期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Secure Transmission for NOMA Systems with Imperfect SIC 被引量:3
1
作者 Zhongwu Xiang Xiaobing Tong yueming cai 《China Communications》 SCIE CSCD 2020年第11期67-78,共12页
This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A p... This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A power allocation scheme is designed for the legitimate users to mitigate the effect of the SIC error caused by imperfect SIC.For characterizing the secrecy performance of the NOMA system,the closed-form expressions for connection outage probability(COP),secrecy outage probability(SOP),and effective secrecy throughput(EST)are derived over Nakagami-m fading channels in both NOMA and benchmark orthogonal multiple access(OMA)systems.We also provide security and reliability trade-off results(SRT)for the users in the NOMA and OMA systems.Simulation results verify our analysis and show that the strong users achieve better secrecy performance but worse reliability performance and NOMA outperforms OMA in terms of SRT. 展开更多
关键词 physical layer security non-orthogonal multiple access imperfect SIC security and reliability trade-off
下载PDF
Minimizing Age of Information in the Uplink Multi-User Networks via Dynamic Bandwidth Allocation 被引量:2
2
作者 Zeyuan Zhu Xinrong Guan +2 位作者 Baoquan Yu Tian Yu yueming cai 《China Communications》 SCIE CSCD 2023年第4期287-301,共15页
Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamicall... Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamically to improve the information freshness of the short packet based uplink status updates,which is characterized by a recently proposed metric,age of information(Ao I).We first design a status update scheme with channel distribution information(CDI).By relaxing the hard bandwidth constraint and introducing a Lagrangian multiplier,we first decouple the multi-MTCD bandwidth allocation problem into a single MTCD Markov decision process(MDP).Under the MDP framework,after variable substitution,we obtain the single-MTCD status update scheme by solving a linear programming problem.Then,we adjust the Lagrangian multiplier to make the obtained scheme satisfy the relaxed bandwidth constraint.Finally,a greedy policy is built on the proposed scheme to adjust the bandwidth allocation in each slot to satisfy the hard bandwidth constraint.In the unknown environment without CDI,we further design a bandwidth allocation scheme which only maximizes the expected sum Ao I drop within each time slot.Simulation results show that in terms of AoI,the proposed schemes outperform the benchmark schemes. 展开更多
关键词 Internet of Things age of information short packet communications bandwidth allocation
下载PDF
Secure Transmission in Cognitive Radio Networks Using Full-Duplex Technique with Outdated CSI 被引量:1
3
作者 Zhihui Shang Tao Zhang +2 位作者 Guojie Hu yueming cai Weiwei Yang 《China Communications》 SCIE CSCD 2023年第1期230-245,共16页
This paper investigates the effects of the outdated channel state information(CSI)on the secrecy performance of an underlay spectrum sharing cognitive radio networks(CRNs),where the secondary user(SU)source node(Alice... This paper investigates the effects of the outdated channel state information(CSI)on the secrecy performance of an underlay spectrum sharing cognitive radio networks(CRNs),where the secondary user(SU)source node(Alice)aims to transmit the trusted messages to the full-duplex(FD)aided SU receiver(Bob)with the assistance of cooperative relay(Relay).Considering the impact of feedback delay,outdated CSI will aggravate the system performance.To tackle such challenge,the collaborative zero-forcing beamforming(ZFB)scheme of FD technique is further introduced to implement jamming so as to confuse the eavesdropping and improve the security performance of the system.Under such setup,the exact and asymptotic expressions of the secrecy outage probability(SOP)under the outdated CSI case are derived,respectively.The results reveal that i)the outdated CSI of the SU transmission channel will decrease the diversity gain from min(NANR,NRNB)to NRwith NA,NRand NBbeing the number of antennas of Alice,Relay and Bob,respectively,ii)the introduction of FD technique can improve coding gain and enhance system performance. 展开更多
关键词 cognitive radio network physical layer security full-duplex multiple antennas relay secrecy outage probability outdated CSI
下载PDF
Proactive Spectrum Monitoring for Suspicious Wireless Powered Communications in Dynamic Spectrum Sharing Networks 被引量:1
4
作者 Yu Zhang Guojie Hu yueming cai 《China Communications》 SCIE CSCD 2021年第12期119-138,共20页
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm... This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network. 展开更多
关键词 proactive spectrum monitoring sum er-godic monitoring rate jamming-assisted proactive spectrum monitoring HALF-DUPLEX fundamental trade-off dynamic spectrum sharing network
