期刊文献+
共找到93篇文章
< 1 2 5 >
每页显示 20 50 100
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
1
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 Cognitive Radio Networks Non-Orthogonal Multiple Access physical layer security Sum of Safety Rates
下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:8
2
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
3
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5
4
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
5
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
6
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
下载PDF
Physical Layer Security in MIMO Wiretap Channels with Antenna Correlation 被引量:4
7
作者 Gangcan Sun Zhuo Han +2 位作者 Jingbo Jiao Zhongyong Wang Dagang Wang 《China Communications》 SCIE CSCD 2017年第8期149-156,共8页
To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Div... To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Diversity order and array gain were also achieved for further insight. The study was based on the information theory that physical layer security can be guaranteed when the quality of the main channel is higher than that of the eavesdropper's channel. Monte Carlo simulations well validated the numerical results of analytic expressions. It was shown that antenna correlation is detrimental to secrecy performance when average SNR of the main channel is at medium and high level. Interestingly, when average SNR of the main channel reduces to low level, the effect of antenna correlation becomes benefi cial to secrecy performance. 展开更多
关键词 physical layer security antenna correlation wiretap channels outage probability Nakagami-m fading
下载PDF
Performance Analysis of Physical Layer Security over α-η-κ-μ Fading Channels 被引量:1
8
作者 Shaobo Jia Jiayan Zhang +1 位作者 Honglin Zhao Yao Xu 《China Communications》 SCIE CSCD 2018年第11期138-148,共11页
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,... In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model. 展开更多
关键词 physical layer security α-η-κ-μgeneralized fading channels average secrecycapacity secrecy outage probability
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
9
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 physical layer security Full-duplex SELF-INTERFERENCE Eavesdropping CSI MULTI-ANTENNA
下载PDF
Physical Layer Security for MmWave Communications:Challenges and Solutions
10
作者 HE Miao LI Xiangman NI Jianbing 《ZTE Communications》 2022年第4期41-51,共11页
The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,a... The mmWave communication is a promising technique to enable human commutation and a large number of machine-type commu⁃nications of massive data from various non-cellphone devices like Internet of Things(IoT)devices,autonomous vehicles and remotely con⁃trolled robots.For this reason,information security,in terms of the confidentiality,integrity and availability(CIA),becomes more important in the mmWave communication than ever since.The physical layer security(PLS),which is based on the information theory and focuses on the secrecy capacity of the wiretap channel model,is a cost effective and scalable technique to protect the CIA,compared with the traditional cryptographic techniques.In this paper,the theory foundation of PLS is briefly introduced together with the typical PLS performance metrics secrecy rate and outage probability.Then,the most typical PLS techniques for mmWave are introduced,analyzed and compared,which are classified into three major categories of directional modulation(DM),artificial noise(AN),and directional precoding(DPC).Finally,several mmWave PLS research problems are briefly discussed,including the low-complexity DM weight vector codebook construction,impact of phase shifter(PS)with finite precision on PLS,and DM-based communications for multiple target receivers. 展开更多
关键词 mmWave communication physical layer security phased array directional modulation
下载PDF
Physical Layer Security for Wireless and Quantum Communications
11
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security physical layer security for Wireless and Quantum Communications
下载PDF
MP-WFRFT and Constellation Scrambling Based Physical Layer Security System 被引量:28
12
作者 FANG Xiaojie SHA Xuejun LI Yue 《China Communications》 SCIE CSCD 2016年第2期138-145,共8页
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two... In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers. 展开更多
关键词 weighted fractional Fourier transform(WFRFT) physical layer (PHY) security secrecycapacity
下载PDF
Coalitional Game Based Joint Beamforming and Power Control for Physical Layer Security Enhancement in Cognitive IoT Networks
13
作者 Zhaoye Xu Aiyan Qu Kang An 《China Communications》 SCIE CSCD 2021年第12期139-150,共12页
In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme i... In this paper,the physical layer se-cure transmission in multi-antenna multi-user cogni-tive internet-of-thing(IoT)network is investigated,where the coalitional game based joint beamform-ing and power control scheme is proposed to im-prove the achievable security of cognitive IoT de-vices.Specifically,the secondary network consisting of a muti-antenna secondary transmitter,multiple sec-ondary users(SUs),is allowed to access the licensed spectrum resource of primary user(PU)with underlay approach in the presence of an unauthorized eaves-dropper.Based on the Merge-Split-Rule,coalitional game is formulated among distributed secondary users with cooperative receive beamforming.Then,an alter-native optimization method is used to obtain the op-timized beamforming and power allocation schemes by applying the up-downlink duality.The simulation results demonstrate the effectiveness of our proposed scheme in improving the SU’s secrecy rate and system utility while guaranteeing PU’s interference thresh-old. 展开更多
