期刊文献+
共找到76篇文章
< 1 2 4 >
每页显示 20 50 100
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
1
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security 被引量:3
2
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 CSCD 2020年第1期356-373,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security
3
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 2018年第1期1030-1047,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
4
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 Cognitive Radio Networks Non-Orthogonal Multiple Access Physical Layer security Sum of Safety Rates
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
5
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio
6
作者 Baofeng Ji Yifan Liu +6 位作者 Tingpeng Li Ling Xing Weixing Wang Shahid Mumtaz Xiaolong Shang Wanying Liu Congzheng Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期679-689,共11页
With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channe... With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channels,wireless networks have suffered more and more malicious attacks.Physical layer security has received extensive attention from industry and academia.MIMO is considered to be one of the most important technologies related to physical layer security.Through beamforming technology,messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users.Combining the symbiotic radio(SR)technology,this paper considers a symbiotic radio antijamming MIMO system equipped with a multi-antenna system at the main base station.In order to avoid the interference signal and improve the SINR of the signal received by the user.The base station is equipped with a uniform rectangular antenna array,and using Null Space Projection(NSP)Beamforming,Intelligent Reflecting Surface(IRS)can assist in changing the beam’s angle.The simulation results show that NSP Beamforming could make a better use of the null space of interference,which can effectively improve the received SINR of users under directional interference,and improve the utilization efficiency of signal energy. 展开更多
关键词 Symbiotic radio ANTI-JAMMING MIMO NSP Beamforming physical layer security
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
7
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
RIS-Assisted Cell-Free MIMO: A Survey
8
作者 ZHAO Yaqiong KE Hongqin +2 位作者 XU Wei YE Xinquan CHEN Yijian 《ZTE Communications》 2024年第1期77-86,共10页
Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive ... Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive MIMO,CF MIMO allows geographically distributed access points(APs)to serve all users on the same time-frequency resource with spatial multiplexing techniques,resulting in better performance in terms of both spectral efficiency and coverage enhancement.However,the performance gain is achieved at the expense of deploying more APs with high cost and power consumption.To address this issue,the recently proposed reconfigurable intelligent surface(RIS)technique stands out with its unique advantages of low cost,low energy consumption and programmability.In this paper,we provide an overview of RIS-assisted CF MIMO and its interaction with advanced optimization designs and novel applications.Particularly,recent studies on typical performance metrics such as energy efficiency(EE)and spectral efficiency(SE)are surveyed.Besides,the application of RIS-assisted CF MIMO techniques in various future communication systems is also envisioned.Additionally,we briefly discuss the technical challenges and open problems for this area to inspire research direction and fully exploit its potential in meeting the demands of future wireless communication systems. 展开更多
关键词 mmWave beyond 5G(B5G) Internet of Everything(IoE) cell-free MIMO RIS unmanned aerial vehicle(UAV) physical layer security(PLS) wireless energy transfer(WET)
下载PDF
Security Enhancement of UAV Swarm Enabled Relaying Systems with Joint Beamforming and Resource Allocation 被引量:5
9
作者 Runze Dong Buhong Wang Kunrui Cao 《China Communications》 SCIE CSCD 2021年第9期71-87,共17页
The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable a... The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable attention.This paper considers a UAV Swarm enabled relaying communication system,where multiple UAV relays are organized via coordinated multiple points(CoMP)as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper.In order to maximize achievable secrecy rate of downlink,we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding,and both amplify-and-forward(AF)and decode-andforward(DF)protocols are considered on the UAV swarm.Due to the non-convexity of the joint optimization problem,we propose an alternating optimization(AO)algorithm to decompose it into two subproblems utilizing block coordinate descent technique,then each subproblem is solved by successive convex optimization method.Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies. 展开更多
关键词 UAV swarm physical layer security BEAMFORMING bandwidth allocation optimization
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
10
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:4
11
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
下载PDF
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:3
12
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5
13
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
14
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
下载PDF
Coalitional Game Based Joint Beamforming and Power Control for Physical Layer Security Enhancement in Cognitive IoT Networks
15