下载PDF
Secure Short-Packet Transmission in Uplink Massive MU-MIMO Assisted URLLC Under Imperfect CSI 被引量:1
5
作者 Tian Yu Xiaoli Sun +1 位作者 yueming cai Zeyuan Zhu 《China Communications》 SCIE CSCD 2023年第12期196-211,共16页
Ultra-reliable and low-latency communication(URLLC)is still in the early stage of research due to its two strict and conflicting requirements,i.e.,ultra-low latency and ultra-high reliability,and its impact on securit... Ultra-reliable and low-latency communication(URLLC)is still in the early stage of research due to its two strict and conflicting requirements,i.e.,ultra-low latency and ultra-high reliability,and its impact on security performance is still unclear.Specifically,short-packet communication is expected to meet the delay requirement of URLLC,while the degradation of reliability caused by it makes traditional physical-layer security metrics not applicable.In this paper,we investigate the secure short-packet transmission in uplink massive multiuser multiple-inputmultiple-output(MU-MIMO)system under imperfect channel state information(CSI).We propose an artificial noise scheme to improve the security performance of the system and use the system average secrecy throughput(AST)as the analysis metric.We derive the approximate closed-form expression of the system AST and further analyze the system asymptotic performance in two regimes.Furthermore,a one-dimensional search method is used to optimize the maximum system AST for a given pilot length.Numerical results verify the correctness of theoretical analysis,and show that there are some parameters that affect the tradeoff between security and latency.Moreover,appropriately increasing the number of antennas at the base station(BS)and transmission power at user devices(UDs)can increase the system AST to achieve the required threshold. 展开更多
关键词 average secrecy throughput imperfect CSI massive MU-MIMO physical-layer security short-packet
下载PDF
Social-Aware Joint Mode Selection and Link Allocation for Device-to-Device Communication Underlaying Cellular Networks 被引量:1
6
作者 Lianxin Yang Dan Wu +2 位作者 Hongkui Shi Yanshan Long yueming cai 《China Communications》 SCIE CSCD 2018年第8期92-107,共16页
Joint mode selection and link allocation are crucial to achieve the advantage of Device-to-Device(D2 D) communications in improving spectral efficiency. In practice, cellular users tend to not be totally altruistic or... Joint mode selection and link allocation are crucial to achieve the advantage of Device-to-Device(D2 D) communications in improving spectral efficiency. In practice, cellular users tend to not be totally altruistic or absolutely selfish. How to stimulate them to devote their links and how to allocate their links to D2 D pair candidates efficiently are two main challenges. In this paper, we encourage cellular users through the variable payment with regard to the social tie strength between cellular users and D2 D pair candidates. In particular, the social tie strength is inferred through a graph inference model and its impact on the payment is quantified as a negative exponential function. Then, we propose a resource scheduling optimization model based on the non-transferable utility coalition formation game, and a distributed coalition formation algorithm based on the Pareto preference and merge-and-split rule. From them, the final coalition structure is obtained, which reflects the strategy of mode selection and link allocation. Numerical results are presented to verify the effectiveness of our proposed scheme. 展开更多
关键词 D2D communication mode selection link allocation social ties coalition formation game
下载PDF
Resource Allocation for Massive Machine Type Communications in the Finite Blocklength Regime 被引量:1
7
作者 Baoquan Yu Dan Wu +2 位作者 yueming cai Yan Wu Zhongwu Xiang 《China Communications》 SCIE CSCD 2021年第3期240-250,共11页
Massive machine type communications(mMTC)have been regarded as promising applications in the future.One main feature of mMTC is short packet communication.Different from traditional long packet communication,short pac... Massive machine type communications(mMTC)have been regarded as promising applications in the future.One main feature of mMTC is short packet communication.Different from traditional long packet communication,short packet communication suffers from transmission rate degradation and a significant error rate is introduced.In this case,traditional resource allocation scheme for mMTC is no longer applicable.In this paper,we explore resource allocation for cellular-based mMTC in the finite blocklength regime.First,to mitigate the load of the base station(BS),we establish a framework for cellularbased mMTC,where MTCGs reuse the resources of cellular users(CUs),aggregate the packets generated by MTCDs,and forward them to the BS.Next,we adopt short packet theory to obtain the minimum required blocklength of a packet that transmits a certain amount of information.Then,by modeling the process of MTCGs-assisted communication as a queuing process,we derive the closed-form expression of the average delay of all MTCDs.Guided by this,we propose a joint power allocation and spectrum sharing scheme to minimize the average delay.Finally,the simulation results verify the correctness of the theoretical results and show that the proposed scheme can reduce the average delay efficiently. 展开更多
