Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS...Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications.展开更多
With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are gre...With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.展开更多
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ...The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.展开更多
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco...We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.展开更多
In this study, a new controller for chaos synchronization is proposed. It consists of a state feedback controller and a robust control term using Legendre polynomials to compensate for uncertainties. The truncation er...In this study, a new controller for chaos synchronization is proposed. It consists of a state feedback controller and a robust control term using Legendre polynomials to compensate for uncertainties. The truncation error is also considered. Due to the orthogonal functions theorem, Legendre polynomials can approximate nonlinear functions with arbitrarily small approximation errors. As a result, they can replace fuzzy systems and neural networks to estimate and compensate for uncertainties in control systems. Legendre polynomials have fewer tuning parameters than fuzzy systems and neural networks. Thus, their tuning process is simpler. Similar to the parameters of fuzzy systems, Legendre coefficients are estimated online using the adaptation rule obtained from the stability analysis. It is assumed that the master and slave systems are the Lorenz and Chen chaotic systems, respectively. In secure communication systems, observer-based synchronization is required since only one state variable of the master system is sent through the channel. The use of observer-based synchronization to obtain other state variables is discussed. Simulation results reveal the effectiveness of the proposed approach. A comparison with a fuzzy sliding mode controller shows that the proposed controller provides a superior transient response. The problem of secure communications is explained and the controller performance in secure communications is examined.展开更多
Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking meth...Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.展开更多
Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter ...Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter servers to collect and broadcast related parameters due to the advantages of easy deployment and high flexibility.However,the challenge of limited energy restricts the populariza⁃tion of UAV-enabled FL applications.An airground integrated low-energy federated learning framework is proposed,which minimizes the overall energy consumption of application communication while maintaining the quality of the FL model.Specifically,a hierarchical FL framework is proposed,where base stations(BSs)aggregate model parameters updated from their surrounding users separately and send the aggregated model parameters to the server,thereby reducing the energy consumption of communication.In addition,we optimize the deploy⁃ment of UAVs through a deep Q-network approach to minimize their energy consumption for transmission as well as movement,thus improv⁃ing the energy efficiency of the airground integrated system.The evaluation results show that our proposed method can reduce the system en⁃ergy consumption while maintaining the accuracy of the FL model.展开更多
With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in ...With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in the system,the scenario includes multiple source stations,multiple relay stations,multiple destination stations,and eavesdroppers.To analyze the optimal relay selection in the system,we begin with the performance analysis for a single source station and a single destination station.By applying two cooperative models,the amplify-andforward(AF) mode and decode-and-forward(DF)mode,the secrecy capacity is derived.Then,we apply the derived results to the considered environment to find the optimal relay assignment.By the way,the relay selection can be obtained by the exhaustive search algorithm.However,there are a lot of steps needed if the number of source stations is large.Hence,applying the characters of the cooperative modes in the relay selection,the pre-selection step is proposed with a mathematical derivation.It could be used for the practical situation without a long-time calculation.展开更多
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.展开更多
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne...Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.展开更多
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N...Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.展开更多
Satellite communications have attracted significant interests due to its advantages of large footprint and massive access.However,the commonly used onboard beamforming is hard to achieve reliable security because of t...Satellite communications have attracted significant interests due to its advantages of large footprint and massive access.However,the commonly used onboard beamforming is hard to achieve reliable security because of the highly correlated legitimate and wiretap downlink channels.We exploit the benefits of satellite-terrestrial integrated network(STIN)and a novel absorptive reconfigurable intelligent surface(RIS)for improving the security of satellite downlink communications(SDC)in the presence of eavesdroppers(Eves).This paper aims to maximize the achievable secrecy rate of the earth station(ES)while satisfying the signal reception constraints,harvested power threshold at the RIS,and total transmit power budget.To solve this nonconvex problem,we propose a penalty-function based dual decomposition scheme,which firstly transforms the original problem into a two-layer optimization problem.Then,the outer layer and inner problems are solved by utilizing the successive convex approximation,Lagrange-dual and Rayleigh quotient methods to obtain the beamforming weight vectors and the reflective coefficient matrix.Finally,simulation results verify the effectiveness of the proposed scheme for enhancing the SDC security.展开更多
