期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
1
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Secrecy Capacity Maximization for a UAV-Assisted MEC System 被引量:11
2
作者 Dongsheng Han Tianhao Shi 《China Communications》 SCIE CSCD 2020年第10期64-81,共18页
Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computi... Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system. 展开更多
关键词 physical layer secrecy secrecy capacity trajectory optimization MEC UAV communication
下载PDF
Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information 被引量:2
3
作者 Hui ZHAO You-yu TAN +1 位作者 Gao-feng PAN Yun-fei CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第4期578-590,共13页
This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer. In a single-input multiple- out... This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer. In a single-input multiple- output (SIMO) wiretap channel, a source transmits confidential messages to the destination equipped with M antennas using the MRC/SC scheme to process the received multiple signals. An eavesdropper equipped with N antennas also adopts the MRC/SC scheme to promote successful eavesdropping. We derive the exact and asymptotic closed-form expressions for the ergodic secrecy capacity (ESC) in two cases: (1) MRC with weighting errors, and (2) SC with outdated CSI. Moreover, two important indicators, namely high signal-to-noise ratio (SNR) slope and high SNR power offset, which govern ESC at the high SNR region, are derived. Finally, simulations are conducted to validate the accuracy of our proposed analytical models. Results indicate that ESC rises with the increase of the number of antennas and the received SNR at the destination, and fades with the increase of those at the eavesdropper. Another finding is that the high SNR slope is constant, while the high SNR power offset is correlated with the number of antennas at both the destination and the eavesdropper. 展开更多
关键词 Ergodic secrecy capacity (ESC) Mmximal ratio combining (MRC) Weighting errors Physical layer security Selection combining (SC) Single-input multiple-output (SIMO)
原文传递
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:18
4
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
下载PDF
Secrecy Performance of Untrusted Relay’s Cooperation under Fading Channels 被引量:2
5
作者 付晓梅 张立 +1 位作者 王大维 侯永宏 《Transactions of Tianjin University》 EI CAS 2011年第6期440-445,共6页
The secrecy performance of cooperation with an untrusted relay under a quasi-static fading channel is analyzed in this paper. An achievable secrecy rate is provided and the influence of selfish behavior of untrusted r... The secrecy performance of cooperation with an untrusted relay under a quasi-static fading channel is analyzed in this paper. An achievable secrecy rate is provided and the influence of selfish behavior of untrusted relay is analyzed. Furthermore, the secrecy performance of the scheme is discussed and compared with that of the case where the relay is just an eavesdropper. Simulation results show that the untrusted relay's cooperation in the fading case reduces the outage probability from 1/2 to 1/3 and achieves a higher outage secrecy capacity. 展开更多
关键词 physical layer security secrecy rate outage secrecy capacity
下载PDF
Enhancing secrecy rates in a wiretap channel
6
作者 Shahid M.Shah Vinod Sharma 《Digital Communications and Networks》 SCIE 2020年第1期129-135,共7页
Reliable communication imposes an upper limit on the achievable rate,namely the Shannon capacity.Wyner's wiretap coding ensures a security constraint and reliability,but results in a decrease of achievable rate.To... Reliable communication imposes an upper limit on the achievable rate,namely the Shannon capacity.Wyner's wiretap coding ensures a security constraint and reliability,but results in a decrease of achievable rate.To mitigate the loss in secrecy rate,we propose a coding scheme in which we use sufficiently old messages as key and prove that multiple messages are secure with respect to all the information possessed by the eavesdropper.We also show that we can achieve security in the strong sense.Next,we study a fading wiretap channel with full channel state information of the eavesdropper's channel and use our coding/decoding scheme to achieve a secrecy capacity close to the Shannon capacity of the main channel(in the ergodic sense).Finally,we study a case where the transmitter does not have instantaneous information of the channel state of the eavesdropper,but only its distribution. 展开更多
关键词 Physical layer security Rate loss Secret key Wiretap channel secrecy capacity
下载PDF
Achievable secrecy rate of bit-interleaved coded modulation schemes
7
作者 Weichen XIANG Stéphane Le Goff Zhiguo DING 《Journal of Modern Transportation》 2012年第4期243-248,共6页
We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayle... We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings. 展开更多
关键词 secrecy capacity MAPPING ergodic fading channel bit-interleaved coded modulation
下载PDF
