mobile Computing, vol. 17, no. 4, pp. 789-802, 2018.
[44]   Wu D., Zhou L., Cai Y., Chao H., and Qian Y., Physical-social-aware D2D content sharing networks: A provider-demander matching game, IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7538-7549, 2018.
[45]   Sun Y., Wang T., Song L., and Han Z., Efficient resource allocation for mobile social networks in D2D communication underlaying cellular networks, in Proc. of IEEE International Conference on Communications, Sydney, Australia, 2014, pp. 2466-2471.
[46]   Alwakeel M. and Aalo V. A., A teletraffic performance study of mobile LEO-satellite cellular networks with Gamma distributed call duration, IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 583-596, 2006.
[47]   Zhang H., Wang Z., and Du Q., Social-aware D2D relay networks for stability enhancement: An optimal stopping approach, IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8860-8874, 2018.
[3]   Cai Z. and Zheng X., A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Transactions on Network Science and Engineering, vol. 7, no. 2, pp. 766-775, 2020.
[4]   Mao J., Zhang Y., Li P., Li T., Wu Q., and Liu J., A position-aware merkle tree for dynamic cloud data integrity verification, Soft Computing, vol. 21, no. 8, pp. 2151-2164, 2017.
[5]   Waqas M., Niu Y., Li Y., Ahmed M., Jin D., Chen S., and Han Z., Mobility-aware device-to-device communications: Principles, practice and challenges, IEEE Communications Surveys & Tutorials, .
doi: 10.1109/COMST.2019.2923708
[6]   Zheng X. and Cai Z., Privacy-preserved data sharing towards multiple parties in industrial IoTs, IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 968-979, 2020.
[7]   Jameel F., Hamid Z., Jabeen F., Zeadally S., and Javed M. A., A survey of device-to-device communications: Research issues and challenges, IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133-2168, 2018.
[8]   Ansari R., Chrysostomou C., Hassan S. A., Guizani M., Mumtaz S., Rodriguez J., and Rodrigues J., 5G D2D networks: Techniques, challenges, and future prospects, IEEE Systems Journal, vol. 12, no. 4, pp. 3970-3984, 2018.
[9]   Xing X., Jing T., Cheng W., Huo Y., and Cheng X., Spectrum prediction in cognitive radio networks, IEEE Wireless Communications, vol. 20, no. 2, pp. 90-96, 2013.
[10]   Stine J. A. and Bastidas C. E. C., Enabling spectrum sharing via spectrum consumption models, IEEE Journal on Selected Areas in Communications, vol. 33, no. 4, pp. 725-735, 2015.
[11]   Zheng X., Cai Z., and Li Y., Data linkage in smart internet of things systems: A consideration from a privacy perspective, IEEE Communications Magazine, vol. 56, no. 9, pp. 55-61, 2018.
[12]   Cai Z. and He Z., Trading private range counting over big IoT data, in Proc. of IEEE 39th International Conference on Distributed Computing Systems, Dallas, TX, USA, 2019, pp. 144-153.
[13]   Jia Y., Chen Y., Dong X., Saxena P., Mao J., and Liang Z., Man-in-the-browser-cache: Persisting https attacks via browser cache poisoning, Computers & Security, vol. 55, pp. 62-80, 2015.
[14]   Huo Y., Tian Y., Ma L., Cheng X., and Jing T., Jamming strategies for physical layer security, IEEE Wireless Communications, vol. 25, no. 1, pp. 148-153, 2018.
[15]   Qiu T., Chen B., Sangaiah A. K., Ma J., and Huang R., A survey of mobile social networks: Applications, social characteristics, and challenges, IEEE Systems Journal, vol. 12, no. 4, pp. 3932-3947, 2018.
[16]   Kong C., Luo G., Tian L., and Cao X., Disseminating authorized content via data analysis in opportunistic social networks, Big Data Mining and Analytics, vol. 2, no. 1, pp. 12-24, 2019.
[17]   Mao J., Tian W., Yang Y., and Liu J., An efficient social attribute inference scheme based on social links and attribute relevance, IEEE Access, vol. 7, pp. 153074-153085, 2019.
[18]   Cai Z., He Z., Guan X., and Li Y., Collective data sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 577-590, 2018.
[19]   Taylor S. J. and Letham B., Forecasting at scale, The American Statistician, vol. 72, no. 1, pp. 37-45, 2018.
[20]   He J. S., Han M., Ji S., Du T., and Li Z., Spreading social influence with both positive and negative opinions in online networks, Big Data Mining and Analytics, vol. 2, no. 2, pp. 100-117, 2019.