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum efficiency.Due to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security...Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum efficiency.Due to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wireless system.This paper focuses on maximizing the secrecy sum rate under the constraint of the achievable rate of the legitimate channels.To tackle the non-convexity optimization problem,a reinforcement learning-based alternative optimization algorithm is proposed.Firstly,with the help of successive convex approximations,the optimal power allocation scheme with a given UAV trajectory is obtained by using convex optimization tools.Afterwards,through plenty of explorations of the wireless environment,the Q-learning networks approach the optimal location transition strategy of the UAV,even without the wireless channel state information.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
In mobile edge computing,unmanned aerial vehicles(UAVs)equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility,flexibility,rapid deployment,and terrain...In mobile edge computing,unmanned aerial vehicles(UAVs)equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility,flexibility,rapid deployment,and terrain agnosticism.These attributes enable UAVs to reach designated areas,thereby addressing temporary computing swiftly in scenarios where ground-based servers are overloaded or unavailable.However,the inherent broadcast nature of line-of-sight transmission methods employed by UAVs renders them vulnerable to eavesdropping attacks.Meanwhile,there are often obstacles that affect flight safety in real UAV operation areas,and collisions between UAVs may also occur.To solve these problems,we propose an innovative A*SAC deep reinforcement learning algorithm,which seamlessly integrates the benefits of Soft Actor-Critic(SAC)and A*(A-Star)algorithms.This algorithm jointly optimizes the hovering position and task offloading proportion of the UAV through a task offloading function.Furthermore,our algorithm incorporates a path-planning function that identifies the most energy-efficient route for the UAV to reach its optimal hovering point.This approach not only reduces the flight energy consumption of the UAV but also lowers overall energy consumption,thereby optimizing system-level energy efficiency.Extensive simulation results demonstrate that,compared to other algorithms,our approach achieves superior system benefits.Specifically,it exhibits an average improvement of 13.18%in terms of different computing task sizes,25.61%higher on average in terms of the power of electromagnetic wave interference intrusion into UAVs emitted by different auxiliary UAVs,and 35.78%higher on average in terms of the maximum computing frequency of different auxiliary UAVs.As for path planning,the simulation results indicate that our algorithm is capable of determining the optimal collision-avoidance path for each auxiliary UAV,enabling them to safely reach their designated endpoints in diverse obstacle-ridden environments.展开更多
A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the mask...A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the masking sequence. At the receiver, a non dynamical system which adopts the same nonlinear functions as what is adopted at transmitter is used to retrieve the masking sequence from the received signal and then the message sequence is recovered through subtraction. The results of the theoretical analysis and computer simulation show that the chaotic digital secure communication system presented in this paper has the fine security, high reliability and can be implemented easily.展开更多
The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patie...The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’repositories located in the cloud.The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency,scalability and bandwidth.Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers.Assuming a massive demand of PHR data within a ubiquitous smart city,we propose a secure and fog assisted framework for PHR systems to address security,access control and privacy concerns.Built under a fog-based architecture,the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption(CP-ABE)to guarantee confidentiality and fine-grained access control within the system respectively.We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy.We provide the analysis of the proposed framework in terms of security and performance.展开更多
This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and de...This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.展开更多
We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced wi...We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
基金supported by the National Science Fund for Young Scholars(Grant No.62201539)the Project of Innovation and Entrepreneurship Training for National Undergraduates(Grant No.202210356005)the project of Zhejiang University Student Science and Technology Innovation Activity Plan(Grant No.2023R409055)。
文摘Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications.
文摘With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.
文摘The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.
基金funding from the Australian Government,via grant AUSMURIB000001 associated with ONR MURI Grant N00014-19-1-2571。
文摘We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.
文摘In this study, a new controller for chaos synchronization is proposed. It consists of a state feedback controller and a robust control term using Legendre polynomials to compensate for uncertainties. The truncation error is also considered. Due to the orthogonal functions theorem, Legendre polynomials can approximate nonlinear functions with arbitrarily small approximation errors. As a result, they can replace fuzzy systems and neural networks to estimate and compensate for uncertainties in control systems. Legendre polynomials have fewer tuning parameters than fuzzy systems and neural networks. Thus, their tuning process is simpler. Similar to the parameters of fuzzy systems, Legendre coefficients are estimated online using the adaptation rule obtained from the stability analysis. It is assumed that the master and slave systems are the Lorenz and Chen chaotic systems, respectively. In secure communication systems, observer-based synchronization is required since only one state variable of the master system is sent through the channel. The use of observer-based synchronization to obtain other state variables is discussed. Simulation results reveal the effectiveness of the proposed approach. A comparison with a fuzzy sliding mode controller shows that the proposed controller provides a superior transient response. The problem of secure communications is explained and the controller performance in secure communications is examined.
