This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd...This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.展开更多
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We ...We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party.展开更多
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward r...In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect.展开更多
This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotat...This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.展开更多
We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] a...We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed.展开更多
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorize...We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies.展开更多
Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple a...Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology.展开更多
The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structu...The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme.展开更多
基金supported in part by the Beijing Municipal Natural Science Foundation under Grant 4212005in part by the National Natural Science Foundation of China under 62271076+1 种基金in part by Young Elite Scientists Sponsorship Program by CAST(YESS20200283)in part by the Fundamental Research Funds for the Central Universities under Grant 2242022k60006.
文摘This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.
基金The project supported by National Natural Science Foundation of China under Grant No. 10575017
文摘We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party.
文摘In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect.
基金Project supported by the National Natural Science Foundation of China (Grant No 60667001).
文摘This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.
基金Project supported by the Natural Science Foundation of the Anhui Higher Education Institutions of China (Grant No.KJ2011Z359)
文摘We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed.
基金The project supported by National Natural Science Foundation of China under Grant No.10575017
文摘We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies.
基金This work is supported in part by the U.S.National Science Foundation(No.CNS-1421903)。
文摘Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology.
基金This work is supported by the National Natural Science Foundation of China(NSFC)(No.61431011)the Fundamental Research Funds for the Central Universities.
文摘The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme.