期刊文献+
共找到216篇文章
< 1 2 11 >
每页显示 20 50 100
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity 被引量:4
1
作者 Lei Zou Zidong Wang +2 位作者 Bo Shen Hongli Dong Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期985-996,共12页
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu... This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme. 展开更多
关键词 Artificial-noise-assisted technique eavesdropPING encryption-decryption scheme energy-to-peak state estimation finitehorizon state estimation
下载PDF
Eavesdropping Area for Evaluating the Security of Wireless Communications 被引量:2
2
作者 Xiaofeng Zhong Chenchen Fan Shidong Zhou 《China Communications》 SCIE CSCD 2022年第3期145-157,共13页
Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques o... Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques or cryptographic methods are carried out.This paper proposes a new index parameter named as eavesdropping area,to evaluate the anti-eavesdropping performance of wireless system.Given the locations of legitimate transmitter and receiver,eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification.Corresponding key system parameters are analyzed,including the characteristics of eavesdropping region,transmitted beam pattern,beam direction,receiver sensitivity,eavesdropping sensitivity,path loss exponent and so on.The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability. 展开更多
关键词 eavesdropping area wireless communication anti-eavesdropping performance transmitting scheme
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
3
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol eavesdropPING
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
4
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels 被引量:2
5
作者 黄伟 温巧燕 +1 位作者 刘斌 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第7期114-124,共11页
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can acco... A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can accomplish quantum key distribution with the help of a serving center. Due to the utilization of the collective eavesdropping detection strategy, the users of the protocol just need to have the ability of performing certain unitary operations. Furthermore, we present three fault-tolerant versions of the proposed protocol, which can combat with the errors over different collective-noise channels.The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination. 展开更多
关键词 quantum cryptography quantum key distribution collective eavesdropping detection collective noise
下载PDF
Eavesdropping on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:3
6
作者 YUAN Hao LIU Yin-Min +1 位作者 ZHANG Wen ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第1期103-106,共4页
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channe... Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward. 展开更多
关键词 eavesdropPING quantum secure direct communication quantum bit error rate noise
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:3
7
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security Virtual wireless networks Jamming and eavesdropping
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
8
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
下载PDF
A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper
9
作者 Mei-ting Wang Yan Zhu Yi-ning Mu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第1期95-97,共3页
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amp... In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amplifier laser eavesdropping model based on waveguide fiber taper. First of all, taking about four-quadrant (4QD) laser eavesdropping model as an example, from the theoretical view, analyses factors that, currently, laser eavesdropping system face many restrictive factors during practical applications. Besides, from the receiving FOV and ability of amplification about arrival angle of incoming optical axis angles, systematically analyses advantages of multi-stage amplifier model. What’s more,through constructing laser eavesdropping test platform, we demonstrate Signal to Noise Ratio(SNR) of two stage amplification model is eventually promoted to 6-10 dB compared with one amplifying model,especially in low and high audio level, the advantages is more obvious. 展开更多
关键词 LASER eavesdropPING WAVEGUIDE FIBER TAPER 4QD
下载PDF
An Anti-Eavesdropping Method in Data Collection of Smart Meter
10