关键词 resource allocation machine type communications finite blocklength
下载PDF
Relay-Assisted Secure Short-Packet Transmission in Cognitive IoT with Spectrum Sensing
8
作者 Yong Chen Yu Zhang +2 位作者 Baoquan Yu Tao Zhang yueming cai 《China Communications》 SCIE CSCD 2021年第12期37-50,共14页
Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper... Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper proposes a relay-assisted maximum ratio combining/zero forcing beamforming(MRC/ZFB)scheme to guarantee the secrecy perfor-mance of dual-hop short-packet communications in cognitive IoT.This paper analyzes the average secrecy throughput of the system and further investigates two asymptotic scenarios with the high signal-to-noise ra-tio(SNR)regime and the infinite blocklength.In ad-dition,the Fibonacci-based alternating optimization method is adopted to jointly optimize the spectrum sensing blocklength and transmission blocklength to maximize the average secrecy throughput.The nu-merical results verify the impact of the system pa-rameters on the tradeoff between the spectrum sensing blocklength and transmission blocklength under a se-crecy constraint.It is shown that the proposed scheme achieves better secrecy performance than other bench-mark schemes. 展开更多
关键词 cognitive Internet of Things short-packet communications physical layer security spectrum sensing
下载PDF
Reliable Multicast with Network Coding in Lossy Wireless Networks
9
作者 Wei Yan Shengyu Yu yueming cai 《International Journal of Communications, Network and System Sciences》 2010年第10期816-820,共5页
To reduce the feedbacks between access point and all nodes in lossy wireless networks, a clustered system model consisting of a cluster head and multiple common nodes is investigated. Network coding has been proposed ... To reduce the feedbacks between access point and all nodes in lossy wireless networks, a clustered system model consisting of a cluster head and multiple common nodes is investigated. Network coding has been proposed for more efficient retransmissions in reliable multicast. However, in existing schemes the access point retransmits coded packets, which causes severe delay and considerable feedbacks. In this paper, an XOR scheme based on clustered model is presented. For this scheme, the cluster head broadcasts combined packets by XORing lost packets appropriately to recover lost packets locally. We also analyze the performance in terms of expected number of transmissions. Simulation results verify theoretic analysis. And our results show that proposed XOR offers a compromise between ARQ and random linear network coding. 展开更多
关键词 MULTICAST Network CODING ARQ WIRELESS
下载PDF
Multi-channel DMA Based Design of Voltage Monitoring Using Synchronous Frequency Trace-Sampling Technique
10
作者 Yuan Lei Li Lei +4 位作者 Lei Xia Mingxiang Liu yueming cai Jingtao Zhao Mengyue Li 《Modern Electronic Technology》 2020年第2期17-20,共4页
In order to eliminate the influence of frequency change on real-time voltage acquisition,a low-cost solution of voltage monitoring was proposed using the multi-channel DMA synchronous frequency trace-sampling techniqu... In order to eliminate the influence of frequency change on real-time voltage acquisition,a low-cost solution of voltage monitoring was proposed using the multi-channel DMA synchronous frequency trace-sampling technique.In-chip resources of the designed voltage monitor were fully utilized in hardware design to reduce external devices.The MQX RTOS was used to perform the functional tasks flexibly and efficiently;especially the Ethernet communication applications and USB device connection were realized using its TCP/IP protocol stack and USB driver.In addition,to ensure the safety of electrical records,data statistics and alarm information management were also implemented through the management of the storage in FLASH.The test results show that the voltage monitor designed in this paper has the advantages of accurate measurement,strong resistance to frequency interference and low cost,and can be widely applied in the field of voltage monitoring in distribution networks. 展开更多
关键词 Voltage monitoring DMA Synchronous sampling Frequency tracing-sampling MQX RTOS
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部