期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Robust Artificial Noise-Aided Beamforming for A Secure MISO-NOMA Visible Light Communication System 被引量:4
1
作者 Xiaodong Liu Zezong Chen +2 位作者 Yuhao Wang Fuhui Zhou Shuai Ma 《China Communications》 SCIE CSCD 2020年第11期42-53,共12页
Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of pote... Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA.The artificial noise jamming and beamforming technologies are applied to improve secure performance.A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper,and the practical imperfect channel state information of both the desired users and the eavesdropper.The formulated non-convex optimization problem is tackled based onS-Procedure and semi-definite programming relaxation.Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving.Moreover,the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers. 展开更多
关键词 artificial noise non-orthogonal multiple access physical-layer secrecy robust resource allocation visible light communication
下载PDF
Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
2
作者 He-hao NIU Bang-ning ZHANG +2 位作者 Dao-xing GUO Yu-zhen HUANG Ming-yue LU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第6期850-862,共13页
In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial no... In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes. 展开更多
关键词 Simultaneous wireless information and power transfer Physical layer security Relay networks Cooperative beamforming artificial noise
原文传递
Security-Reliability Analysis and Optimization for Cognitive Two-Way Relay Network with Energy Harvesting
3
作者 Luo Yi Zhou Lihua +3 位作者 Dong Jian Sun Yang Xu Jiahui Xi Kaixin 《China Communications》 SCIE CSCD 2024年第11期163-179,共17页
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node... This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm. 展开更多
关键词 artificial noise energy harvesting cognitive two-way relay network hardware impairments physical layer security security-reliability tradeoff self-adaptive quantum particle swarm optimization
下载PDF
Joint jammer and user scheduling scheme for wireless physical-layer security
4
作者 丁晓进 宋铁成 +1 位作者 邹玉龙 陈晓曙 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期261-266,共6页
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select... In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions. 展开更多
关键词 security-reliability tradeoff (SRT) multi-user scheduling artificial noise physical-layer security
下载PDF
Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes 被引量:1
5
作者 Ce Sun Zesong Fei +3 位作者 Bin Li Xinyi Wang Nan Li Lijie Hu 《China Communications》 SCIE CSCD 2021年第9期221-235,共15页
Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(... Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER). 展开更多
关键词 physical layer security polar codes non-orthogonal multiple access artificial noise
下载PDF
Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems 被引量:1
6
作者 Wei-min HOU Qing-shan TANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2020年第11期1651-1660,共10页
In this paper,we investigate the secrecy outage performance in simultaneous wireless information and power transfer(SWIPT)systems taking artificial noise assistance into account.Multiple antennas in the source and a s... In this paper,we investigate the secrecy outage performance in simultaneous wireless information and power transfer(SWIPT)systems taking artificial noise assistance into account.Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed.Specifically,the transmitted signal at the source is composed of two parts,where the first part is the information symbols and the other is the noise for the eavesdropper.To avoid making noise in the legitimate receiver,these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver.We derive an approximate closed-form expression for the secrecy outage probability(SOP)by adopting the Gauss-Laguerre quadrature(GLQ)method,where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ.To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system,the asymptotic result of the SOP is also derived.This is tight in the high signal-to-noise ratio region.A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper.Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions. 展开更多
关键词 artificial noise Multi-antenna systems Secrecy outage probability Simultaneous wireless information and power transfer
原文传递
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI
7
作者 Wenwan Xu Jun Zhang +2 位作者 Shu Cai Jue Wang Yi Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第3期638-644,共7页
In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state informa... In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob. 展开更多
关键词 Reconfigurable intelligent surface MIMO Ergodic secrecy rate Statistical CSI artificial noise
下载PDF
Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks
8
作者 Zeke Wu Kefeng Guo +1 位作者 Rui Liu Shibin Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期583-598,共16页