作者 Weiwei Dong Yong Wang +2 位作者 Lin Zhou Kanghua Cao Haiming Li 《Journal of Computer and Communications》 2019年第9期38-49,共12页
At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were ta... At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were taken into account. Plaintext is used in the protocol for data transmission, as a result, attackers can easily sniff the information and cause information leakage. In this paper, man-in-the-middle attack was used to verify that the smart meter data acquisition process was vulnerable when facing third-party attacks, and this can result in data eavesdropping. In order to resist such risks and prevent information being eavesdropped, a real ammeter communication experimental environment was built, it realized two-way identity authentication between data acquisition center and ammeter data center. At the same time, RSA (Rivest-Shamir-Adleman) was used to encrypt the meter data, which encrypted the collection, storage process of meter data and ensured the confidentiality and integrity of the meter data transmission. Compared with other methods, this method had obvious advantages. The analysis showed that this method can effectively prevent the data of smart meters from being eavesdropped. 展开更多
关键词 Smart METER Data ACQUISITION Transmission eavesdropPING RSA Two-Way AUTHENTICATION
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
11
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 Physical layer security Full-duplex SELF-INTERFERENCE eavesdropping CSI MULTI-ANTENNA
下载PDF
A Spectrum Sharing Model that Counters Eavesdropping:An Energy Efficiency View
12
作者 Yee-Loo Foo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2021年第2期47-54,共8页
Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces s... Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces spectral wastage and protects against eavesdropping is proposed.First,cognitive radio(CR)shares the channel access with primary user(PU).When the CR senses that the channel is idle,CR can seize the unoccupied channel for its own use.If the channel is detected to be occupied by PU,CR transmits artificial noise to jam any potential eavesdropper.To what extent is this operation beneficial to the CR?The main concern of this study is the energy efficiency(μ)of CR,i.e.,the ratio of channel throughput to its energy consumption.The relationship betweenμand the percentage of frame duration allocated for sensing(τ)was investigated.This study contributes a novel theoretical expression that allows us to find the optimalμandτvalues,denoted byμ∗andτ∗.With the availability of this expression,the relationships between(μ∗,τ∗)and other important system parameters can be understood thoroughly.Our investigation reveals that strong CR signal will result in highμ∗without the need of increasingτ∗.On the other hand,a strong primary signal allows a shortτ∗and it improvesμ∗.High sampling rate for sensing may be unnecessary,as it does not improveμ∗significantly.A more demanding target probability of detection requires a higher sensing duration,but it has insignificant impact onμ∗. 展开更多
关键词 spectrum sharing cognitive radio physical layer security eavesdropPING jamming THROUGHPUT energy efficiency
下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
13
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol BB
下载PDF
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system
14
作者 Na LI Yuanyuan GAO +4 位作者 Kui XU Xiaochen XIA Huazhi HU Yang LI Yueyue ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期500-512,共13页
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li... We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security. 展开更多
关键词 CELL-FREE Colluding eavesdropping Limited pilot resources Access point selection Security rate
原文传递
基于网络编码的机密业务多路径光传输方法
15
作者 刘焕淋 邓棣 +4 位作者 陈勇 唐畅 陈浩楠 陈想 霍星吉 《电子学报》 EI CAS CSCD 北大核心 2024年第9期3272-3277,共6页
随着互联网应用发展,越来越多具有安全需求的机密业务在空分复用弹性光网络中传输时,面临被攻击或窃听的安全风险.为了确保机密业务的传输安全性和减少频谱资源的浪费,提出一种空分复用弹性光网络中基于网络编码的机密业务多路径光传输... 随着互联网应用发展,越来越多具有安全需求的机密业务在空分复用弹性光网络中传输时,面临被攻击或窃听的安全风险.为了确保机密业务的传输安全性和减少频谱资源的浪费,提出一种空分复用弹性光网络中基于网络编码的机密业务多路径光传输方法 .在机密业务的路由阶段,该方法通过设计评估链路被窃听概率、路径跳数和路径上空闲频谱资源的路径代价函数,为机密业务选择最小路径代价的两路径或三路径传输策;在纤芯选择中,设计路径碎片率和负载失衡的评估值,为机密业务选择满足业务带宽需求的碎片率低和负载均衡的纤芯;在频谱分配中,设计满足网络编码条件的频谱碎片和负载感知的频谱分配方法,通过滑动频谱窗方法,为机密业务寻找能网络编码、且导致纤芯的频谱碎片化程度小和负载均衡的频谱块.仿真结果表明,与其他采用网络编码的路由频谱分配算法相比,在负载大于200爱尔兰时,本文所提方法能有效降低机密业务阻塞率和提高频谱资源使用率. 展开更多
关键词 空分复用弹性光网络 网络编码 多路径 窃听 机密业务 阻塞率
下载PDF
