Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-...Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes.展开更多
In this paper, we propose a dual-threshold based secure On-Off transmission scheme, where signals are transmitted only if the channel condition can guarantee secure and reliable communication. First, we present a dyna...In this paper, we propose a dual-threshold based secure On-Off transmission scheme, where signals are transmitted only if the channel condition can guarantee secure and reliable communication. First, we present a dynamic access strategy to increase access efficiency, which provides an access region for the intended user. Then, we propose an emission control policy to transmit signals according to the current channel condition, which declines the influence of channel estimation errors and guarantees qualities of communication links. Furthermore, we give a comprehensive performance analysis for the proposed scheme in terms of connection outage probability(COP) and secrecy outage probability(SOP), and present a dual-threshold optimization model to further support the performance. Numerical results verify that the secure On-Off transmission scheme can increase the system secure energy efficiency and guarantee reliable and secure communication.展开更多
This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is es...This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.展开更多
This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration ...This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration of the case where eavesdroppers hide around certain targets.Focusing on the users that work in harvesting-transmitting mode with time switching receivers,we establish communication model via time division multiple access.On this basis,we propose a lightweight secure transmission scheme based on dual-thresholds for physical-layer security enhancement,which consists of two protocols applied to the downlink(DL) and uplink(UL) transmission respectively.In the DL,we design a dynamic information-power switching transmission protocol based on signal-to-noise ratio threshold,which provides an opportunistic approach to reform the fixed period allocation of information and power transfer;in the UL,an energy threshold is proposed for users to control the transmission,which is called a user-led on-off transmission protocol.Furthermore,we give a comprehensive performance analysis for the proposed scheme in terms of delay,reliability,security and secrecy throughput.Based on the analysis results,we optimize the two thresholds and the DL-UL allocationcoefficient to maximize the secrecy throughput.Simulation results show the proposed scheme can bring about a substantial secrecy gain.展开更多
Spectral efficiency(SE) and energy efficiency(EE) in secure communications is of primary importance due to the fact that 5 G wireless networks aim to achieve high throughput,low power consumption and high level of sec...Spectral efficiency(SE) and energy efficiency(EE) in secure communications is of primary importance due to the fact that 5 G wireless networks aim to achieve high throughput,low power consumption and high level of security.Nevertheless,maximizing SE and EE are not achievable simultaneously.In this paper,we investigate the SE and EE tradeoff for secure transmission in cognitive relay networks where all nodes are randomly distributed.We first introduce the opportunistic relay selection policy,where each primary transmitter communicates with the primary receiver with the help of a secondary user as a relay.Then,we evaluate the secure SE and secure EE of the primary network based on the outage probabilities analysis.Thirdly,by applying a unified SE-EE tradeoff metric,the secure SE and EE tradeoff problem is formulated as the joint secure SE and EE maximization problem.Considering the non-concave feature of the objective function,an iterative algorithm is proposed to improve secure SE and EE tradeoff.Numerical results show that the opportunistic relay selection policy is always superior to random relay selection policy.Furthermore,the opportunistic relay selection policy outperforms conventional direct transmission policy when faced with small security threat(i.e.,for smaller eavesdropper density).展开更多
When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to ...When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to manage and distribute keys,thus limiting the application of traditional high-level authentication schemes.Compared with the high-level authentication scheme,the physical layer authentication scheme realizes the lightweight authentication of users by comparing the wireless channel characteristics of adjacent packets.However,traditional physical layer authentication schemes still adopt the one-to-one authentication method,which will consume numerous network resources in the face of large-scale IoT node access authentication.In order to realize the secure access authentication of IoT nodes and regional intrusion detection with low resource consumption,we propose a physical layer authentication mechanism based on convolution neural network(CNN),which uses the deep characteristics of channel state information(CSI)to identify sending nodes in different locations.Specifically,we obtain the instantaneous CSI data of IoT sending nodes at different locations in the pre-set area,and then feed them into CNN for training to procure a model for IoT node authentication.With its powerful ability of data analysis and feature extraction,CNN can extract deep Spatio-temporal environment features of CSI data and bind them with node identities.Accordingly,an authentication mechanism which can distinguish the identity types of IoT nodes located in different positions is established to authenticate the identity of unknown nodes when they break into the pre-set area.Experimental results show that this authentication mechanism can still achieve 94.7%authentication accuracy in the case of a low signalto-noise ratio(SNR)of 0 dB,which means a significant improvement in authentication accuracy and robustness.展开更多