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n... In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance. 展开更多
关键词 Covert communication the integrated HAPS terrestrial network constant power auxiliary node artificial noise(AN) effective covert communication rate
下载PDF
一种针对基于人工噪声的MU-MISOME保密通信系统的全新优化方案
9
作者 YAO Li LIU Youjiang ZHANG Jian 《太赫兹科学与电子信息学报》 2023年第2期195-202,共8页
This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO)broadcast wiretap system designs in slow fading channel environment.We adopt a beamforming technique with artificial noise ... This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO)broadcast wiretap system designs in slow fading channel environment.We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance.To overcome the complexity of this model,a novel optimization scheme using semiclosed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secure transmission performance.In this article,we detail the procedure of our new method,and conduct some heuristic simulation works.The simulation results reveal how power allocation ratio and information rate influence the multiuser system secure transmission probability and effective secrecy throughput of the multiuser system.We compare the multiuser system security and throughput performance with each user’s performance,which helps us to verify the security ability of our method.Our research results extend the traditional single-user artificial noise design method to multiuser scenarios,and provide ideas for solving the optimization problem of multi-user broadcast communication. 展开更多
关键词 physical layer security artificial noise BEAMFORMING multiuser communication broadcast system
下载PDF
Is a direct numerical simulation(DNS)of Navier-Stokes equations with small enough grid spacing and time-step definitely reliable/correct?
10
作者 Shijie Qin Yu Yang +3 位作者 Yongxiang Huang Xinyu Mei Lipo Wang Shijun Liao 《Journal of Ocean Engineering and Science》 SCIE 2024年第3期293-310,共18页
Turbulence is strongly associated with the vast majority of fluid flows in nature and industry.Traditionally,results given by the direct numerical simulation(DNS)of Navier-Stokes(NS)equations that relate to a famous m... Turbulence is strongly associated with the vast majority of fluid flows in nature and industry.Traditionally,results given by the direct numerical simulation(DNS)of Navier-Stokes(NS)equations that relate to a famous millennium problem are widely regarded as‘reliable’benchmark solutions of turbulence,as long as grid spacing is fine enough(i.e.less than the minimum Kolmogorov scale)and time-step is small enough,say,satisfying the Courant-Friedrichs-Lewy condition(Courant number<1).Is this really true?In this paper a two-dimensional sustained turbulent Kolmogorov flow driven by an external body force governed by the NS equations under an initial condition with a spatial symmetry is investigated numerically by the two numerical methods with detailed comparisons:one is the traditional DNS,the other is the‘clean numerical simulation’(CNS).In theory,the exact solution must have a kind of spatial symmetry since its initial condition is spatially symmetric.However,it is found that numerical noises of the DNS are quickly enlarged to the same level as the‘true’physical solution,which finally destroy the spatial symmetry of the flow field.In other words,the DNS results of the turbulent Kolmogorov flow governed by the NS equations are badly polluted mostly.On the contrary,the numerical noise of the CNS is much smaller than the‘true’physical solution of turbulence in a long enough interval of time so that the CNS result is very close to the‘true’physical solution and thus can remain symmetric,which can be used as a benchmark solution for comparison.Besides,it is found that numerical noise as a kind of artificial tiny disturbances can lead to huge deviations at large scale on the two-dimensional Kolmogorov turbulence governed by the NS equations,not only quantitatively(even in statistics)but also qualitatively(such as spatial symmetry of flow).This highly suggests that fine enough spatial grid spacing with small enough time-step alone could not guarantee the validity of the DNS of the NS equations:it is only a necessary condition but not sufficient.All of these findings might challenge some of our general beliefs in turbulence:for example,it might be wrong in physics to neglect the influences of small disturbances to NS equations.Our results suggest that,from physical point of view,it should be better to use the Landau-Lifshitz-Navier-Stokes(LLNS)equations,which consider the influence of unavoidable thermal fluctuations,instead of the NS equations,to model turbulent flows. 展开更多
关键词 Kolmogorov flow Statistical stability Computational reliability Clean numerical simulation artificial numerical noises
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部