[21]   Meng X., Xu G., Guo T., Yang Y., Shen W., and Zhao K., A novel routing method for social delay-tolerant networks, Tsinghua Science and Technology, vol. 24, no. 1, pp. 44-51, 2019.
[22]   Tekin E. and Yener A., The general gaussian multipleaccess and two-way wiretap channels: Achievable rates and cooperative jamming, IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
[23]   Choi Y. and Lee J. H., A new cooperative jamming technique for a two-hop amplify-and-forward relay network with an eavesdropper, IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12447-12451, 2018.
[24]   Chen G., Gong Y., Xiao P., and Chambers J. A., Physical layer network security in the full-duplex relay system, IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 574-583, 2015.
[25]   Nafea M. and Yener A., Secure degrees of freedom for the MIMO wiretap channel with a multi-antenna cooperative jammer, IEEE Transactions on Information Theory, vol. 63, no. 11, pp. 7420-7441, 2017.
[26]   Gao Q., Huo Y., Jing T., Ma L., Wen Y., and Xing X., An intermittent cooperative jamming strategy for securing energy-constrained networks, IEEE Transactions on Communications, vol. 67, no. 11, pp. 7715-7726, 2019.
[27]   Chu Z., Nguyen H. X., Le T. A., Karamanoglu M., Ever E., and Yazici A., Secure wireless powered and cooperative jamming D2D communications, IEEE Transactions on Green Communications and Networking, vol. 2, no. 1, pp. 1-13, 2018.
[28]   Huo Y., Fan X., Ma L., Cheng X., Tian Z., and Chen D., Secure communications in tiered 5G wireless networks with cooperative jamming, IEEE Transactions on Wireless Communications, vol. 18, no. 6, pp. 3265-3280, 2019.
[29]   Shi T., Cai Z., Li J., and Gao H., CROSS: A crowdsourcing based sub-servers selection framework in D2D enhanced MEC architecture, in Proc. of IEEE 40th International Conference on Distributed Computing Systems, Singapore, 2020, pp. 1-11.
[1] Jie Wu, Ning Wang. Approximating Special Social Influence Maximization Problems[J]. Tsinghua Science and Technology, 2020, 25(6): 703-711.
[2] Xinfang Song, Wei Jiang, Xiaohui Liu, Hui Lu, Zhihong Tian, Xiaojiang Du. A Survey of Game Theory as Applied to Social Networks[J]. Tsinghua Science and Technology, 2020, 25(6): 734-742.
[3] Bo Zhao, Pengyuan Zhao, Peiru Fan. ePUF: A Lightweight Double Identity Verification in IoT[J]. Tsinghua Science and Technology, 2020, 25(05): 625-635.
[4] Zheng Wang, Chaokun Wang, Xiaojun Ye, Jisheng Pei, Bin Li. Propagation History Ranking in Social Networks: A Causality-Based Approach[J]. Tsinghua Science and Technology, 2020, 25(02): 161-179.
[5] Zhuojun Duan,Mingyuan Yan,Qilong Han,Lijie Li,Yingshu Li. IoT-Based Cost Saving Offloading System for Cellular Networks[J]. Tsinghua Science and Technology, 2017, 22(4): 379-388.
[6] Wentao Han,Xiaowei Zhu,Ziyan Zhu,Wenguang Chen,Weimin Zheng,Jianguo Lu. A Comparative Analysis on Weibo and Twitter[J]. Tsinghua Science and Technology, 2016, 21(1): 1-16.
[7] Fatima-Zohra Younsi,Ahmed Bounnekar,Djamila Hamdadou,Omar Boussaid. SEIR-SW, Simulation Model of Influenza Spread Based on the Small World Network[J]. Tsinghua Science and Technology, 2015, 20(5): 460-473.
[8] Gong Jibing, Tang Jie, C. M. Fong A.. ACTPred: Activity Prediction in Mobile Social Networks[J]. Tsinghua Science and Technology, 2014, 19(3): 265-274.
[9] Yang Liu,Bin Wu,Hongxu Wang,Pengjiang Ma. BPGM: A Big Graph Mining Tool[J]. Tsinghua Science and Technology, 2014, 19(1): 33-38.
[10] Feng Tan,Li Li,Zheyu Zhang,Yunlong Guo. Latent Co-interests’ Relationship Prediction[J]. Tsinghua Science and Technology, 2013, 18(4): 379-386.