考虑安全因素的无线小蜂窝基站的优化部署

A. Houjeij, W. Saad, T. Başar
{"title":"考虑安全因素的无线小蜂窝基站的优化部署","authors":"A. Houjeij, W. Saad, T. Başar","doi":"10.1109/GLOCOM.2014.7036874","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. In eavesdropping scenarios, we consider the prospective eavesdroppers to be spread over a given region. The SCBSs are then placed in such a way to minimize the eavesdroppers' effect without having any information about their exact locations. In jamming scenarios, we consider a cost constrained jammer to be present in the network. The SCBSs are then placed in order to minimize the effect of the jammer's signal on the quality of the user's transmission. We simulate the developed algorithm for both types of attacks and for various network configurations. Simulation results show that the proposed solution approach yields significant improvements in the spatial SINR of all users when compared with conventional placement techniques.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"11 1","pages":"607-612"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Optimal deployment of wireless small cell base stations with security considerations\",\"authors\":\"A. Houjeij, W. Saad, T. Başar\",\"doi\":\"10.1109/GLOCOM.2014.7036874\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. In eavesdropping scenarios, we consider the prospective eavesdroppers to be spread over a given region. The SCBSs are then placed in such a way to minimize the eavesdroppers' effect without having any information about their exact locations. In jamming scenarios, we consider a cost constrained jammer to be present in the network. The SCBSs are then placed in order to minimize the effect of the jammer's signal on the quality of the user's transmission. We simulate the developed algorithm for both types of attacks and for various network configurations. Simulation results show that the proposed solution approach yields significant improvements in the spatial SINR of all users when compared with conventional placement techniques.\",\"PeriodicalId\":6492,\"journal\":{\"name\":\"2014 IEEE Global Communications Conference\",\"volume\":\"11 1\",\"pages\":\"607-612\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Global Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOCOM.2014.7036874\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Global Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2014.7036874","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文研究了在对抗性异构无线网络中放置小蜂窝基站(SCBSs)的问题。我们考虑一个连续的无线用户面临潜在的窃听和干扰攻击。对于每一种攻击,我们首先为无线用户提出一个合适的实用函数。然后,我们提出了一种新的最优放置算法,用于在考虑潜在安全性的情况下寻找scbs的最优位置。在窃听场景中,我们认为潜在的窃听者分布在给定的区域内。然后,在没有任何关于scbs确切位置的信息的情况下,以这样一种方式放置scbs,以尽量减少窃听者的影响。在干扰情况下,我们考虑网络中存在一个成本受限的干扰器。然后放置scbs是为了尽量减少干扰器信号对用户传输质量的影响。我们针对这两种类型的攻击和各种网络配置模拟了开发的算法。仿真结果表明,与传统的定位技术相比,该方法显著提高了所有用户的空间信噪比。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Optimal deployment of wireless small cell base stations with security considerations
In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. In eavesdropping scenarios, we consider the prospective eavesdroppers to be spread over a given region. The SCBSs are then placed in such a way to minimize the eavesdroppers' effect without having any information about their exact locations. In jamming scenarios, we consider a cost constrained jammer to be present in the network. The SCBSs are then placed in order to minimize the effect of the jammer's signal on the quality of the user's transmission. We simulate the developed algorithm for both types of attacks and for various network configurations. Simulation results show that the proposed solution approach yields significant improvements in the spatial SINR of all users when compared with conventional placement techniques.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Power efficient uplink resource allocation in LTE networks under delay QoS constraints Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks Two-way relaying networks with wireless power transfer: Policies design and throughput analysis Resource management in cognitive opportunistic access femtocells with imperfect spectrum sensing Optimizing rule placement in software-defined networks for energy-aware routing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1