The ever increasing wireless data services, such asimaging, video, audio, multimedia, etc., have de-mands for the very high speed wireless communicationsand network, which are unfortunately a bottleneck whencombining ...The ever increasing wireless data services, such asimaging, video, audio, multimedia, etc., have de-mands for the very high speed wireless communicationsand network, which are unfortunately a bottleneck whencombining with the wireline core network. Users' arenow expecting high quality of experience with low-costdevices, ubiquitous connectivity, energy efficiency, highreliability, or even ultra-low latency if a vehicle terminalis applied.展开更多
Physical layer key generation(PKG)technology leverages reciprocal channel randomness to generate shared secret keys.However,multipath fading at the receiver may degrade the correlation between legitimate uplink and do...Physical layer key generation(PKG)technology leverages reciprocal channel randomness to generate shared secret keys.However,multipath fading at the receiver may degrade the correlation between legitimate uplink and downlink channels,resulting in a low key generation rate(KGR).In this paper,we propose a PKG scheme based on the pattern-reconfigurable antenna(PRA)to boost the secret key capacity.First,we propose a reconfigurable intelligent surface(RIS)based PRA architecture with the capability of flexible and reconfigurable antenna patterns.Then,we present the PRA-based PKG protocol to improve the KGR via mitigation of the effects of multipath fading.Specifically,a novel algorithm for estimation of the multipath channel parameters is proposed based on atomic norm minimization.Thereafter,a novel optimization method for the matching reception of multipath signals is formulated based on the improved binary particle swarm optimization(BPSO)algorithm.Finally,simulation results show that the proposed scheme can resist multipath fading and achieve a high KGR compared to existing schemes.Moreover,our findings indicate that the increased degree of freedom of the antenna patterns can significantly increase the secret key capacity.展开更多
The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with the...The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with theªunknown unknownºsecurity threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security.Then,it analyzes the security problems faced by the 6G core network,wireless access network,and emerging associated technologies in detail,as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security.Furthermore,this paper describes the relevant security theories and technical concepts under the guidance of the new paradigm of endogenous security.展开更多
基金supported in part by the National Natural Science Foundation of China(No.U22A2001)the National Key Research and Development Program of China(No.2022YFB2902202,No.2022YFB2902205)。
文摘Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes.
基金supported in part by National Natural Science Foundation of China under Grants No. 61871404, 61401510, 61521003, 61501516
文摘In this paper, we propose a dual-threshold based secure On-Off transmission scheme, where signals are transmitted only if the channel condition can guarantee secure and reliable communication. First, we present a dynamic access strategy to increase access efficiency, which provides an access region for the intended user. Then, we propose an emission control policy to transmit signals according to the current channel condition, which declines the influence of channel estimation errors and guarantees qualities of communication links. Furthermore, we give a comprehensive performance analysis for the proposed scheme in terms of connection outage probability(COP) and secrecy outage probability(SOP), and present a dual-threshold optimization model to further support the performance. Numerical results verify that the secure On-Off transmission scheme can increase the system secure energy efficiency and guarantee reliable and secure communication.
基金supported in part by National High-tech R&D Program(863 Program) under Grant No.2014AA01A701National Natural Science Foundation of China under Grant No.61379006,61401510,61521003Project funded by China Postdoctoral Science Foundation under Grant No.2016M592990
文摘This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.
基金supported in part by China High-Tech RD Program(863 Program) SS2015AA011306National Natural Science Foundation of China under Grants No.61379006,61401510,61501516,61521003
文摘This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration of the case where eavesdroppers hide around certain targets.Focusing on the users that work in harvesting-transmitting mode with time switching receivers,we establish communication model via time division multiple access.On this basis,we propose a lightweight secure transmission scheme based on dual-thresholds for physical-layer security enhancement,which consists of two protocols applied to the downlink(DL) and uplink(UL) transmission respectively.In the DL,we design a dynamic information-power switching transmission protocol based on signal-to-noise ratio threshold,which provides an opportunistic approach to reform the fixed period allocation of information and power transfer;in the UL,an energy threshold is proposed for users to control the transmission,which is called a user-led on-off transmission protocol.Furthermore,we give a comprehensive performance analysis for the proposed scheme in terms of delay,reliability,security and secrecy throughput.Based on the analysis results,we optimize the two thresholds and the DL-UL allocationcoefficient to maximize the secrecy throughput.Simulation results show the proposed scheme can bring about a substantial secrecy gain.
