期刊文献+
共找到178篇文章
< 1 2 9 >
每页显示 20 50 100
Trust-based co-operative routing for secure communication in mobile ad hoc networks
1
作者 Ankita A.Mahamune M.M.Chandane 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1079-1087,共9页
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ... The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency. 展开更多
关键词 Mobile Ad hoc NETwork secure communication AODV Co-operative routing Trust metric
下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
2
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning Model predictive control
下载PDF
RIS Assisted Dual-Function Radar and Secure Communications Based on Frequency-Shifted Chirp Spread Spectrum Index Modulation 被引量:1
3
作者 Xiaoping Jin Peng Zhang +2 位作者 Chuan Wan Dingyou Ma Yudong Yao 《China Communications》 SCIE CSCD 2023年第10期85-99,共15页
Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS... Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications. 展开更多
关键词 index modulation secure communications ISAC DFRC reconfigurable intelligent surface
下载PDF
SCIM: Incorporating secure communication and interference management in one operation
4
作者 Zhao Li Pintian Lyu +3 位作者 Jun Li Zhixian Chang Jia Liu Zheng Yan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期512-522,共11页
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne... Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission. 展开更多
关键词 Physical-layer security secure communication Anti-eavesdropping Interference management Secrecy rate
下载PDF
Secure Communication via Chaotic Masking *
5
作者 纪飚 陆佶人 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期12-16,共5页
A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the mask... A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the masking sequence. At the receiver, a non dynamical system which adopts the same nonlinear functions as what is adopted at transmitter is used to retrieve the masking sequence from the received signal and then the message sequence is recovered through subtraction. The results of the theoretical analysis and computer simulation show that the chaotic digital secure communication system presented in this paper has the fine security, high reliability and can be implemented easily. 展开更多
关键词 CHAOS nonlinear discrete dynamical system secure communication
下载PDF
Adaptive projective synchronization of unified chaotic systems and its application to secure communication 被引量:4
6
作者 胡满峰 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3231-3237,共7页
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe... In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility. 展开更多
关键词 projective synchronization adaptive control unified chaotic system secure communication
下载PDF
Quantum Secure Communication Scheme with W State 被引量:6
7
作者 WANG Jian ZHANG Quan TANG Chao-Jing 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第4X期637-640,共4页
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct co... We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et at. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel. 展开更多
关键词 quantum secure communication W state
下载PDF
Secure communication by generalized chaotic synchronization 被引量:5
8
作者 Lequan Min, Xianhua Zhang, and Miao YangApplied Science School, University of Science and Technology Beijing, Beijing 100083, China 《Journal of University of Science and Technology Beijing》 CSCD 2003年第2期75-78,共4页
Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provid... Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme. 展开更多
关键词 secure communication generalized chaotic synchronization INTERNET
下载PDF
Extraction of periodic signals in chaotic secure communication using Duffing oscillators 被引量:2
9
作者 王云才 赵清春 王安帮 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2373-2376,共4页
This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signa... This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signals. A preliminary detection scenario illustrates that the frequency and amplitude of the hidden sine wave signal can be extracted from the chaotic carrier by numerical simulation. The obtained results indicate that the hidden messages in chaotic secure communication can be eavesdropped utilizing Duffing oscillators. 展开更多
关键词 CHAOS signal extraction Duffing oscillator secure communication
下载PDF
Efficient Quantum Secure Communication Protocol by Rearranging Particle Orders 被引量:2
10
作者 GAO Gan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第11期845-847,共3页
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, fir... We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state. 展开更多
关键词 rearranging orders quantum secure communication
下载PDF
Secure communication based on spatiotemporal chaos 被引量:1
11
作者 任海鹏 白超 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第8期233-238,共6页
In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used ... In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information.Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor(DSP) show the feasibility and the validity of the proposed scheme. 展开更多
关键词 secure communication spatiotemporal chaos SYNCHRONIZATION N-shift function
下载PDF
Multi-path based secure communication in wireless mesh networks 被引量:1
12
作者 Ding Xuyang Fan Mingyu Lu Xiaojun Zhu Dayong Wang Jiahao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期818-824,共7页
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant... Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths. 展开更多
关键词 wireless mesh network secure communication key exchange risk avoidance
下载PDF
Secure Communication Based on Quantum Key 被引量:1
13
作者 SONG Jie XIA Yan SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期635-638,共4页
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the... We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient. 展开更多
关键词 secure communication EPR pairs unitary operation
下载PDF
Encoding-decoding message for secure communication based on adaptive chaos synchronization 被引量:1
14