关键词 physical layer secure transmission IOT coalitional game alternative optimization method
下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
14
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 physical layer security 3D positioning 6G communications UAV systems
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
15
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
A Physical Security Technology Based upon Doubly Multiple Parameters Weighted Fractional Fourier Transform
16
作者 Li Yong Sun Teng +2 位作者 Sha Xuejun Song Zhiqun Wang Bin 《China Communications》 SCIE CSCD 2024年第10期200-209,共10页
Enhancing the security of the wireless communication is necessary to guarantee the reliable of the data transmission, due to the broadcast nature of wireless channels. In this paper, we provide a novel technology refe... Enhancing the security of the wireless communication is necessary to guarantee the reliable of the data transmission, due to the broadcast nature of wireless channels. In this paper, we provide a novel technology referred to as doubly multiple parameters weighted fractional Fourier transform(DMWFRFT), which can strengthen the physical layer security of wireless communication. This paper introduces the concept of DM-WFRFT based on multiple parameters WFRFT(MP-WFRFT), and then presents its four properties. Based on these properties, the parameters decryption probability is analyzed in terms of the number of parameters. The number of parameters for DM-WFRFT is more than that of the MP-WFRFT,which indicates that the proposed scheme can further strengthen the the physical layer security. Lastly, some numerical simulations are carried out to illustrate that the efficiency of proposed DM-WFRFT is related to preventing eavesdropping, and the effect of parameters variety on the system performance is associated with the bit error ratio(BER). 展开更多
关键词 doubly multiple parameters weighted fractional Fourier transform(DM-WFRFT) physical layer security transform parameters variety
下载PDF
Aerial RIS-aided physical layer security design for satellitecommunication among similar channels
17
作者 Chengjun Jiang Chensi Zhang +2 位作者 Leilei Mu Zhe Zhang Jianhua Ge 《Journal of Information and Intelligence》 2023年第1期54-67,共14页
Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication netwo... Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication networks. The satellite communications security is often threatened dueto its broadcasting nature. To enhance the physical layer security (PLS) of satellite communications with channel similarity, an aerial RIS-aided dual full-duplex (DFD-ARIS) cooperative jamming method is presented in this paper. Specifically, unlike the existing works that relied onchannel difference, DFD-ARIS utilizes the channel similarity against the eavesdroppers with thehelp of ARIS. In addition, the power allocation is further studied in conjunction with the phasedesign of RIS to minimize the total power under the constraints of data rate, satellite powerlimitation and secrecy rate. Then, the closed-form solutions are achieved. Simulation results showthat the performance of the proposed scheme is superior to the traditional method. 展开更多
关键词 Reconfigurable intelligent surface(RIS) Satellite communication physical layer security(PLS) Cooperative jamming Power allocation
原文传递
Physical-Layer Key Generation Based on Multipath Channel Diversity Using Dynamic Metasurface Antennas
18
作者 Zheng Wan Yangming Lou +4 位作者 Xiaoming Xu Jinmei Yang Wenyu Jiang Kaizhi Huang Liang Jin 《China Communications》 SCIE CSCD 2023年第4期153-166,共14页
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-... Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes. 展开更多
关键词 physical layer security multipath channel diversity physical layer key generation dynamic metasurface antennas
下载PDF
Physical layer security strategies for downlink heterogeneous cloud radio access networks 被引量:1
19
作者 YAN Shi WANG Wen-bo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第5期47-54,60,共9页
Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concr... Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance. 展开更多
关键词 C-RAN Poisson point process (PPP) physical layer security HETEROGENEOUS
原文传递
Physical layer security enhanced system with under-sampling spectrum-sparse signals 被引量:1
20
作者 Li Lintao Liu Yuanan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第4期8-16,共9页
The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues.A practical secure transmission scheme based on under-sampling spectrum-sparse signals is designed.Secur... The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues.A practical secure transmission scheme based on under-sampling spectrum-sparse signals is designed.Secure transmission is initialized as the intended receiver transmits a pilot signal for the transmitter,to perform channel sounding and clock synchronization according to the channel reciprocal principle.Then,sampling clock offset compensation and precoding method based on channel state information(CSI)can be conducted at the transmitter's end.Because the intended receiver adopts an under-sampling method based on active aliasing which depends very sensitively on accurate sampling clock and CSI,the eavesdroppers can hardly intercept the signal.Closed form expression of symbol error rate(SER)at the intended receiver's end and secrecy capacity in fading wiretap channel has been derived.Numerical evaluation and simulations are carried out to validate the effectiveness of the proposed strategy. 展开更多
关键词 physical layer security spectrum-sparse signal secrecy capacity
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部