期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Joint jammer and user scheduling scheme for wireless physical-layer security
1
作者 丁晓进 宋铁成 +1 位作者 邹玉龙 陈晓曙 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期261-266,共6页
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select... In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions. 展开更多
关键词 security-reliability tradeoff (SRT) multi-user scheduling artificial noise physical-layer security
下载PDF
Performance of Physical-Layer Network Coding in Asymmetric Two-Way Relay Channels 被引量:3
2
作者 李博 王钢 +3 位作者 Peter H.J.Chong 杨洪娟 Yongliang GUAN 沙学军 《China Communications》 SCIE CSCD 2013年第10期65-73,共9页
In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm... In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry. 展开更多
关键词 physical-layer network coding two-way relay channels asymmetric channels bit error rate
下载PDF
Improving the Covertness in the Physical-Layer Authentication 被引量:2
3
作者 Ning Xie TianXing Hu 《China Communications》 SCIE CSCD 2021年第3期122-131,共10页
A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lo... A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lower robustness.This paper concerns the problem of improving the covertness without sacrificing the robustness.This problem is important because of the following reasons:reducing the errors in recovered source message,improving the security,and ease of constructing a multi-factor authentication system.In this paper,we propose three covert PLA schemes to address the problem.In the first scheme,we improve the covertness by reducing the modification ratio on the source message based on an encoding mechanism.In the second scheme,we improve the covertness by optimizing the superimposing angle,which maximizes the minimum distance between the tagged symbols and the boundary line of the demodulation decision for the source message.In the third scheme,referred to as the hybrid scheme,we further improve the covertness by jointly using the advantages of both the above two schemes.Our experimental results show that when the SNR at a legitimate receiver is 25 dB,as compared with the prior scheme,the first scheme improves the covertness by 17:74%,the second scheme improves the covertness by 28:79%,and the third scheme improves the covertness by 32:09%,while they have similar robustness as Received:Aug.07,2020 Revised:Sep.08,2020 Editor:Nanrun Zhou that of the prior scheme. 展开更多
关键词 physical-layer AUTHENTICATION ENCODING covertness superimposing angle SECURITY
下载PDF
Low Transmission Overhead for Polar Coding Physical-Layer Encryption 被引量:1
4
作者 Hongxu Jin Rongke Liu Chenyu Zhang 《China Communications》 SCIE CSCD 2019年第2期246-256,共11页
In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhanc... In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks. 展开更多
关键词 WIRETAP channel polar codes physical-layer security CRYPTOGRAPHY attack
下载PDF
Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling 被引量:1
5
作者 Ding Xiaojin Song Tiecheng Zhang Gengxin 《Journal of Southeast University(English Edition)》 EI CAS 2019年第3期318-324,共7页
In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pa... In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS. 展开更多
关键词 wireless heterogeneous network physical-layer security source-destination pair scheduling
下载PDF
Spatial-Modulated Physical-Layer Network Coding Based on Block Markov Superposition Transmission for Maritime Relay Communications 被引量:1
6
作者 Yao Shi Liming Zheng +1 位作者 Wenchao Lin Xiao Ma 《China Communications》 SCIE CSCD 2020年第3期26-35,共10页
As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,... As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,e.g.,weather conditions,evaporation ducting,and ship rocking caused by waves.To ensure the data transmission reliability,the block Markov superposition transmission(BMST)codes,which are easily configurable and have predictable performance,are applied in this study.Meanwhile,the physical-layer network coding(PNC)scheme with spatial modulation(SM)is adopted to improve the spectrum utilization.For the BMST-SMPNC system,we propose an iterative algorithm,which utilizes the channel observations and the a priori information from BMST decoder,to compute the soft information corresponding to the XORed bits constructed by the relay node.The results indicate that the proposed scheme outperforms the convolutional coded SM-PNC over fast-fading Rician channels.Especially,the performance can be easily improved in high spatial correlation maritime channel by increasing the memory m. 展开更多
关键词 block Markov superposition transmission maritime relay communications physical-layer network coding Rician fading spatial modulation
下载PDF
Independent component analysis to physical-layer network coding over wireless fading channels
7
作者 Bing Du Xiaoming Tao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期196-203,共8页
A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that so... A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that sources broadcast signals simultaneously without orthogonal scheduling.Naturally,the signals overlap in the free space at the receivers.Since the signals from different sources are mutual independent,rooted on this rational assumption,an enhanced joint diagonalization separation named altering row diagonalization(ARD) algorithm is exploited to separate these signals by maximizing the cost function measuring independence among them.This ARD PNC(APNC) methodology provides an innovative way to implement signal-level network coding at the presence of interference and without any priori information about channels in fading environments.In conclusions,the proposed APNC performs well with higher bandwidth utility and lower error rate. 展开更多
关键词 physical-layer network coding (PNC) independentcomponent analysis (ICA) joint diagonalization network coding cooperative communications.
下载PDF
Online Optimization of Physical-Layer Secure Computation Offloading in Dynamic Environments
8
作者 Chenshan Ren Wei Song +1 位作者 Lizhi Zhao Xiaobing Zhao 《China Communications》 SCIE CSCD 2020年第10期19-30,共12页
Mobile edge computing can provide powerful computation services around the end-users.However,given the broadcast nature of wireless transmissions,offloading the computation tasks via the uplink channels would raise se... Mobile edge computing can provide powerful computation services around the end-users.However,given the broadcast nature of wireless transmissions,offloading the computation tasks via the uplink channels would raise serious security concerns.This paper proposes an online approach to jointly optimize local processing,transmit power,and task offloading decisions without the a-priori knowledge of the dynamic environments.The proposed approach can guarantee the secure offloading and asymptotically minimize the time-average energy consumption of devices while maintaining the stability of the ergodic secrecy queues and task queues.By exploiting the Lyapunov optimization,the local processing,transmit power,and task offloading variables can be decoupled between time slots.The subproblems on local processing and computation offloading can be solved separately.Convex optimization and graph matching can be used to solve the computation offloading subproblem.Simulations show that the performances of the proposed approach are superior to other popular approaches. 展开更多
关键词 mobile edge computing physical-layer security Lyapunov optimization ergodic secrecy queue
下载PDF
Throughput Gain of Random Wireless Networks with Physical-Layer Network Coding 被引量:3
9
作者 Xican Yang Jian Li +1 位作者 Changliang Xie Li Li 《Tsinghua Science and Technology》 EI CAS 2012年第2期161-171,共11页
This study analyzes the impact of Physical-layer Network Coding (PNC) on the throughput of a large random wireless network, including one-dimensional and two-dimensional networks. Three different transmission scheme... This study analyzes the impact of Physical-layer Network Coding (PNC) on the throughput of a large random wireless network, including one-dimensional and two-dimensional networks. Three different transmission schemes, (1) a traditional flow-based scheme, (2) a network coding scheme, and (3) the PNC scheme are compared to show that the PNC scheme improves wireless network throughput by a constant factor without changing the scaling law compared to the traditional flow-based and network coding schemes. Furthermore, PNC can reduce the effect of interference for the one-dimensional networks, and has a tighter throughput bound for the two-dimensional network. 展开更多
关键词 physical-layer network coding THROUGHPUT DELAY
原文传递
Zero-forcing dirty paper coding aided physical-layer network coding for MIMO two-way relaying channels with multiple users 被引量:2
10
作者 GONG Peng XU Jie QIU Ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期53-58,共6页
This article considers the two-way multiple-input multiple-output(MIMO) relaying channels with multiple users,in which multiple users are served simultaneously by the base station(BS) with the assistance of the re... This article considers the two-way multiple-input multiple-output(MIMO) relaying channels with multiple users,in which multiple users are served simultaneously by the base station(BS) with the assistance of the relay.The transmission consists of only two phases,doubling the system throughout over traditional one-way half-duplex transmission.A zero-forcing dirty paper coding(ZFDPC) aided physical-layer network coding(PNC) scheme is proposed in this article and the achievable capacity of the ZFDPC aided PNC scheme is derived.Simulation results show that the proposed scheme outperforms the previous decode-and-forward(DF) and zero-forcing beamforming(ZFBF) aided PNC scheme due to more degrees of freedoms and the advantage of PNC.Moreover,we analyze the effect of the imperfect channel state information(CSI) from RS to users at BS side to show the robustness of the proposed ZFDPC aided PNC scheme. 展开更多
关键词 zero-forcing dirty paper coding MIMO physical-layer network coding two-way relaying multiuser diversity
原文传递
Optimal power allocation for two-way relaying over OFDM using physical-layer network coding 被引量:1
11
作者 LI Fu-nian ZHU Guang-xi WANG De-sheng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第1期9-15,35,共8页
