期刊文献+
共找到69篇文章
< 1 2 4 >
每页显示 20 50 100
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
1
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 Cognitive Radio Networks Non-Orthogonal Multiple Access physical layer security Sum of Safety Rates
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:7
2
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:3
3
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5
4
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
5
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 physical layer security Full-duplex SELF-INTERFERENCE Eavesdropping CSI MULTI-ANTENNA
下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network
6
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
下载PDF
Physical Layer Security for MmWave Communications:Challenges and Solutions
7
作者 HE Miao LI Xiangman NI Jianbing 《ZTE Communications》 2022年第4期41-51,共11页
The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,a... The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,autonomous vehicles and remotely con⁃trolled robots.For this reason,information security,in terms of the confidentiality,integrity and availability(CIA),becomes more important in the mmWave communication than ever since.The physical layer security(PLS),which is based on the information theory and focuses on the secrecy capacity of the wiretap channel model,is a cost effective and scalable technique to protect the CIA,compared with the traditional cryptographic techniques.In this paper,the theory foundation of PLS is briefly introduced together with the typical PLS performance metrics secrecy rate and outage probability.Then,the most typical PLS techniques for mmWave are introduced,analyzed and compared,which are classified into three major categories of directional modulation(DM),artificial noise(AN),and directional precoding(DPC).Finally,several mmWave PLS research problems are briefly discussed,including the low-complexity DM weight vector codebook construction,impact of phase shifter(PS)with finite precision on PLS,and DM-based communications for multiple target receivers. 展开更多
关键词 mmWave communication physical layer security phased array directional modulation
下载PDF
Physical Layer Security for Wireless and Quantum Communications
8
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security physical layer security for Wireless and Quantum Communications
下载PDF
Coalitional Game Based Joint Beamforming and Power Control for Physical Layer Security Enhancement in Cognitive IoT Networks
9
作者 Zhaoye Xu Aiyan Qu Kang An 《China Communications》 SCIE CSCD 2021年第12期139-150,共12页
In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme i... In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme is proposed to im-prove the achievable security of cognitive IoT de-vices.Specifically,the secondary network consisting of a muti-antenna secondary transmitter,multiple sec-ondary users(SUs),is allowed to access the licensed spectrum resource of primary user(PU)with underlay approach in the presence of an unauthorized eaves-dropper.Based on the Merge-Split-Rule,coalitional game is formulated among distributed secondary users with cooperative receive beamforming.Then,an alter-native optimization method is used to obtain the op-timized beamforming and power allocation schemes by applying the up-downlink duality.The simulation results demonstrate the effectiveness of our proposed scheme in improving the SU’s secrecy rate and system utility while guaranteeing PU’s interference thresh-old. 展开更多
关键词 physical layer secure transmission IOT coalitional game alternative optimization method
下载PDF
Aerial RIS-aided physical layer security design for satellitecommunication among similar channels
10
作者 Chengjun Jiang Chensi Zhang +2 位作者 Leilei Mu Zhe Zhang Jianhua Ge 《Journal of Information and Intelligence》 2023年第1期54-67,共14页
Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication netwo... Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication networks. The satellite communications security is often threatened dueto its broadcasting nature. To enhance the physical layer security (PLS) of satellite communications with channel similarity, an aerial RIS-aided dual full-duplex (DFD-ARIS) cooperative jamming method is presented in this paper. Specifically, unlike the existing works that relied onchannel difference, DFD-ARIS utilizes the channel similarity against the eavesdroppers with thehelp of ARIS. In addition, the power allocation is further studied in conjunction with the phasedesign of RIS to minimize the total power under the constraints of data rate, satellite powerlimitation and secrecy rate. Then, the closed-form solutions are achieved. Simulation results showthat the performance of the proposed scheme is superior to the traditional method. 展开更多
关键词 Reconfigurable intelligent surface(RIS) Satellite communication physical layer security(PLS) Cooperative jamming Power allocation
原文传递
Physical-Layer Key Generation Based on Multipath Channel Diversity Using Dynamic Metasurface Antennas
11
作者 Zheng Wan Yangming Lou +4 位作者 Xiaoming Xu Jinmei Yang Wenyu Jiang Kaizhi Huang Liang Jin 《China Communications》 SCIE CSCD 2023年第4期153-166,共14页
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-... Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes. 展开更多
关键词 physical layer security multipath channel diversity physical layer key generation dynamic metasurface antennas
下载PDF
Physical layer security strategies for downlink heterogeneous cloud radio access networks 被引量:1
12
作者 YAN Shi WANG Wen-bo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第5期47-54,60,共9页
Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concr... Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance. 展开更多
关键词 C-RAN Poisson point process (PPP) physical layer security HETEROGENEOUS
原文传递
Physical layer security enhanced system with under-sampling spectrum-sparse signals 被引量:1
13
作者 Li Lintao Liu Yuanan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第4期8-16,共9页
The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues.A practical secure transmission scheme based on under-sampling spectrum-sparse signals is designed.Secur... The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues.A practical secure transmission scheme based on under-sampling spectrum-sparse signals is designed.Secure transmission is initialized as the intended receiver transmits a pilot signal for the transmitter,to perform channel sounding and clock synchronization according to the channel reciprocal principle.Then,sampling clock offset compensation and precoding method based on channel state information(CSI)can be conducted at the transmitter's end.Because the intended receiver adopts an under-sampling method based on active aliasing which depends very sensitively on accurate sampling clock and CSI,the eavesdroppers can hardly intercept the signal.Closed form expression of symbol error rate(SER)at the intended receiver's end and secrecy capacity in fading wiretap channel has been derived.Numerical evaluation and simulations are carried out to validate the effectiveness of the proposed strategy. 展开更多
