Biblio
With the development of location technology, location-based services greatly facilitate people's life . However, due to the location information contains a large amount of user sensitive informations, the servicer in location-based services published location data also be subject to the risk of privacy disclosure. In particular, it is more easy to lead to privacy leaks without considering the attacker's semantic background knowledge while the publish sparse location data. So, we proposed semantic k-anonymity privacy protection method to against above problem in this paper. In this method, we first proposed multi-user compressing sensing method to reconstruct the missing location data . To balance the availability and privacy requirment of anonymity set, We use semantic translation and multi-view fusion to selected non-sensitive data to join anonymous set. Experiment results on two real world datasets demonstrate that our solution improve the quality of privacy protection to against semantic attacks.
In this article, we study the transmission secrecy performance of primary user in overlay cognitive wireless networks, in which an untrusted energy-limited secondary cooperative user assists the primary transmission to exchange for the spectrum resource. In the network, the information can be simultaneously transmitted through the direct and relay links. For the enhancement of primary transmission security, a maximum ratio combining (MRC) scheme is utilized by the receiver to exploit the two copies of source information. For the security analysis, we firstly derive the tight lower bound expression for secrecy outage probability (SOP). Then, three asymptotic expressions for SOP are also expressed to further analyze the impacts of the transmit power and the location of secondary cooperative node on the primary user information security. The findings show that the primary user information secrecy performance enhances with the improvement of transmit power. Moreover, the smaller the distance between the secondary node and the destination, the better the primary secrecy performance.
Moving Target Defence (MTD) has been recently proposed and is an emerging proactive approach which provides an asynchronous defensive strategies. Unlike traditional security solutions that focused on removing vulnerabilities, MTD makes a system dynamic and unpredictable by continuously changing attack surface to confuse attackers. MTD can be utilized in cloud computing to address the cloud's security-related problems. There are many literature proposing MTD methods in various contexts, but it still lacks approaches to evaluate the effectiveness of proposed MTD method. In this paper, we proposed a combination of Shuffle and Diversity MTD techniques and investigate on the effects of deploying these techniques from two perspectives lying on two groups of security metrics (i) system risk: which is the cloud providers' perspective and (ii) attack cost and return on attack: which are attacker's point of view. Moreover, we utilize a scalable Graphical Security Model (GSM) to enhance the security analysis complexity. Finally, we show that combining MTD techniques can improve both aforementioned two groups of security metrics while individual technique cannot.
Recently, the IoT (internet of things) still does not have global policies and standards to govern the interaction and the development of applications. There are huge of security issues relevant to the application layer of IoT becoming very urgent. On the other hand, it is important for addressing the development of security algorithm to protect the IoT system from malicious attack. The service requesters must pay attention to the data how will be used, who and when to apply, even they must have tools to control what data want to be disclosed. In this article, a fusion diversity scheme adopting MRC (maximum ratio combining) scheme with TM (trust management) security algorithm is proposed. In MRC stage, specified parameters first extracted and before combined with the control information they weighted by one estimation value. The fused information forward to the upper layer of IoT technologies in succession after the combination is completed. The simulation results from experiments deployed with physical assessment show that the security has more reliability after the MRC scheme fused into the TM procedure.
In this work, Automatic-Repeat-Request (ARQ) and Maximal Ratio Combination (MRC), have been jointly exploited to enhance the confidentiality of wireless services requested by a legitimate user (Bob) against an eavesdropper (Eve). The obtained security performance is analyzed using Packet Error Rate (PER), where the exact PER gap between Bob and Eve is determined. PER is proposed as a new practical security metric in cross layers (Physical/MAC) security design since it reflects the influence of upper layers mechanisms, and it can be linked with Quality of Service (QoS) requirements for various digital services such as voice and video. Exact PER formulas for both Eve and Bob in i.i.d Rayleigh fading channel are derived. The simulation and theoretical results show that the employment of ARQ mechanism and MRC on a signal level basis before demodulation can significantly enhance data security for certain services at specific SNRs. However, to increase and ensure the security of a specific service at any SNR, adaptive modulation is proposed to be used along with the aforementioned scheme. Analytical and simulation studies demonstrate orders of magnitude difference in PER performance between eavesdroppers and intended receivers.
Massive MIMO and tight cooperation between transmission nodes are expected to become an integral part of a future 5G radio system. As part of an overall interference mitigation scheme substantial gains in coverage, spectral as well as energy efficiency have been reported. One of the main limitations for massive MIMO and coordinated multi-point (CoMP) systems is the aging of the channel state information at the transmitter (CSIT), which can be overcome partly by state of the art channel prediction techniques. For a clean slate 5G radio system, we propose to integrate channel prediction from the scratch in a flexible manner to benefit from future improvements in this area. As any prediction is unreliable by nature, further improvements over the state of the art are needed for a convincing solution. In this paper, we explain how the basic ingredients of 5G like base stations with massive MIMO antenna arrays, and multiple UE antennas can help to stretch today's limits with an approximately 10 dB lower normalized mean square error (NMSE) of the predicted channel. In combination with the novel introduced concept of artificially mutually coupled antennas, adding super-directivity gains to virtual beamforming, robust and accurate prediction over 10 ms with an NMSE of -20 dB up to 15 km/h at 2.6 GHz RF frequency could be achieved. This result has been achieved for measured channels without massive MIMO, but a comparison with ray-traced channels for the same scenario is provided as well.