Interference Coordination for Secrecy Enhancement in Random Wireless Networks
8
作者 BAI Juan TAO Xiaofeng XU Jin 《China Communications》 SCIE CSCD 2014年第8期28-36,共9页
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m... The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs. 展开更多
关键词 interference coordination poissonpoint process secrecy transmission capacity random wireless networks
下载PDF
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
9
作者 Md. Shamim Hossain Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2023年第8期134-148,共15页
The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the afore... The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the aforementioned factors while enhancing the performance of fading channels. Due to these issues, a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is taken into consideration in this study. So the investigation of a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is the focus of this paper. The primary goals of this study are to maximize security in wireless multicasting while minimizing security loss caused by the effects of relays, branches at destinations and wiretappers, as well as multicast users and wiretappers through opportunistic relaying. To comprehend the insight effects of prior parameters, the closed form analytical expressions are constructed for the probability of non-zero secrecy multicast capacity (PNSMC), ergodic secrecy multicast capacity (ESMC), and secure outage probability for multicasting (SOPM). The findings demonstrate that opportunistic relaying is a successful method for reducing the loss of security in multicasting. 展开更多
关键词 Ergodic secrecy Multicast capacity Probability of Non-Zero secrecy Multicast capacity Secure Wireless Multicasting Secure Outage Probability for Multicasting
下载PDF
Secure Wireless Multicasting through Nakagami-m Fading Channels with Multi-Hop Relaying
10
作者 Md. Mizanur Rahman Md. Zahurul Islam Sarkar Mohammad Mahmud Hasan 《Journal of Computer and Communications》 2023年第5期177-193,共17页
The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity g... The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting. 展开更多
关键词 Frequency Selective Fading Multi-Hop Relaying Probability of Non-Zero secrecy Multicast capacity Secure Outage Probability for Multicasting
下载PDF
Distributed Secure Relay Selection Approach over Wireless Cooperative Networks 被引量:1
11
作者 王莉 马跃 +2 位作者 柯腾辉 魏翼飞 宋梅 《China Communications》 SCIE CSCD 2011年第6期76-85,共10页
Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless r... Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones. 展开更多
关键词 cloud computing distributed relay selection secrecy capacity
下载PDF
Hybrid Protocol for Wireless-Powered Untrusted Relay Networks with Imperfect Channel Reciprocity
12
作者 Rui Ma Haowei Wu +2 位作者 Liubin Wang Jinglan Ou Lian Yan 《China Communications》 SCIE CSCD 2021年第9期116-129,共14页
This work investigates the security issue of the energy-constrained untrusted relay network with imperfect channel reciprocity,where the relay without the built-in power supply can only scavenge energy from radio-freq... This work investigates the security issue of the energy-constrained untrusted relay network with imperfect channel reciprocity,where the relay without the built-in power supply can only scavenge energy from radio-frequency signals radiated by the source and destination.A hybrid power-splitting(PS)-and time-switching(TS)-based relaying(HPTR)protocol is presented to improve the degraded secrecy performance due to the incomplete self-interference cancellation at the destination.To evaluate the secrecy throughput(ST)of the studied system,the analytical expression of the secrecy outage probability under the delay-limited transmission mode and the closed-form lower bound of the ergodic secrecy capacity under delay-tolerant transmission mode are derived.Both linear and nonlinear models for the energy harvester at the relay are compared.The optimal PS and TS ratios are evaluated numerically.The theoretical derivations are validated by numerical results,revealing that the residual jamming has a negative effect on the secrecy performance of untrusted relay networks,which can be alleviated by the HPTR protocol.Besides,we compare the ST performance of the HPTR protocol with that of the PS and TS relaying schemes,and the results show that the HPTR protocol outperforms both PS and TS relaying protocols in terms of the ST. 展开更多
关键词 untrusted relay physical layer security secrecy outage probability ergodic secrecy capacity energy harvesting
下载PDF
Energy-Efficient Jammer Selection Approach for QoS Provisioning in Distributed Wireless Cooperative Networks
13
作者 Ma Yue Wang Li +3 位作者 Ke Tenghui Zhang Yong Song Mei Wang Xiaojun 《China Communications》 SCIE CSCD 2012年第7期90-98,共9页
Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secre... Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secrecy Capacity (SC) to charac terize the security of transmission. In order to ac curately describe the timevarying characteristic, related channels are modeled as FiniteState M ark ov Channels (FSMCs). The remaining energy of candidate node is considered in a similar way. 展开更多
