Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of pote...Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA.The artificial noise jamming and beamforming technologies are applied to improve secure performance.A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper,and the practical imperfect channel state information of both the desired users and the eavesdropper.The formulated non-convex optimization problem is tackled based onS-Procedure and semi-definite programming relaxation.Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving.Moreover,the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers.展开更多
In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial no...In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select...In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions.展开更多
Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(...Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER).展开更多
In this paper,we investigate the secrecy outage performance in simultaneous wireless information and power transfer(SWIPT)systems taking artificial noise assistance into account.Multiple antennas in the source and a s...In this paper,we investigate the secrecy outage performance in simultaneous wireless information and power transfer(SWIPT)systems taking artificial noise assistance into account.Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed.Specifically,the transmitted signal at the source is composed of two parts,where the first part is the information symbols and the other is the noise for the eavesdropper.To avoid making noise in the legitimate receiver,these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver.We derive an approximate closed-form expression for the secrecy outage probability(SOP)by adopting the Gauss-Laguerre quadrature(GLQ)method,where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ.To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system,the asymptotic result of the SOP is also derived.This is tight in the high signal-to-noise ratio region.A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper.Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions.展开更多
In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state informa...In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob.展开更多
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n...In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance.展开更多
This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO)broadcast wiretap system designs in slow fading channel environment.We adopt a beamforming technique with artificial noise ...This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO)broadcast wiretap system designs in slow fading channel environment.We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance.To overcome the complexity of this model,a novel optimization scheme using semiclosed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secure transmission performance.In this article,we detail the procedure of our new method,and conduct some heuristic simulation works.The simulation results reveal how power allocation ratio and information rate influence the multiuser system secure transmission probability and effective secrecy throughput of the multiuser system.We compare the multiuser system security and throughput performance with each user’s performance,which helps us to verify the security ability of our method.Our research results extend the traditional single-user artificial noise design method to multiuser scenarios,and provide ideas for solving the optimization problem of multi-user broadcast communication.展开更多
Turbulence is strongly associated with the vast majority of fluid flows in nature and industry.Traditionally,results given by the direct numerical simulation(DNS)of Navier-Stokes(NS)equations that relate to a famous m...Turbulence is strongly associated with the vast majority of fluid flows in nature and industry.Traditionally,results given by the direct numerical simulation(DNS)of Navier-Stokes(NS)equations that relate to a famous millennium problem are widely regarded as‘reliable’benchmark solutions of turbulence,as long as grid spacing is fine enough(i.e.less than the minimum Kolmogorov scale)and time-step is small enough,say,satisfying the Courant-Friedrichs-Lewy condition(Courant number<1).Is this really true?In this paper a two-dimensional sustained turbulent Kolmogorov flow driven by an external body force governed by the NS equations under an initial condition with a spatial symmetry is investigated numerically by the two numerical methods with detailed comparisons:one is the traditional DNS,the other is the‘clean numerical simulation’(CNS).In theory,the exact solution must have a kind of spatial symmetry since its initial condition is spatially symmetric.However,it is found that numerical noises of the DNS are quickly enlarged to the same level as the‘true’physical solution,which finally destroy the spatial symmetry of the flow field.In other words,the DNS results of the turbulent Kolmogorov flow governed by the NS equations are badly polluted mostly.On the contrary,the numerical noise of the CNS is much smaller than the‘true’physical solution of turbulence in a long enough interval of time so that the CNS result is very close to the‘true’physical solution and thus can remain symmetric,which can be used as a benchmark solution for comparison.Besides,it is found that numerical noise as a kind of artificial tiny disturbances can lead to huge deviations at large scale on the two-dimensional Kolmogorov turbulence governed by the NS equations,not only quantitatively(even in statistics)but also qualitatively(such as spatial symmetry of flow).This highly suggests that fine enough spatial grid spacing with small enough time-step alone could not guarantee the validity of the DNS of the NS equations:it is only a necessary condition but not sufficient.All of these findings might challenge some of our general beliefs in turbulence:for example,it might be wrong in physics to neglect the influences of small disturbances to NS equations.Our results suggest that,from physical point of view,it should be better to use the Landau-Lifshitz-Navier-Stokes(LLNS)equations,which consider the influence of unavoidable thermal fluctuations,instead of the NS equations,to model turbulent flows.展开更多
基金supported in part by the National Natural Science Foundation of China(No.62061030,61661028,62031012,62071223,and 61701501)in part by the Young Elite Scientist Sponsorship Program by CAST and the National Key Research and Development Project of China(2018YFB1404303,2018YFB14043033,and 2018YFB1800801)+1 种基金in part by the Natural Science Foundation of Jiangsu Province(BK20170287)by Open Fund of IPOC(BUPT),and by Young Talents of Xuzhou Science and Technology Plan Project(KC19051).
文摘Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA.The artificial noise jamming and beamforming technologies are applied to improve secure performance.A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper,and the practical imperfect channel state information of both the desired users and the eavesdropper.The formulated non-convex optimization problem is tackled based onS-Procedure and semi-definite programming relaxation.Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving.Moreover,the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers.
