We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco...We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.展开更多
Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS...Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications.展开更多
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne...Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.展开更多
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe...In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.展开更多
Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provid...Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.展开更多
This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signa...This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signals. A preliminary detection scenario illustrates that the frequency and amplitude of the hidden sine wave signal can be extracted from the chaotic carrier by numerical simulation. The obtained results indicate that the hidden messages in chaotic secure communication can be eavesdropped utilizing Duffing oscillators.展开更多
In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used ...In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information.Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor(DSP) show the feasibility and the validity of the proposed scheme.展开更多
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant...Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.展开更多
In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal ...In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal with parameter uncertainty. In the second method, multi-parameter modulation is used to simultaneously transmit more than one digital message (i.e., the multichannel digital communication) through just a single signal, which switches among various chaotic attractors that differ only subtly. In theory, such a treatment increases the difficulty for the intruder to directly intercept the information, and meanwhile the implementation cost decreases significantly. In addition, numerical results show the methods are robust against weak noise, which implies their practicability.展开更多
Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is propo...Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time.展开更多
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled ma...Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program.展开更多
This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors fo...This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors for its different parameter values.All theoretical and numerical analysis are investigated to confirm the complex hyperchaotic behavior of our proposed model using many tools that include Kaplan-Yorke dimension,equilibrium points stability,bifurcation diagrams,and Lyapunov exponents.By means of Multisim software,the authors also designed an electronic circuit to confirm our proposed systems’physical feasibility.MATLAB and Multisim simulation results excellently agree with each other,which validate the feasibility of our new ten terms hyperchaotic system and make it very desirable to use in different domains especially in chaotic-based communication.Furthermore,by employing the drive response synchronisation,we developed a secure communication strategy for the proposed system.Findings from the proposed scheme show that the proposed approach was successful in completing the encryption and decryption procedure.展开更多
A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon....A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. Tile security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security.展开更多
With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are gre...With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.展开更多
Based on chaos shift keying approach, impulsive signals from Hyperchaotic Chen system and Hyperchaotic Lü system are alternately emitted according to the transmission of binary signals “0” and “1”. In the rec...Based on chaos shift keying approach, impulsive signals from Hyperchaotic Chen system and Hyperchaotic Lü system are alternately emitted according to the transmission of binary signals “0” and “1”. In the receiver, these two hyperchaotic systems are adopted as response systems at the same time. The digital signals are recovered via comparing the discrete signals of the two error systems. Numerical simulations show the effectiveness of the method.展开更多
Intelligent reflecting surface(IRS)-assisted simultaneous wireless information and power transfer(SWIPT)is a promising technology for prolonging the lifetime of the users and improving system performance.However,it is...Intelligent reflecting surface(IRS)-assisted simultaneous wireless information and power transfer(SWIPT)is a promising technology for prolonging the lifetime of the users and improving system performance.However,it is challenging to obtain the perfect channel state information(CSI)at the base station(BS)due to the lack of radio frequency(RF)chains at the IRS,which becomes even harder when eavesdroppers(Eves)exist.In this paper,we study the power issues in the IRS-aided SWIPT system under the imperfect CSI of BS-IRS-Eves links.We aim to minimize the transmitting power at the BS by jointly designing transmit beamforming and reflective beamforming with subject to the rate outage probability constraints of the Eves,the energy harvesting constraints of the energy receivers(ERs),and the minimum rate constraints of the information receivers(IRs).We use Bernstein-type inequality to solve the rate outage probability constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing alternating optimization(AO)combined with semidefinite relaxation(SDR)and penalty convex-concave procedure(CCP).Numerical results demonstrate the effectiveness of the proposed scheme.展开更多
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N...Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.展开更多
Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking meth...Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.展开更多
Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter ...Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter servers to collect and broadcast related parameters due to the advantages of easy deployment and high flexibility.However,the challenge of limited energy restricts the populariza⁃tion of UAV-enabled FL applications.An airground integrated low-energy federated learning framework is proposed,which minimizes the overall energy consumption of application communication while maintaining the quality of the FL model.Specifically,a hierarchical FL framework is proposed,where base stations(BSs)aggregate model parameters updated from their surrounding users separately and send the aggregated model parameters to the server,thereby reducing the energy consumption of communication.In addition,we optimize the deploy⁃ment of UAVs through a deep Q-network approach to minimize their energy consumption for transmission as well as movement,thus improv⁃ing the energy efficiency of the airground integrated system.The evaluation results show that our proposed method can reduce the system en⁃ergy consumption while maintaining the accuracy of the FL model.展开更多
1 IntroductionRecently, there have been intense research activities on the study of synchronized chaos generated by fibre lasers and its application to secure communication systems. So far, all studies concentrate on ...1 IntroductionRecently, there have been intense research activities on the study of synchronized chaos generated by fibre lasers and its application to secure communication systems. So far, all studies concentrate on two aspects: (1) the effect of the transmission channel between the transmitter and the receiver has been neglected, and (2) the chaos and the signal are carried by one wavelength. Both theoretical and experimental investigations展开更多
基金funding from the Australian Government,via grant AUSMURIB000001 associated with ONR MURI Grant N00014-19-1-2571。
文摘We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.