In this paper, a network scenario of two-way relaying over orthogonal frequency division multiplexing (OFDM) is considered, in which two nodes intend to exchange the information via a relay using physical-layer netw... In this paper, a network scenario of two-way relaying over orthogonal frequency division multiplexing (OFDM) is considered, in which two nodes intend to exchange the information via a relay using physical-layer network coding (PLNC). Assuming that the full channel knowledge is available, an optimization problem, which maximizes the achievable sum rate under a sum-power constraint, is investigated. It is shown that the optimization problem is non-convex, which is difficult to find the global optimum solution in terms of the computational complexity. In consequence, a low-complexity optimal power allocation scheme is proposed for practice implementation. A link capacity diagram is first employed for power allocation on each subcarrier. Subsequently, an equivalent relaxed optimization problem and Karush-Kuhn-Tucker (KKT) conditions are developed for power allocation among each subcarrier. Simulation results demonstrate that the substantial capacity gains are achieved by implementing the proposed schemes efficiently with a low-complexity computational effort. 展开更多
关键词 two-way relaying power allocation physical-layer network coding OFDM
原文传递
Downlink network-coded multiple access with diverse power
12
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 Network-coded multiple access physical-layer network coding Multi-user decoder Power allocation Throughput Downlink network
下载PDF
V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance
13
作者 Zerong Tang Tiecheng Song Jing Hu 《Computers, Materials & Continua》 SCIE EI 2024年第10期1835-1854,共20页
The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming... The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure(V2I)and Vehicle-toVehicle(V2V)communication with Reconfigurable Intelligent Surface(RIS)assistance,taking into account hardware impairments.A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS.Based on this model,we propose to maximize the V2I physical-layer security transmission rate.To solve the coupled non-convex optimization problem,an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix.Finally,simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate.The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm.Furthermore,increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate. 展开更多
关键词 Internet of vehicle reconfigurable intelligent surface physical-layer security transmission antenna hardware impairments
下载PDF
Secure Short-Packet Transmission in Uplink Massive MU-MIMO Assisted URLLC Under Imperfect CSI 被引量:1
14
作者 Tian Yu Xiaoli Sun +1 位作者 Yueming Cai Zeyuan Zhu 《China Communications》 SCIE CSCD 2023年第12期196-211,共16页
Ultra-reliable and low-latency communication(URLLC)is still in the early stage of research due to its two strict and conflicting requirements,i.e.,ultra-low latency and ultra-high reliability,and its impact on securit... Ultra-reliable and low-latency communication(URLLC)is still in the early stage of research due to its two strict and conflicting requirements,i.e.,ultra-low latency and ultra-high reliability,and its impact on security performance is still unclear.Specifically,short-packet communication is expected to meet the delay requirement of URLLC,while the degradation of reliability caused by it makes traditional physical-layer security metrics not applicable.In this paper,we investigate the secure short-packet transmission in uplink massive multiuser multiple-inputmultiple-output(MU-MIMO)system under imperfect channel state information(CSI).We propose an artificial noise scheme to improve the security performance of the system and use the system average secrecy throughput(AST)as the analysis metric.We derive the approximate closed-form expression of the system AST and further analyze the system asymptotic performance in two regimes.Furthermore,a one-dimensional search method is used to optimize the maximum system AST for a given pilot length.Numerical results verify the correctness of theoretical analysis,and show that there are some parameters that affect the tradeoff between security and latency.Moreover,appropriately increasing the number of antennas at the base station(BS)and transmission power at user devices(UDs)can increase the system AST to achieve the required threshold. 展开更多
关键词 average secrecy throughput imperfect CSI massive MU-MIMO physical-layer security short-packet
下载PDF
Radio Frequency Fingerprinting Identification Using Semi-Supervised Learning with Meta Labels 被引量:1
15
作者 Tiantian Zhang Pinyi Ren +1 位作者 Dongyang Xu Zhanyi Ren 《China Communications》 SCIE CSCD 2023年第12期78-95,共18页
Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF ide... Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700. 展开更多
关键词 meta labels parameters optimization physical-layer security radio frequency fingerprinting semi-supervised learning
下载PDF