基金supported by the National Natural Science Foundation of China(No.61501507)the Jiangsu Provincial Natural Science Foundation of China(No.BK20150719)the China Postdoctoral Science Foundation(No.2017M610066)
文摘In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
基金The National Natural Science Foundation of China(No.61271207,61372104)the Science and Technology Project of SGCC(No.SGRIXTKJ[2015]349)
文摘In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions.
基金Science Foundation of China under Grant No.61871032in part by the Chinese Ministry of Education-China Mobile Communication Corporation Research Fund under Grant MCM20170101+1 种基金the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant 20KJB510036the Guangxi Key Laboratory of Multimedia Communications and Network Technology under Grant KLF-2020-03。
文摘Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER).
基金the Hebei Key and Research Program,China(No.19255901D)。
文摘In this paper,we investigate the secrecy outage performance in simultaneous wireless information and power transfer(SWIPT)systems taking artificial noise assistance into account.Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed.Specifically,the transmitted signal at the source is composed of two parts,where the first part is the information symbols and the other is the noise for the eavesdropper.To avoid making noise in the legitimate receiver,these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver.We derive an approximate closed-form expression for the secrecy outage probability(SOP)by adopting the Gauss-Laguerre quadrature(GLQ)method,where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ.To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system,the asymptotic result of the SOP is also derived.This is tight in the high signal-to-noise ratio region.A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper.Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFB1804900in part by the National Natural Science Foundation of China under Grant 92067201,U1805262,62071247,62071249,62171240+2 种基金in part by the Jiangsu Provincial Key Research and Development Program of China under Grant BE2020084-5in part by Special Funds of the Central Government Guiding Local Science and Technology Development under Grant 2021L3010in part by Key provincial scientific and technological innovation projects under Grant 2021G02006.
文摘In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob.
基金supported by the National Science Foundation of China under Grant 62001517in part by the Research Project of Space Engineering University under Grants 2020XXAQ01 and 2019XXAQ05,and in part by the Science and Technology Innovation Cultivation Fund of Space Engineering University.
文摘In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance.
基金National Natural Science Foundation of China(61601425)。
文摘This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO)broadcast wiretap system designs in slow fading channel environment.We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance.To overcome the complexity of this model,a novel optimization scheme using semiclosed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secure transmission performance.In this article,we detail the procedure of our new method,and conduct some heuristic simulation works.The simulation results reveal how power allocation ratio and information rate influence the multiuser system secure transmission probability and effective secrecy throughput of the multiuser system.We compare the multiuser system security and throughput performance with each user’s performance,which helps us to verify the security ability of our method.Our research results extend the traditional single-user artificial noise design method to multiuser scenarios,and provide ideas for solving the optimization problem of multi-user broadcast communication.
文摘Turbulence is strongly associated with the vast majority of fluid flows in nature and industry.Traditionally,results given by the direct numerical simulation(DNS)of Navier-Stokes(NS)equations that relate to a famous millennium problem are widely regarded as‘reliable’benchmark solutions of turbulence,as long as grid spacing is fine enough(i.e.less than the minimum Kolmogorov scale)and time-step is small enough,say,satisfying the Courant-Friedrichs-Lewy condition(Courant number<1).Is this really true?In this paper a two-dimensional sustained turbulent Kolmogorov flow driven by an external body force governed by the NS equations under an initial condition with a spatial symmetry is investigated numerically by the two numerical methods with detailed comparisons:one is the traditional DNS,the other is the‘clean numerical simulation’(CNS).In theory,the exact solution must have a kind of spatial symmetry since its initial condition is spatially symmetric.However,it is found that numerical noises of the DNS are quickly enlarged to the same level as the‘true’physical solution,which finally destroy the spatial symmetry of the flow field.In other words,the DNS results of the turbulent Kolmogorov flow governed by the NS equations are badly polluted mostly.On the contrary,the numerical noise of the CNS is much smaller than the‘true’physical solution of turbulence in a long enough interval of time so that the CNS result is very close to the‘true’physical solution and thus can remain symmetric,which can be used as a benchmark solution for comparison.Besides,it is found that numerical noise as a kind of artificial tiny disturbances can lead to huge deviations at large scale on the two-dimensional Kolmogorov turbulence governed by the NS equations,not only quantitatively(even in statistics)but also qualitatively(such as spatial symmetry of flow).This highly suggests that fine enough spatial grid spacing with small enough time-step alone could not guarantee the validity of the DNS of the NS equations:it is only a necessary condition but not sufficient.All of these findings might challenge some of our general beliefs in turbulence:for example,it might be wrong in physics to neglect the influences of small disturbances to NS equations.Our results suggest that,from physical point of view,it should be better to use the Landau-Lifshitz-Navier-Stokes(LLNS)equations,which consider the influence of unavoidable thermal fluctuations,instead of the NS equations,to model turbulent flows.