期刊文献+
共找到100篇文章
< 1 2 5 >
每页显示 20 50 100
Physical-Layer Secret Key Generation for Dual-Task Scenarios
1
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
2
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code
3
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
下载PDF
Physical-Layer Key Generation Based on Multipath Channel Diversity Using Dynamic Metasurface Antennas
4
作者 Zheng Wan Yangming Lou +4 位作者 Xiaoming Xu Jinmei Yang Wenyu Jiang Kaizhi Huang Liang Jin 《China Communications》 SCIE CSCD 2023年第4期153-166,共14页
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-... Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes. 展开更多
关键词 physical layer security multipath channel diversity physical layer key generation dynamic metasurface antennas
下载PDF
Novel E2E-QoE Metric for PHY Optimization:A Cross-Layered Framework
5
作者 Lei Ji Hao Wang Hongxiang Xie 《China Communications》 SCIE CSCD 2023年第4期167-179,共13页
Existing systems use key performance indicators(KPIs)as metrics for physical layer(PHY)optimization,which suffers from the problem of overoptimization,because some unnecessary PHY enhancements are imperceptible to ter... Existing systems use key performance indicators(KPIs)as metrics for physical layer(PHY)optimization,which suffers from the problem of overoptimization,because some unnecessary PHY enhancements are imperceptible to terminal users and thus induce additional cost and energy waste.Therefore,it is necessary to utilize directly the quality of experience(QoE)of user as a metric of optimization,which can achieve the global optimum of QoE under cost and energy constraints.However,QoE is still a metric of application layer that cannot be easily used to design and optimize the PHY.To address this problem,we in this paper propose a novel end-to-end QoE(E2E-QoE)based optimization architecture at the user-side for the first time.Specifically,a cross-layer parameterized model is proposed to establish the relationship between PHY and E2E-QoE.Based on this,an E2E-QoE oriented PHY anomaly diagnosis method is further designed to locate the time and root cause of anomalies.Finally,we investigate to optimize the PHY algorithm directly based on the E2E-QoE.The proposed frameworks and algorithms are all validated using the data from real fifth-generation(5G)mobile system,which show that using E2E-QoE as the metric of PHY optimization is feasible and can outperform existing schemes. 展开更多
关键词 quality of experience(QoE) performance metric physical layer optimization cross-layer framework
下载PDF
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
6
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 Cognitive Radio Networks Non-Orthogonal Multiple Access Physical layer Security Sum of Safety Rates
下载PDF
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
7
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio
8
作者 Baofeng Ji Yifan Liu +6 位作者 Tingpeng Li Ling Xing Weixing Wang Shahid Mumtaz Xiaolong Shang Wanying Liu Congzheng Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期679-689,共11页
With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channe... With the development of information technology,more and more devices are connected to the Internet through wireless communication to complete data interconnection.Due to the broadcast characteristics ofwireless channels,wireless networks have suffered more and more malicious attacks.Physical layer security has received extensive attention from industry and academia.MIMO is considered to be one of the most important technologies related to physical layer security.Through beamforming technology,messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users.Combining the symbiotic radio(SR)technology,this paper considers a symbiotic radio antijamming MIMO system equipped with a multi-antenna system at the main base station.In order to avoid the interference signal and improve the SINR of the signal received by the user.The base station is equipped with a uniform rectangular antenna array,and using Null Space Projection(NSP)Beamforming,Intelligent Reflecting Surface(IRS)can assist in changing the beam’s angle.The simulation results show that NSP Beamforming could make a better use of the null space of interference,which can effectively improve the received SINR of users under directional interference,and improve the utilization efficiency of signal energy. 展开更多
关键词 Symbiotic radio ANTI-JAMMING MIMO NSP Beamforming physical layer security
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
9
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
RIS-Assisted Cell-Free MIMO: A Survey
10
作者 ZHAO Yaqiong KE Hongqin +2 位作者 XU Wei YE Xinquan CHEN Yijian 《ZTE Communications》 2024年第1期77-86,共10页
Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive ... Cell-free(CF)multiple-input multiple-output(MIMO)is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications.Compared to traditional co-located massive MIMO,CF MIMO allows geographically distributed access points(APs)to serve all users on the same time-frequency resource with spatial multiplexing techniques,resulting in better performance in terms of both spectral efficiency and coverage enhancement.However,the performance gain is achieved at the expense of deploying more APs with high cost and power consumption.To address this issue,the recently proposed reconfigurable intelligent surface(RIS)technique stands out with its unique advantages of low cost,low energy consumption and programmability.In this paper,we provide an overview of RIS-assisted CF MIMO and its interaction with advanced optimization designs and novel applications.Particularly,recent studies on typical performance metrics such as energy efficiency(EE)and spectral efficiency(SE)are surveyed.Besides,the application of RIS-assisted CF MIMO techniques in various future communication systems is also envisioned.Additionally,we briefly discuss the technical challenges and open problems for this area to inspire research direction and fully exploit its potential in meeting the demands of future wireless communication systems. 展开更多
关键词 mmWave beyond 5G(B5G) Internet of Everything(IoE) cell-free MIMO RIS unmanned aerial vehicle(UAV) physical layer security(PLS) wireless energy transfer(WET)
下载PDF
Deep Learning for Wireless Physical Layer: Opportunities and Challenges 被引量:56
11
作者 Tianqi Wang Chao-Kai Wen +3 位作者 Hanqing Wang Feifei Gao Tao Jiang Shi Jin 《China Communications》 SCIE CSCD 2017年第11期92-111,共20页