作者 Zhaoye Xu Aiyan Qu Kang An 《China Communications》 SCIE CSCD 2021年第12期139-150,共12页
In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme i... In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme is proposed to im-prove the achievable security of cognitive IoT de-vices.Specifically,the secondary network consisting of a muti-antenna secondary transmitter,multiple sec-ondary users(SUs),is allowed to access the licensed spectrum resource of primary user(PU)with underlay approach in the presence of an unauthorized eaves-dropper.Based on the Merge-Split-Rule,coalitional game is formulated among distributed secondary users with cooperative receive beamforming.Then,an alter-native optimization method is used to obtain the op-timized beamforming and power allocation schemes by applying the up-downlink duality.The simulation results demonstrate the effectiveness of our proposed scheme in improving the SU’s secrecy rate and system utility while guaranteeing PU’s interference thresh-old. 展开更多
关键词 physical layer secure transmission IOT coalitional game alternative optimization method
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
16
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 Physical layer security Full-duplex SELF-INTERFERENCE Eavesdropping CSI MULTI-ANTENNA
下载PDF
Physical Layer Security for MmWave Communications:Challenges and Solutions
17
作者 HE Miao LI Xiangman NI Jianbing 《ZTE Communications》 2022年第4期41-51,共11页
The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,a... The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,autonomous vehicles and remotely con⁃trolled robots.For this reason,information security,in terms of the confidentiality,integrity and availability(CIA),becomes more important in the mmWave communication than ever since.The physical layer security(PLS),which is based on the information theory and focuses on the secrecy capacity of the wiretap channel model,is a cost effective and scalable technique to protect the CIA,compared with the traditional cryptographic techniques.In this paper,the theory foundation of PLS is briefly introduced together with the typical PLS performance metrics secrecy rate and outage probability.Then,the most typical PLS techniques for mmWave are introduced,analyzed and compared,which are classified into three major categories of directional modulation(DM),artificial noise(AN),and directional precoding(DPC).Finally,several mmWave PLS research problems are briefly discussed,including the low-complexity DM weight vector codebook construction,impact of phase shifter(PS)with finite precision on PLS,and DM-based communications for multiple target receivers. 展开更多
关键词 mmWave communication physical layer security phased array directional modulation
下载PDF
Physical Layer Security for Wireless and Quantum Communications
18
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security Physical Layer security for Wireless and Quantum Communications
下载PDF
Jamming-Aided Secure Communication in Ultra-Dense LEO Integrated Satellite-Terrestrial Networks 被引量:2
19
作者 Yongpeng Shi Jiajia Liu +1 位作者 Jiadai Wang Yijie Xun 《China Communications》 SCIE CSCD 2023年第7期43-56,共14页
The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open nat... The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open natures of satellite links also reveal many challenges for transmission security protection,especially for eavesdropping defence.How to efficiently take advantage of the LEO satellite’s density and ensure the secure communication by leveraging physical layer security with the cooperation of jammers deserves further investigation.To our knowledge,using satellites as jammers in UDLEO-ISTN is still a new problem since existing works mainly focused on this issue only from the aspect of terrestrial networks.To this end,we study in this paper the cooperative secrecy communication problem in UDLEOISTN by utilizing several satellites to send jamming signal to the eavesdroppers.An iterative scheme is proposed as our solution to maximize the system secrecy energy efficiency(SEE)via jointly optimizing transmit power allocation and user association.Extensive experiment results verify that our designed optimization scheme can significantly enhance the system SEE and achieve the optimal power allocation and user association strategies. 展开更多
关键词 ultra-dense LEO satellite integrated satellite-terrestrial network physical layer security cooperative jamming
下载PDF
Secrecy Transmission of NOMA-OTFS Based Multicast-Unicast Streaming 被引量:1
20
作者 Junfan Hu Jia Shi +4 位作者 Xianyu Wang Xiaoju Lu Zan Li Zhuangzhuang Tie Quanxue Gao 《China Communications》 SCIE CSCD 2023年第1期1-13,共13页
This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based ort... This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based orthogonal time frequency space(OTFS)transmission scheme,namely NOMAOTFS,in order to combat Doppler effect as well as to improve the spectral efficiency.Further,we propose a power allocation method addressing the trade-off between the reliability of multicast streaming and the confidentiality of unicast streaming.Based on that,we utilize the relay selection strategy,to improve the security of unicast streaming.In the context of multicastunicast streaming,our simulation findings validate the effectiveness of the NOMA-OTFS based cooperative transmission,which can significantly outperform the existing NOMA-OFDM in terms of both reliability and security. 展开更多
关键词 OTFS NOMA physical layer security multicast-unicast
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部