期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
智能反射面增强抗干扰与反窃听的安全传输策略
1
作者 肖海林 代秋香 +2 位作者 黄天义 张跃军 张中山 《信号处理》 CSCD 北大核心 2024年第7期1329-1340,共12页
针对无线通信中存在窃听者和干扰者的潜在合作关系问题,本文提出了智能反射面增强抗干扰与反窃听的安全传输策略。该策略考虑信道状态信息完美和非完美两种情况,联合优化基站发射波束成形矢量和智能反射面相移矩阵来实现通信系统保密率... 针对无线通信中存在窃听者和干扰者的潜在合作关系问题,本文提出了智能反射面增强抗干扰与反窃听的安全传输策略。该策略考虑信道状态信息完美和非完美两种情况,联合优化基站发射波束成形矢量和智能反射面相移矩阵来实现通信系统保密率最大化。在完美信道状态信息下,提出交替优化算法和罚函数法来求解系统保密率优化问题;在非完美信道状态信息下,利用松弛变量、S-引理、拉格朗日乘子法和交替优化等方法将系统保密率的非凸二次约束二次规划问题转化为确定性凸优化问题并求解。并进一步地分析了基站传输功率、IRS反射单元数量、信道不确定性等参数对系统保密率的影响。数值结果表明,本文所提策略经过3至6次的迭代均能达到收敛。并且与现有的最大比发射策略和随机相移策略相比,本文所提策略能有效提升系统保密率约20%。 展开更多
关键词 智能反射面 物理层安全 系统保密率 信道状态信息
下载PDF
Privacy-preserving Distributed Location Proof Generating System 被引量:3
2
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部