基金supported by National Natural Science Foundation of China(No.61174034)
文摘Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.
基金supported in part by the National Key Research and Development Program of China under Grant No. 2021ZD0112400the NSFC under Grant No. 62202080+3 种基金the NSFC-Liaoning Province United Foundation under Grant No. U1908214the CCF-Tencent Open Fund under Grant No. IAGR20210116the Fundamental Research Funds for the Central Universities under Grant Nos. DUT21TD107 and DUT20RC(3)039the Liaoning Revitalization Talents Program under Grant No. XLYC2008017
文摘Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter servers to collect and broadcast related parameters due to the advantages of easy deployment and high flexibility.However,the challenge of limited energy restricts the populariza⁃tion of UAV-enabled FL applications.An airground integrated low-energy federated learning framework is proposed,which minimizes the overall energy consumption of application communication while maintaining the quality of the FL model.Specifically,a hierarchical FL framework is proposed,where base stations(BSs)aggregate model parameters updated from their surrounding users separately and send the aggregated model parameters to the server,thereby reducing the energy consumption of communication.In addition,we optimize the deploy⁃ment of UAVs through a deep Q-network approach to minimize their energy consumption for transmission as well as movement,thus improv⁃ing the energy efficiency of the airground integrated system.The evaluation results show that our proposed method can reduce the system en⁃ergy consumption while maintaining the accuracy of the FL model.
文摘With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in the system,the scenario includes multiple source stations,multiple relay stations,multiple destination stations,and eavesdroppers.To analyze the optimal relay selection in the system,we begin with the performance analysis for a single source station and a single destination station.By applying two cooperative models,the amplify-andforward(AF) mode and decode-and-forward(DF)mode,the secrecy capacity is derived.Then,we apply the derived results to the considered environment to find the optimal relay assignment.By the way,the relay selection can be obtained by the exhaustive search algorithm.However,there are a lot of steps needed if the number of source stations is large.Hence,applying the characters of the cooperative modes in the relay selection,the pre-selection step is proposed with a mathematical derivation.It could be used for the practical situation without a long-time calculation.
基金supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
文摘With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.
基金supported in part by the Natural Science Foundation of Shaanxi Province under Grant Number 2021JM-143the Fundamental Research Funds for the Central Universities under Grant Number JB211502+5 种基金the Project of Key Laboratory of Science and Technology on Communication Network under Grant Number 6142104200412the National Natural Science Foundation of China under Grant Number 61672410the Academy of Finland under Grant Number 308087the China 111 project under Grant Number B16037JSPS KAKENHI under Grant Number JP20K14742and the Project of Cyber Security Establishment with Inter University Cooperation.
文摘Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
基金supported by the National Natural Science Foundation of China under Grant No.62032013the LiaoNing Revitalization Talents Program under Grant No.XLYC1902010.
文摘Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.
基金supported by the National Natural Science Foundation of China(No.62201592)the Research Plan Project of NUDT(ZK21-33)the Young Elite Scientist Sponsorship Program of CAST,China(2021-JCJQ-QT-048)。
文摘Satellite communications have attracted significant interests due to its advantages of large footprint and massive access.However,the commonly used onboard beamforming is hard to achieve reliable security because of the highly correlated legitimate and wiretap downlink channels.We exploit the benefits of satellite-terrestrial integrated network(STIN)and a novel absorptive reconfigurable intelligent surface(RIS)for improving the security of satellite downlink communications(SDC)in the presence of eavesdroppers(Eves).This paper aims to maximize the achievable secrecy rate of the earth station(ES)while satisfying the signal reception constraints,harvested power threshold at the RIS,and total transmit power budget.To solve this nonconvex problem,we propose a penalty-function based dual decomposition scheme,which firstly transforms the original problem into a two-layer optimization problem.Then,the outer layer and inner problems are solved by utilizing the successive convex approximation,Lagrange-dual and Rayleigh quotient methods to obtain the beamforming weight vectors and the reflective coefficient matrix.Finally,simulation results verify the effectiveness of the proposed scheme for enhancing the SDC security.