基金supported by the National Science Fund for Young Scholars(Grant No.62201539)the Project of Innovation and Entrepreneurship Training for National Undergraduates(Grant No.202210356005)the project of Zhejiang University Student Science and Technology Innovation Activity Plan(Grant No.2023R409055)。
文摘Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications.
基金supported in part by the Natural Science Foundation of Shaanxi Province under Grant Number 2021JM-143the Fundamental Research Funds for the Central Universities under Grant Number JB211502+5 种基金the Project of Key Laboratory of Science and Technology on Communication Network under Grant Number 6142104200412the National Natural Science Foundation of China under Grant Number 61672410the Academy of Finland under Grant Number 308087the China 111 project under Grant Number B16037JSPS KAKENHI under Grant Number JP20K14742and the Project of Cyber Security Establishment with Inter University Cooperation.
文摘Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
基金Project supported in part by the National Natural Science Foundation of China (Grant Nos 10372054 and 60575038) and the Science Foundation of Southern Yangtze University of China (Grant No 000408).
文摘In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.
基金This project is jointly supported by the National Natural Science Foundation of China (No.60074034, 70271068), the Research Fund for the Doctoral Program of Higher Education (N0.200200080004) and the Foundation for University Key Teacher by the Ministry
文摘Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.
基金supported by the National Natural Science Foundation of China (Grant Nos 60577019 and 60777041) the International Cooperation Project of Shanxi Province,China
文摘This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signals. A preliminary detection scenario illustrates that the frequency and amplitude of the hidden sine wave signal can be extracted from the chaotic carrier by numerical simulation. The obtained results indicate that the hidden messages in chaotic secure communication can be eavesdropped utilizing Duffing oscillators.
基金supported by the National Natural Science Foundation of China(Grant No.61172070)the Funds from the Science and Technology Innovation Team of Shaanxi Province,China(Grant No.2013CKT-04)
文摘In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information.Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor(DSP) show the feasibility and the validity of the proposed scheme.
基金This project was supported by the National Natural Science Foundation of China (60573129).
文摘Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.
基金Project supported by the National Natural Science Foundation of China (Grant No. 10572080), Shanghai Rising-Star Program (Grant No.05QMX1422), and Dawn Project of the Science Foundation of Shanghai Municipal Commission of Education (Grant No.05SG41 04YQHB089)
文摘In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal with parameter uncertainty. In the second method, multi-parameter modulation is used to simultaneously transmit more than one digital message (i.e., the multichannel digital communication) through just a single signal, which switches among various chaotic attractors that differ only subtly. In theory, such a treatment increases the difficulty for the intruder to directly intercept the information, and meanwhile the implementation cost decreases significantly. In addition, numerical results show the methods are robust against weak noise, which implies their practicability.
基金Project supported by the China Postdoctoral Science Foundation (Grant No. 20080431142)
文摘Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province,China (Grant No. 20082165)
文摘Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program.