Machine learning(ML) has been widely applied to the upper layers of wireless communication systems for various purposes, such as deployment of cognitive radio and communication network. However, its application to the... Machine learning(ML) has been widely applied to the upper layers of wireless communication systems for various purposes, such as deployment of cognitive radio and communication network. However, its application to the physical layer is hampered by sophisticated channel environments and limited learning ability of conventional ML algorithms. Deep learning(DL) has been recently applied for many fields, such as computer vision and natural language processing, given its expressive capacity and convenient optimization capability. The potential application of DL to the physical layer has also been increasingly recognized because of the new features for future communications, such as complex scenarios with unknown channel models, high speed and accurate processing requirements; these features challenge conventional communication theories. This paper presents a comprehensive overview of the emerging studies on DL-based physical layer processing, including leveraging DL to redesign a module of the conventional communication system(for modulation recognition, channel decoding, and detection) and replace the communication system with a radically new architecture based on an autoencoder. These DL-based methods show promising performance improvements but have certain limitations, such as lack of solid analytical tools and use of architectures that are specifically designed for communication and implementation research, thereby motivating future research in this field. 展开更多
关键词 wireless communications deep learning physical layer
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
12
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:4
13
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
14
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5
15
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
下载PDF
A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems 被引量:2
16
作者 Chu Chu Zhong Huang +2 位作者 Rui Xu Guangjun Wen Lilan Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期1705-1724,共20页
Blocker tag attack is one of the denial-of-service(DoS)attacks that threatens the privacy and security of RFID systems.The attacker interferes with the blocked tag by simulating a fake tag with the same ID,thus causin... Blocker tag attack is one of the denial-of-service(DoS)attacks that threatens the privacy and security of RFID systems.The attacker interferes with the blocked tag by simulating a fake tag with the same ID,thus causing a collision of message replies.In many practical scenarios,the number of blocked tags may vary,or even be small.For example,the attacker may only block the important customers or high-value items.To avoid the disclosure of privacy and economic losses,it is of great importance to fast pinpoint these blocked ones.However,existing works do not take into account the impact of the number of blocked tags on the execution time and suffer from incomplete identification of blocked tags,long identification time or privacy leakage.To overcome these limits,we propose a cross layer blocked tag identification protocol(CLBI).CLBI consists of multiple rounds,in which it enables multiple unblocked tags to select one time slot and concurrently verify them by using tag estimation in physical layer.Benefiting from the utilization of most collision slots,the execution time can be greatly reduced.Furthermore,for efficient identification of blocked tags under different proportions,we propose a hybrid protocol named adaptive cross layer blocked tag identification protocol(A-CLBI),which estimates the remaining blocked tag in each round and adjusts the identification strategy accordingly.Extensive simulations show that our protocol outperforms state-of-the-art blocked tags identification protocol. 展开更多
关键词 RFID blocked tag physical layer ESTIMATION IDENTIFICATION
下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
17
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
下载PDF
Catalyzing Random Access at Physical Layer for Internet of Things:An Intelligence Enabled User Signature Code Acquisition Approach 被引量:1
18
作者 Xiaojie Fang Xinyu Yin +2 位作者 Xuejun Sha Jinghui Qiu Hongli Zhang 《China Communications》 SCIE CSCD 2021年第10期181-192,共12页
Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access atte... Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity. 展开更多
关键词 Internet of Things(IoT) artificial intelligence physical layer CROSS-ENTROPY random access
下载PDF
Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications 被引量:1
19
作者 Muhammad Waqas Shehr Bano +3 位作者 Fatima Hassan Shanshan Tu Ghulam Abbas Ziaul Haq Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第12期4489-4499,共11页
Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between... Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time. 展开更多
关键词 Physical layer authentication machine learning cyber-physical systems SECURITY
下载PDF
Toward intelligent wireless communications:Deep learning-based physical layer technologies 被引量:1
20
作者 Siqi Liu Tianyu Wang Shaowei Wang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期589-597,共9页
Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability,low latency,and massive access.Deep Learning(DL),on... Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability,low latency,and massive access.Deep Learning(DL),one of the most exciting developments in machine learning and big data,has recently shown great potential in the study of wireless communications.In this article,we provide a literature review on the applications of DL in the physical layer.First,we analyze the limitations of existing signal processing techniques in terms of model accuracy,global optimality,and computational scalability.Next,we provide a brief review of classical DL frameworks.Subsequently,we discuss recent DL-based physical layer technologies,including both DL-based signal processing modules and end-to-end systems.Deep neural networks are used to replace a single or several conventional functional modules,whereas the objective of the latter is to replace the entire transceiver structure.Lastly,we discuss the open issues and research directions of the DL-based physical layer in terms of model complexity,data quality,data representation,and algorithm reliability. 展开更多
关键词 DATA-DRIVEN Deep learning Physical layer Wireless communications
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部