关键词 wireless cooperative network jammer selection secrecy capacity energy balance
下载PDF
Secure Resource Allocation in Device-to-Device Communications Underlaying Cellular Networks
14
作者 Hossein Ghavami Bahareh Akhbari 《China Communications》 SCIE CSCD 2022年第8期149-167,共19页
With increasing the demand for transmitting secure information in wireless networks,deviceto-device(D2D)communication has great potential to improve system performance.As a well-known security risk is eavesdropping in... With increasing the demand for transmitting secure information in wireless networks,deviceto-device(D2D)communication has great potential to improve system performance.As a well-known security risk is eavesdropping in D2D communication,ensuring information security is quite challenging.In this paper,we first obtain the closed-forms of the secrecy outage probability(SOP)and the secrecy ergodic capacity(SEC)for direct and decodeand-forward(DF)relay modes.Numerical results are presented to verify the theoretical results,and these results show the cases that the DF relay mode improves security performance compared to the direct mode at long distances between the transmitter and receiver nodes.Further,we look into the optimization problems of secure resource allocation in D2D communication to maximize the SEC and to minimize the SOP by considering the strictly positive secrecy capacity constraint as a mixed-integer non-linear programming(MINLP)problem.In the continue,we convert the MINLP to convex optimization.Finally,we solve this program with a dual method and obtain an optimal solution in the direct and DF relay modes. 展开更多
关键词 D2D communication secrecy ergodic capacity secrecy outage probability secrecy resource allocation Convex optimization
下载PDF
Enhancing Security in Multicellular Multicast Channels Reducing Interference Power with the Best Relay Selection
15
作者 Shaikh Muhammad Rizwan Ali Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第1期1-26,共26页
The capacity of wireless networks is fundamentally limited by interference. A few research has focused on the study of the simultaneous effect of interference and correlation, and less attention has been paid to the t... The capacity of wireless networks is fundamentally limited by interference. A few research has focused on the study of the simultaneous effect of interference and correlation, and less attention has been paid to the topic of canceling simultaneous effect of interference and correlation until recently. This paper considers a secure wireless multicasting scenario through multicellular networks over spatially correlated Nakagami-<i>m</i> fading channel in the presence of multiple eavesdroppers. Authors are interested to protect the desired signals from eavesdropping considering the impact of perfect channel estimation (PCE) with interference and correlation. The protection of eavesdropping is also made strong reducing the simultaneous impact of interference and correlation on the secrecy multicast capacity employing opportunistic relaying technique. In terms of the signal-to-interference plus noise ratio (SINR), fading parameter, correlation coefficient, the number of multicast users and eavesdroppers and the number of antennas at the multicast users and eavesdroppers, the closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting to understand the insight of the effects of aforementioned parameters. The results show that the simultaneous effects of correlation and interference at the multicast users degrade security in multicasting. Moreover, the security in multicasting degrades with the intensity of fading and the number of multicast users, eavesdroppers and antennas at the eavesdroppers. The effects of these parameters on the security in multicasting can be significantly reduced by using opportunistic relaying technique with PCE. Finally, the analytical results are verified via Monte-Carlo simulation to justify the validity of derived closed-form analytical expressions. 展开更多
关键词 Correlation Interference Power Multicellular Multicast Channel Nakagami-m Fading Opportunistic Relaying Probability of Non-Zero secrecy Multicast capacity Secure Outage Probability for Multicasting
下载PDF
Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing
16
作者 Mohammad Mahmud Hasan Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期72-90,共19页
The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by th... The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel. 展开更多
关键词 Orthogonal Space-Frequency Block Coding Orthogonal Frequency Division Multiplexing Probability of Non-Zero secrecy Multicast capacity Secure Outage Probability for Multicasting
下载PDF
Enhancement of Multicast Security with Opportunistic Relaying Technique over κ-μ Shadowed Fading Channels
17
作者 Ashik Alam Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期121-137,共17页