关键词 physical layer security spectrum-sparse signal secrecy capacity
原文传递
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
14
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
Physical layer security techniques for data transmission for future wireless networks
15
作者 Weiping Shi Xinyi Jiang +7 位作者 Jinsong Hu Abdeldime Mohamed Salih Abdelgader Yin Teng Yang Wang Hangjia He Rongen Dong Feng Shu Jiangzhou Wang 《Security and Safety》 2022年第1期115-144,共30页
The broadcast nature of wireless communication systems makes wireless trans-mission extremely susceptible to eavesdropping and even malicious interference.Physical layer security technology can e ectively protect the ... The broadcast nature of wireless communication systems makes wireless trans-mission extremely susceptible to eavesdropping and even malicious interference.Physical layer security technology can e ectively protect the private information sent by the trans-mitter from being listened to by illegal eavesdroppers,thus ensuring the privacy and security of communication between the transmitter and legitimate users.Thus,the main design goal of physical layer security is to increase the performance di erence between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes.The development of mobile communication presents new challenges to physical layer security research.This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques,including secure key generation,directional modulation(DM),spatial modulation(SM),covert communication,and intelligent re ecting surface(IRS)-aided communication.Finally,the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications. 展开更多
关键词 physical layer security Key generation DM SM Covert communication IRS
原文传递
Relay Beamforming Design for Physical Layer Secure Communication via Line Search Algorithm
16
作者 Siqi Chen Cong Sun 《China Communications》 SCIE CSCD 2021年第12期270-284,共15页
This paper considers a physical layer se-curity model in wireless communications.Two legit-imate users communicate through several relays with the presence of an eavesdropper.We jointly design the relay beamforming we... This paper considers a physical layer se-curity model in wireless communications.Two legit-imate users communicate through several relays with the presence of an eavesdropper.We jointly design the relay beamforming weights and minimize the to-tal relay transmit power,while ensuring users’Qual-ity of Services and preventing the information being eavesdropped at the same time.The problem is a robust optimization problem,because of the imper-fect channel state information from users and relays to the eavesdropper.First the original problem is sim-plified,where the high order robust terms are omit-ted.Then we design an iterative algorithm based on line search,by solving two Quadratically Con-strained Quadratic Programming subproblems and a one-dimensional subproblem.Simulation results indi-cate that the proposed algorithm outperforms the state of the arts. 展开更多
关键词 wireless communication physical layer security line search robust optimization
下载PDF
A One-Time Pad Encryption Scheme Based on Efficient Physical-Layer Secret Key Generation for Intelligent IoT System
17
作者 Liquan Chen Kailin Cao +2 位作者 Tianyu Lu Yi Lu Aiqun Hu 《China Communications》 SCIE CSCD 2022年第7期185-196,共12页
The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k... The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system. 展开更多
关键词 physical layer security intelligent internet of things one-time pad reconfigurable intelligent surface
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
18
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio
19
作者 Baofeng Ji Yifan Liu +6 位作者 Tingpeng Li Ling Xing Weixing Wang Shahid Mumtaz Xiaolong Shang Wanying Liu Congzheng Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期679-689,共11页
With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channe... With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channels,wireless networks have suffered more and more malicious attacks.Physical layer security has received extensive attention from industry and academia.MIMO is considered to be one of the most important technologies related to physical layer security.Through beamforming technology,messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users.Combining the symbiotic radio(SR)technology,this paper considers a symbiotic radio antijamming MIMO system equipped with a multi-antenna system at the main base station.In order to avoid the interference signal and improve the SINR of the signal received by the user.The base station is equipped with a uniform rectangular antenna array,and using Null Space Projection(NSP)Beamforming,Intelligent Reflecting Surface(IRS)can assist in changing the beam’s angle.The simulation results show that NSP Beamforming could make a better use of the null space of interference,which can effectively improve the received SINR of users under directional interference,and improve the utilization efficiency of signal energy. 展开更多
关键词 Symbiotic radio ANTI-JAMMING MIMO NSP Beamforming physical layer security
下载PDF
RIS-Assisted Cell-Free MIMO: A Survey
20
作者 ZHAO Yaqiong KE Hongqin +2 位作者 XU Wei YE Xinquan CHEN Yijian 《ZTE Communications》 2024年第1期77-86,共10页
Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive ... Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive MIMO,CF MIMO allows geographically distributed access points(APs)to serve all users on the same time-frequency resource with spatial multiplexing techniques,resulting in better performance in terms of both spectral efficiency and coverage enhancement.However,the performance gain is achieved at the expense of deploying more APs with high cost and power consumption.To address this issue,the recently proposed reconfigurable intelligent surface(RIS)technique stands out with its unique advantages of low cost,low energy consumption and programmability.In this paper,we provide an overview of RIS-assisted CF MIMO and its interaction with advanced optimization designs and novel applications.Particularly,recent studies on typical performance metrics such as energy efficiency(EE)and spectral efficiency(SE)are surveyed.Besides,the application of RIS-assisted CF MIMO techniques in various future communication systems is also envisioned.Additionally,we briefly discuss the technical challenges and open problems for this area to inspire research direction and fully exploit its potential in meeting the demands of future wireless communication systems. 展开更多
关键词 mmWave beyond 5G(B5G) Internet of Everything(IoE) cell-free MIMO RIS unmanned aerial vehicle(UAV) physical layer security(PLS) wireless energy transfer(WET)
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部