基金supported by the Natural Science Foundation of Guangdong Province with grant number 2022A1515010999the Scientific Research Project of Education Department of Guangdong with grant number 2019GZDXM002+13 种基金the Project of Technology Development Foundation of Guangdong with grant number 706049150203the Application Technology Collaborative Innovation Center of GZPYP with grant number 2020ZX01the Yangcheng scholar,the Scientific Research Project of Guangzhou Education Bureau with grant number 202032761the Guangzhou Municipal Education Bureau of China with grant number 201831785the Guangzhou Municipal Science and Technology Bureau of China with grant number 202002030133the Key Scientific Research Projects of Higher Education Institutions in Henan Province under Grant 20A510007the Outstanding Youth Science Foundation of Henan Polytechnic University under Grant J2019-4the Fundamental Research Funds for the Universities of Henan Province under Grant NSFRF180309the National Natural Science Foundation of China under Grant 62001320the Key Research and Development Program of Shanxi under Grant 201903D121117the Natural Science Foundation of China under Grant 61901367the Natural Science Foundation of Shaanxi Province under Grant 2020JQ-8Scientific Research Project of Education Department of Guangdong with grant number 2021KCXTD061Science and Technology Program of Guangzhou,China with grant number 202201011850.
文摘Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum efficiency.Due to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wireless system.This paper focuses on maximizing the secrecy sum rate under the constraint of the achievable rate of the legitimate channels.To tackle the non-convexity optimization problem,a reinforcement learning-based alternative optimization algorithm is proposed.Firstly,with the help of successive convex approximations,the optimal power allocation scheme with a given UAV trajectory is obtained by using convex optimization tools.Afterwards,through plenty of explorations of the wireless environment,the Q-learning networks approach the optimal location transition strategy of the UAV,even without the wireless channel state information.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金supported by the Central University Basic Research Business Fee Fund Project(J2023-027)Open Fund of Key Laboratory of Flight Techniques and Flight Safety,CAAC(No.FZ2022KF06)China Postdoctoral Science Foundation(No.2022M722248).
文摘In mobile edge computing,unmanned aerial vehicles(UAVs)equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility,flexibility,rapid deployment,and terrain agnosticism.These attributes enable UAVs to reach designated areas,thereby addressing temporary computing swiftly in scenarios where ground-based servers are overloaded or unavailable.However,the inherent broadcast nature of line-of-sight transmission methods employed by UAVs renders them vulnerable to eavesdropping attacks.Meanwhile,there are often obstacles that affect flight safety in real UAV operation areas,and collisions between UAVs may also occur.To solve these problems,we propose an innovative A*SAC deep reinforcement learning algorithm,which seamlessly integrates the benefits of Soft Actor-Critic(SAC)and A*(A-Star)algorithms.This algorithm jointly optimizes the hovering position and task offloading proportion of the UAV through a task offloading function.Furthermore,our algorithm incorporates a path-planning function that identifies the most energy-efficient route for the UAV to reach its optimal hovering point.This approach not only reduces the flight energy consumption of the UAV but also lowers overall energy consumption,thereby optimizing system-level energy efficiency.Extensive simulation results demonstrate that,compared to other algorithms,our approach achieves superior system benefits.Specifically,it exhibits an average improvement of 13.18%in terms of different computing task sizes,25.61%higher on average in terms of the power of electromagnetic wave interference intrusion into UAVs emitted by different auxiliary UAVs,and 35.78%higher on average in terms of the maximum computing frequency of different auxiliary UAVs.As for path planning,the simulation results indicate that our algorithm is capable of determining the optimal collision-avoidance path for each auxiliary UAV,enabling them to safely reach their designated endpoints in diverse obstacle-ridden environments.
文摘A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the masking sequence. At the receiver, a non dynamical system which adopts the same nonlinear functions as what is adopted at transmitter is used to retrieve the masking sequence from the received signal and then the message sequence is recovered through subtraction. The results of the theoretical analysis and computer simulation show that the chaotic digital secure communication system presented in this paper has the fine security, high reliability and can be implemented easily.
基金the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs:Chair of Pervasive and Mobile Computing.
文摘The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’repositories located in the cloud.The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency,scalability and bandwidth.Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers.Assuming a massive demand of PHR data within a ubiquitous smart city,we propose a secure and fog assisted framework for PHR systems to address security,access control and privacy concerns.Built under a fog-based architecture,the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption(CP-ABE)to guarantee confidentiality and fine-grained access control within the system respectively.We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy.We provide the analysis of the proposed framework in terms of security and performance.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10604008 and 10435020) and the Beijing Education Committee (Grant No XK100270454).
文摘This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.
基金supported by the Natural Science Foundation of Jiangsu Provincial Universities, China (Grant No. 10KJB180004)
文摘We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.