文摘Spectral efficiency(SE) and energy efficiency(EE) in secure communications is of primary importance due to the fact that 5 G wireless networks aim to achieve high throughput,low power consumption and high level of security.Nevertheless,maximizing SE and EE are not achievable simultaneously.In this paper,we investigate the SE and EE tradeoff for secure transmission in cognitive relay networks where all nodes are randomly distributed.We first introduce the opportunistic relay selection policy,where each primary transmitter communicates with the primary receiver with the help of a secondary user as a relay.Then,we evaluate the secure SE and secure EE of the primary network based on the outage probabilities analysis.Thirdly,by applying a unified SE-EE tradeoff metric,the secure SE and EE tradeoff problem is formulated as the joint secure SE and EE maximization problem.Considering the non-concave feature of the objective function,an iterative algorithm is proposed to improve secure SE and EE tradeoff.Numerical results show that the opportunistic relay selection policy is always superior to random relay selection policy.Furthermore,the opportunistic relay selection policy outperforms conventional direct transmission policy when faced with small security threat(i.e.,for smaller eavesdropper density).
基金This work was supported by National Natural Science Foundation of China(No.61871404,61801435).
文摘When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to manage and distribute keys,thus limiting the application of traditional high-level authentication schemes.Compared with the high-level authentication scheme,the physical layer authentication scheme realizes the lightweight authentication of users by comparing the wireless channel characteristics of adjacent packets.However,traditional physical layer authentication schemes still adopt the one-to-one authentication method,which will consume numerous network resources in the face of large-scale IoT node access authentication.In order to realize the secure access authentication of IoT nodes and regional intrusion detection with low resource consumption,we propose a physical layer authentication mechanism based on convolution neural network(CNN),which uses the deep characteristics of channel state information(CSI)to identify sending nodes in different locations.Specifically,we obtain the instantaneous CSI data of IoT sending nodes at different locations in the pre-set area,and then feed them into CNN for training to procure a model for IoT node authentication.With its powerful ability of data analysis and feature extraction,CNN can extract deep Spatio-temporal environment features of CSI data and bind them with node identities.Accordingly,an authentication mechanism which can distinguish the identity types of IoT nodes located in different positions is established to authenticate the identity of unknown nodes when they break into the pre-set area.Experimental results show that this authentication mechanism can still achieve 94.7%authentication accuracy in the case of a low signalto-noise ratio(SNR)of 0 dB,which means a significant improvement in authentication accuracy and robustness.
文摘The ever increasing wireless data services, such asimaging, video, audio, multimedia, etc., have de-mands for the very high speed wireless communicationsand network, which are unfortunately a bottleneck whencombining with the wireline core network. Users' arenow expecting high quality of experience with low-costdevices, ubiquitous connectivity, energy efficiency, highreliability, or even ultra-low latency if a vehicle terminalis applied.
基金Project supported by the National Key Research and Development Program of China(Nos.2022YFB2902202,2022YFB2902205)the National Natural Science Foundation of China(No.U22A2001)。
文摘Physical layer key generation(PKG)technology leverages reciprocal channel randomness to generate shared secret keys.However,multipath fading at the receiver may degrade the correlation between legitimate uplink and downlink channels,resulting in a low key generation rate(KGR).In this paper,we propose a PKG scheme based on the pattern-reconfigurable antenna(PRA)to boost the secret key capacity.First,we propose a reconfigurable intelligent surface(RIS)based PRA architecture with the capability of flexible and reconfigurable antenna patterns.Then,we present the PRA-based PKG protocol to improve the KGR via mitigation of the effects of multipath fading.Specifically,a novel algorithm for estimation of the multipath channel parameters is proposed based on atomic norm minimization.Thereafter,a novel optimization method for the matching reception of multipath signals is formulated based on the improved binary particle swarm optimization(BPSO)algorithm.Finally,simulation results show that the proposed scheme can resist multipath fading and achieve a high KGR compared to existing schemes.Moreover,our findings indicate that the increased degree of freedom of the antenna patterns can significantly increase the secret key capacity.
基金the National Key Research and Development Program of China(Nos.2020YFB1806607 and 2022YFB2902202)the National Natural Science Foundation of China(Nos.61521003 and 61701538)。
文摘The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with theªunknown unknownºsecurity threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security.Then,it analyzes the security problems faced by the 6G core network,wireless access network,and emerging associated technologies in detail,as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security.Furthermore,this paper describes the relevant security theories and technical concepts under the guidance of the new paradigm of endogenous security.