文摘This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors for its different parameter values.All theoretical and numerical analysis are investigated to confirm the complex hyperchaotic behavior of our proposed model using many tools that include Kaplan-Yorke dimension,equilibrium points stability,bifurcation diagrams,and Lyapunov exponents.By means of Multisim software,the authors also designed an electronic circuit to confirm our proposed systems’physical feasibility.MATLAB and Multisim simulation results excellently agree with each other,which validate the feasibility of our new ten terms hyperchaotic system and make it very desirable to use in different domains especially in chaotic-based communication.Furthermore,by employing the drive response synchronisation,we developed a secure communication strategy for the proposed system.Findings from the proposed scheme show that the proposed approach was successful in completing the encryption and decryption procedure.
基金Supported by the Chongqing Research Program of Application Foundation and Advanced Technology under Grant No cstc2014jcyjA40028
文摘A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. Tile security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security.
文摘With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.
文摘Based on chaos shift keying approach, impulsive signals from Hyperchaotic Chen system and Hyperchaotic Lü system are alternately emitted according to the transmission of binary signals “0” and “1”. In the receiver, these two hyperchaotic systems are adopted as response systems at the same time. The digital signals are recovered via comparing the discrete signals of the two error systems. Numerical simulations show the effectiveness of the method.
基金National Natural Science Foundation of China(62101161)Shenzhen Basic Research Program(20200812112423002)+1 种基金Shenzhen Basic Research Program(JCYJ20220531103008018)open research fund of National Mobile Communications Research Laboratory,Southeast University(2022D02)。
文摘Intelligent reflecting surface(IRS)-assisted simultaneous wireless information and power transfer(SWIPT)is a promising technology for prolonging the lifetime of the users and improving system performance.However,it is challenging to obtain the perfect channel state information(CSI)at the base station(BS)due to the lack of radio frequency(RF)chains at the IRS,which becomes even harder when eavesdroppers(Eves)exist.In this paper,we study the power issues in the IRS-aided SWIPT system under the imperfect CSI of BS-IRS-Eves links.We aim to minimize the transmitting power at the BS by jointly designing transmit beamforming and reflective beamforming with subject to the rate outage probability constraints of the Eves,the energy harvesting constraints of the energy receivers(ERs),and the minimum rate constraints of the information receivers(IRs).We use Bernstein-type inequality to solve the rate outage probability constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing alternating optimization(AO)combined with semidefinite relaxation(SDR)and penalty convex-concave procedure(CCP).Numerical results demonstrate the effectiveness of the proposed scheme.
基金supported by the National Natural Science Foundation of China under Grant No.62032013the LiaoNing Revitalization Talents Program under Grant No.XLYC1902010.
文摘Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.
基金supported by National Natural Science Foundation of China(No.61174034)
文摘Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.
基金supported in part by the National Key Research and Development Program of China under Grant No. 2021ZD0112400the NSFC under Grant No. 62202080+3 种基金the NSFC-Liaoning Province United Foundation under Grant No. U1908214the CCF-Tencent Open Fund under Grant No. IAGR20210116the Fundamental Research Funds for the Central Universities under Grant Nos. DUT21TD107 and DUT20RC(3)039the Liaoning Revitalization Talents Program under Grant No. XLYC2008017
文摘Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter servers to collect and broadcast related parameters due to the advantages of easy deployment and high flexibility.However,the challenge of limited energy restricts the populariza⁃tion of UAV-enabled FL applications.An airground integrated low-energy federated learning framework is proposed,which minimizes the overall energy consumption of application communication while maintaining the quality of the FL model.Specifically,a hierarchical FL framework is proposed,where base stations(BSs)aggregate model parameters updated from their surrounding users separately and send the aggregated model parameters to the server,thereby reducing the energy consumption of communication.In addition,we optimize the deploy⁃ment of UAVs through a deep Q-network approach to minimize their energy consumption for transmission as well as movement,thus improv⁃ing the energy efficiency of the airground integrated system.The evaluation results show that our proposed method can reduce the system en⁃ergy consumption while maintaining the accuracy of the FL model.
文摘1 IntroductionRecently, there have been intense research activities on the study of synchronized chaos generated by fibre lasers and its application to secure communication systems. So far, all studies concentrate on two aspects: (1) the effect of the transmission channel between the transmitter and the receiver has been neglected, and (2) the chaos and the signal are carried by one wavelength. Both theoretical and experimental investigations