Secure Computation Efficiency Resource Allocation for Massive MIMO-Enabled Mobile Edge Computing Networks
16
作者 Sun Gangcan Sun Jiwei +3 位作者 Hao Wanming Zhu Zhengyu Ji Xiang Zhou Yiqing 《China Communications》 SCIE CSCD 2024年第11期150-162,共13页
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ... In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes. 展开更多
关键词 eavesdropPING massive multiple input multiple output mobile edge computing partial offloading secure computation efficiency
下载PDF
基于部分信息的SLT-LT联合码防窃听方案设计 被引量:1
17
作者 张思 牛芳琳 +1 位作者 于玲 张永祥 《信息安全学报》 CSCD 2024年第3期113-123,共11页
近年来,信息的安全传输备受人们关注,现有的物理层安全技术从信息论的角度出发,将物理层安全编码与传输信道的动态物理特性进行结合,实现信息的保密传输。作为一种纠删码,LT(Luby transform)码由于其编码随机性、码率不固定等特性,使得... 近年来,信息的安全传输备受人们关注,现有的物理层安全技术从信息论的角度出发,将物理层安全编码与传输信道的动态物理特性进行结合,实现信息的保密传输。作为一种纠删码,LT(Luby transform)码由于其编码随机性、码率不固定等特性,使得窃听者不能直接从泄露的编码符号中得到有用信息,只要合法用户在窃听者之前接收到足够数量的编码符号,便可实现信息的安全传输。而作为一种转移LT(Shifted LT,SLT)码,SLT码能高效恢复信息的同时具有更小的译码开销。因此,我们将SLT码应用于Wyner降阶窃听信道模型进行研究,提出一种基于部分信息转移的SLT-LT联合码防窃听方案,信源利用接收者已知的部分信息对度分布进行调整,并对信源符号进行SLT-LT码级联编码。由于窃听信道是合法信道的降阶信道,因此外在的窃听者截获到的消息符号是合法接收者的降阶版本,在相同时间内,合法接收者能够收到更多消息符号,随着编解码过程的不断进行,合法接收者的优势不断累积,能够优先完成解码,而度分布的调整以及级联编码方案使得编码符号的平均度进一步增大,窃听者难以完成解码,进一步降低了窃听者译出率;之后,对所提方案的编解码性能以及安全性进行理论分析,并通过实验仿真进行验证,仿真结果表明,与其他防窃听LT方案相比,本文所提方案仅增加少量的译码开销但具有更好的安全性能。 展开更多
关键词 喷泉码 部分信息转移 级联码 防窃听 物理层安全
下载PDF
基于时频特征的反监听技术研究与应用
18
作者 李建勋 王开 《电子测量技术》 北大核心 2024年第7期1-8,共8页
本研究旨在探讨一种基于时频特征设计的反监听技术,重点研究如何通过动态修改时序和频率增强特定频率范围内的人类语音干扰。本文针对现有的语音干扰技术展开研究,并与标准噪声注入方法进行了比较。研究方法包括理论分析和实验验证,通... 本研究旨在探讨一种基于时频特征设计的反监听技术,重点研究如何通过动态修改时序和频率增强特定频率范围内的人类语音干扰。本文针对现有的语音干扰技术展开研究,并与标准噪声注入方法进行了比较。研究方法包括理论分析和实验验证,通过对实际原型进行测试和验证,评估了基于时频特征提取的干扰信号在干扰语音识别系统方面的有效性。实验结果显示,当信噪比低于0dB时,所提出方法的文本识别错误率超过了60%;而当信噪比为0dB时,本文算法的文本识别错误率平均比当前干扰算法高出20%以上。此外,当干扰系统与录音设备保持相同距离时,本文算法在录音设备上产生的信噪比比当前算法低近2dB,这说明了所提出算法的高能量利用效率。因此,本研究成果对于提高通信安全和保护隐私具有重要意义,特别是在需要高度保密的通信环境中。 展开更多
关键词 隐私保护 防窃听 超声波干扰 时频特征提取 语音干扰
下载PDF
全双工辅助的无人机上行通信抗窃听物理层安全技术研究 被引量:1
19
作者 曹建勋 王谋业 +2 位作者 杨胜辉 黄耀森 吴思凡 《现代电子技术》 北大核心 2024年第9期21-28,共8页
针对无人机上行通信链路的窃听攻击,提出一种全双工协同干扰的安全传输策略。方案利用收发双方在数据传输不同阶段的信息差异以及掌握的先验信息特征,向待传输信号注入人工噪声信号,从而使窃听链路形成干扰受限系统。在发射功率、无人... 针对无人机上行通信链路的窃听攻击,提出一种全双工协同干扰的安全传输策略。方案利用收发双方在数据传输不同阶段的信息差异以及掌握的先验信息特征,向待传输信号注入人工噪声信号,从而使窃听链路形成干扰受限系统。在发射功率、无人机的机动性等约束条件下,建立最大化系统保密速率的联合优化问题,基于交替优化方法和连续凸近似技术将非凸问题转化为两个子问题,并设计了一种迭代优化算法进行求解。仿真结果表明,所提安全传输方案与其他参照方案相比,能够显著提高全双工无人机中继通信系统的保密速率,表现出更好的性能。 展开更多
关键词 无人机通信 物理层安全 全双工 人工噪声 通信抗窃听 连续凸近似
下载PDF
Humans identify negative (but not positive) arousal in silver fox vocalizations: implications for the adaptive value of interspecific eavesdropping 被引量:2
20
作者 Piera FILIPPI Svetlana S. GOGOLEVA +2 位作者 Elena V. VOLODINA Ilya A. VOLODIN Bart de BOER 《Current Zoology》 SCIE CAS CSCD 2017年第4期445-456,共12页
The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly be... The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly between humans and other species. Research shows that humans identify emotional arousal in vocalizations across multiple species, such as cats, dogs, and piglets. However, no previ- ous study has addressed humans" ability to identify emotional arousal in silver foxes. Here, we adopted low- and high-arousal calls emitted by three strains of silver fox--Tame, Aggressive, and Unselected--in response to human approach. Tame and Aggressive foxes are genetically selected for friendly and attacking behaviors toward humans, respectively. Unselected foxes show aggres- sive and fearful behaviors toward humans. These three strains show similar levels of emotional arousal, but different levels of emotional valence in relation to humans. This emotional information is reflected in the acoustic features of the calls. Our data suggest that humans can identify high- arousal calls of Aggressive and Unselected foxes, but not of Tame foxes. Further analyses revealed that, although within each strain different acoustic parameters affect human accuracy in identifying high-arousal calls, spectral center of gravity, harmonic-to-noise ratio, and F0 best predict humans' ability to discriminate high-arousal calls across all strains. Furthermore, we identified in spectral center of gravity and F0 the best predictors for humans' absolute ratings of arousal in each call. Implications for research on the adaptive value of inter-specific eavesdropping are discussed. 展开更多
关键词 eavesdropPING emotional arousal emotional valence inter-species communication silver foxes vocal communication.
原文传递
上一页 1 2 11 下一页 到第
使用帮助 返回顶部