Payload Symbol-Based Nonlinear RF Fingerprint for Wireless QPSK-OFDM Devices
16
作者 Honglin Yuan Yan Yan +1 位作者 Guoan Zhang Zhihua Bao 《China Communications》 SCIE CSCD 2023年第6期240-248,共9页
Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the ... Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the performance of RF Fingerprint(RFF)based on preamble with fixed duration, a nonlinear RF fingerprinting method based on payload symbols is proposed for the wireless OFDM communication with the bit mapping scheme of QPSK. The wireless communication system is modeled as a Hammerstein system containing the nonlinear transmitter and multipath fading channel. A parameter separation technique based on orthogonal polynomial is presented for the estimation of the parameters of the Hammerstein system. The Hammerstein system parameter separation technique is firstly used to estimate the linear parameter with the training signal, which is used to compensate the adverse effect of the linear channel for the demodulation of the successive payload symbols. The demodulated payload symbols are further used to estimate the nonlinear coefficients of the transmitter with the Hammerstein system parameter separation technique again, which is used as the novel RFF for the authentication of the QPSK-OFDM device. Numerical simulations have verified the proposed method, which can also be extended to the OFDM signals with other bit mapping schemes. 展开更多
关键词 physical-layer authentication RF Fingerprint RF Fingerprinting Hammerstein system parameter separation NONLINEARITY RFF spectrum sharing
下载PDF
SCIM: Incorporating secure communication and interference management in one operation
17
作者 Zhao Li Pintian Lyu +3 位作者 Jun Li Zhixian Chang Jia Liu Zheng Yan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期512-522,共11页
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne... Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission. 展开更多
关键词 physical-layer security Secure communication Anti-eavesdropping Interference management Secrecy rate
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
18
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
Robust Artificial Noise-Aided Beamforming for A Secure MISO-NOMA Visible Light Communication System 被引量:4
19
作者 Xiaodong Liu Zezong Chen +2 位作者 Yuhao Wang Fuhui Zhou Shuai Ma 《China Communications》 SCIE CSCD 2020年第11期42-53,共12页
Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of pote... Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA.The artificial noise jamming and beamforming technologies are applied to improve secure performance.A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper,and the practical imperfect channel state information of both the desired users and the eavesdropper.The formulated non-convex optimization problem is tackled based onS-Procedure and semi-definite programming relaxation.Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving.Moreover,the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers. 展开更多
关键词 artificial noise non-orthogonal multiple access physical-layer secrecy robust resource allocation visible light communication
下载PDF
Secure Transmissions in Wireless Multiuser Networks Using Message Correlation 被引量:2
20
作者 Hongliang He Libo Wang 《China Communications》 SCIE CSCD 2022年第2期186-200,共15页
Due to the openness of wireless multiuser networks,the private information transmitted in uplink or downlink is vulnerable to eavesdropping.Especially,when the downlink transmissions use nonorthogonal multiple access(... Due to the openness of wireless multiuser networks,the private information transmitted in uplink or downlink is vulnerable to eavesdropping.Especially,when the downlink transmissions use nonorthogonal multiple access(NOMA)techniques,the system further encounters interior eavesdropping.In order to address these security problems,we study the secret communication in multiuser networks with both uplink and downlink transmissions.Specifically,in uplink transmissions,the private messages transmitted in each slot are correlated,so any loss of the private information at the eavesdropper will prevent the eavesdropper from decoding the private information in later time slots.In downlink transmissions,the messages are correlated to the uplink information.In this way,any unexpected users who lose the expected user’s uplink information cannot decode its downlink information.The intercept probability is used to measure security performance and we analyze it in theory.Finally,simulation results are provided to corroborate our theoretical analysis. 展开更多
关键词 physical-layer security multiuser networks user selection message correlation NOMA
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部