The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i... The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers. 展开更多
关键词 Opportunistic Relaying Probability of Non-Zero secrecy Multicast capacity (PNSMC) Secure Wireless Multicasting Secure Outage Probability for Multicasting (SOPM) κ-μ Shadowed Fading Channel
下载PDF
Enhancing Security in Correlated Nakagami-m Fading Cellular Network Using SC and SSC Diversity Combining
18
作者 S. M. Rizwan Ali M. Z. I. Sarkar 《Wireless Engineering and Technology》 2022年第1期1-17,共17页
The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quan... The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quantify as the diversity scheme is more efficient in enhancing the security of cellular multicast network mitigating the effects of correlation. Motivated by this issue, this paper considers a secure wireless multicasting scenario through correlated cellular networks in the presence of multiple eavesdroppers. The selection combining (SC) and switch and stay combining (SSC) techniques are considered in dual arbitrarily correlated Nakagami-m fading channels. The closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived to understand the insight into the effects of correlation on the SC and SSC diversity schemes and to quantify which diversity scheme is more efficient in enhancing the security of correlated multicast networks. The results show that, although the diversity gain reduces the effect of correlation, the diversity gain provided by the SC diversity scheme is more significant in mitigating the effect of correlation compared to the SSC diversity scheme. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of the eavesdropper’s channel compared to the case of the SSC diversity scheme. 展开更多
关键词 Arbitrarily Correlated Nakagami-m Fading Cellular Multicast Channel Probability of Non-Zero secrecy Multicast capacity SC and SSC Diversity Schemes Secure Outage Probability for Multicasting
下载PDF
Secrecy performance analysis of single-input multiple-output generalized-K fading channels 被引量:1
19
作者 Hong-jiang LEI Imran Shafique ANSARI +3 位作者 Chao GAO Yong-cai GUO Gao-feng PAN Khalid A. QARAQE 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第10期1074-1084,共11页
In this paper, the transmission of confidential messages through single-input multiple-output (SIMO) independent and identically generMized-K (KG) fading channels is considered, where the eavesdropper overhears th... In this paper, the transmission of confidential messages through single-input multiple-output (SIMO) independent and identically generMized-K (KG) fading channels is considered, where the eavesdropper overhears the transmission from the transmitter to the receiver. Both the receiver and the eavesdropper are equipped with multiple antennas, and both active and passive eavesdroppings are considered where the channel state information of the eavesdropper's channel is or is not available at the transmitter. The secrecy performance of SIMO KG systems is investigated. Analytical expressions for secrecy outage probability and average secrecy capacity of SIMO systems are derived via two different methods, in which KG distribution is approximated by the Gamma and mixture Gamma distributions, respectively. Numerical results are presented and verified via the Monte-Carlo simulation. 展开更多
关键词 Physical-layer security Generalized-K fading Average secrecy capacity secrecy outage probability Mixture Gamma distribution
原文传递
Generic security analysis framework for quantum secure direct communication 被引量:9
20
作者 Zhang-Dong Ye Dong Pan +3 位作者 Zhen Sun Chun-Guang Du Liu-Guo Yin Gui-Lu Long 《Frontiers of physics》 SCIE CSCD 2021年第2期23-31,共9页
Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users.The past two decades have witnessed its great strides both theoretically and experi... Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users.The past two decades have witnessed its great strides both theoretically and experimentally.However,the security analysis of it still stays in its infant.Some practical problems in this field to be solved urgently,such as detector efficiency mismatch,side-channel effect and source imperfection,are propelling the birth of a more impeccable solution.In this paper,we establish a new framework of the security analysis driven by numerics where all the practical problems may be taken into account naturally.We apply this framework to several variations of the DL04 protocol considering real-world experimental conditions.Also,we propose two optimizing methods to process the numerical part of the framework so as to meet different requirements in practice.With these properties considered,we predict the robust framework would open up a broad avenue of the development in the field. 展开更多
关键词 quantum secure direct communication(QSDC) practical security analysis secrecy capacity optimization detectory efficiency mismatch convex optimization
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部