作者 邢国敬 黄德斌 《Journal of Shanghai University(English Edition)》 CAS 2008年第5期400-404,共5页
In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal ... In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal with parameter uncertainty. In the second method, multi-parameter modulation is used to simultaneously transmit more than one digital message (i.e., the multichannel digital communication) through just a single signal, which switches among various chaotic attractors that differ only subtly. In theory, such a treatment increases the difficulty for the intruder to directly intercept the information, and meanwhile the implementation cost decreases significantly. In addition, numerical results show the methods are robust against weak noise, which implies their practicability. 展开更多
关键词 adaptive chaos synchronization secure communication encoding-decoding message multi-parameter modulation
下载PDF
Generalized projective synchronization via the state observer and its application in secure communication 被引量:1
15
作者 吴迪 李娟娟 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第12期82-89,共8页
Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is propo... Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time. 展开更多
关键词 state observer generalized projective synchronization secure communication
下载PDF
Henon CSK Secure Communication System Using Chaotic Turbo Codes 被引量:1
16
作者 周小林 Song +4 位作者 Wentao Liu Jianbo Luo Hanwen 《High Technology Letters》 EI CAS 2002年第3期48-51,共4页
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S... In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system. 展开更多
关键词 chaotic secure communication Henon CSK modulation/demodulation chaotic turbo codes
下载PDF
Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
17
作者 王兴元 张娜 +1 位作者 任小丽 张永雷 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第2期125-132,共8页
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled ma... Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program. 展开更多
关键词 coupled map lattice projective synchronization digital image secure communication
下载PDF
Exponential synchronization for delayed nonlinear Schr?dinger equation and applications in optical secure communication
18
作者 Bian Lishuang Yin Jiuli +1 位作者 Tian Mengjiao Fan Xinghua 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期447-452,共6页
For further exploring the confidentiality of optical communication,exponential synchronization for the delayed nonlinear Schrodinger equation is studied.It is possible for time-delay systems to generate multiple posit... For further exploring the confidentiality of optical communication,exponential synchronization for the delayed nonlinear Schrodinger equation is studied.It is possible for time-delay systems to generate multiple positive Lyapunov exponents without the limitation of system dimension.Firstly,the homoclinic orbit analysis is carried out by using the bifurcation theory,and it is found that there are two homoclinic orbits in the system.According to the corresponding relationship,solitary waves also exist in the system.Secondly,the Melnikov method is used to prove that homoclinic orbits can evolve into chaos under arbitrary perturbations,and then chaotic signals are used as the carriers of information transmission.The Lyapunov exponent spectrum,phase diagram and time series of the system also prove the existence of chaos.Thirdly,an exponential synchronization controller is designed to achieve the chaotic synchronization between the driving system and the response system,and it is proved by the Lyapunov stability theory.Finally,the error system is simulated by using MATLAB,and it is found that the error tends to zero in a very short time.Numerical simulation results demonstrate that the proposed exponential synchronization scheme can effectively guarantee the chaotic synchronization within 1 s. 展开更多
关键词 secure communication Melnikov method nonlinear Schrodinger equation exponential synchronization
下载PDF
Chaotic synchronization based on nonlinear state-observer and its application in secure communication
19
作者 CHENMing-jie LIDian-pu ZHANGAi-jun 《Journal of Marine Science and Application》 2004年第1期64-70,共7页
Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In ... Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear stateobserver is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision.When the approach is applied to secure communication, the results are satisfying. 展开更多
关键词 chaotic synchronization nonlinear stoLe-observer synchronization error secure communication
下载PDF
Secure Communication Scheme based on A New Hyperchaotic System
20
作者 Khaled Benkouider Aceng Sambas +2 位作者 Ibrahim Mohammed Sulaiman Mustafa Mamat Kottakkaran Sooppy Nisar 《Computers, Materials & Continua》 SCIE EI 2022年第10期1019-1035,共17页
This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors fo... This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors for its different parameter values.All theoretical and numerical analysis are investigated to confirm the complex hyperchaotic behavior of our proposed model using many tools that include Kaplan-Yorke dimension,equilibrium points stability,bifurcation diagrams,and Lyapunov exponents.By means of Multisim software,the authors also designed an electronic circuit to confirm our proposed systems’physical feasibility.MATLAB and Multisim simulation results excellently agree with each other,which validate the feasibility of our new ten terms hyperchaotic system and make it very desirable to use in different domains especially in chaotic-based communication.Furthermore,by employing the drive response synchronisation,we developed a secure communication strategy for the proposed system.Findings from the proposed scheme show that the proposed approach was successful in completing the encryption and decryption procedure. 展开更多
关键词 Hyperchaotic system SYNCHRONIZATION circuit design secure communication system
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部