期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Anti-Jamming and Anti-Eavesdropping in A2G Communication System with Jittering UAV 被引量:1
1
作者 Huici Wu Yang Wen +1 位作者 Xiaofeng Tao Jin Xu 《China Communications》 SCIE CSCD 2023年第10期230-244,共15页
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd... This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method. 展开更多
关键词 UAV jitter A2G communication active eavesdropper non-cooperative game
下载PDF
Controlled Secure Quantum Dialogue Using a Pure Entangled GHZ States 被引量:9
2
作者 XIA Yan SONG Jie NIE Jing SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第5X期841-846,共6页
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We ... We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party. 展开更多
关键词 controlled secure quantum dialogue eavesdropper non-maximally entangled GHZ state
下载PDF
Statistical Analysis of a Class of Secure Relay Assisted Cognitive Radio Networks 被引量:1
3
作者 Mona Shokair Waleed Saad Shady M.Ibraheem 《China Communications》 SCIE CSCD 2018年第12期174-189,共16页
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward r... In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect. 展开更多
关键词 RELAY selection non-colluding or colluding eavesdroppers OUTAGE PROBABILITY SECRECY rate power constraints.
下载PDF
Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order 被引量:1
4
作者 宋杰 朱爱东 张寿 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第3期621-623,共3页
This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotat... This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication. 展开更多
关键词 quantum secure direct communication eavesdropper blind polarization bases
下载PDF
Eavesdropping on the quantum dialogue protocol in lossy channel
5
作者 刘恒 张秀兰 吕辉 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第7期69-73,共5页
We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] a... We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed. 展开更多
关键词 quantum dialogue eavesdropper transmission efficiency
下载PDF
Controlled Secure Quantum Communication Using Pure Entangled W Class States
6
作者 XIA Yan SONG Jie SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第4期919-924,共6页
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorize... We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies. 展开更多
关键词 controlled secure quantum communication eavesdropper non-maximally entangled W state
下载PDF
Securing acoustics-based short-range communication systems:an overview
7
作者 CHEN Si QIN Zhan +1 位作者 XING Guoliang REN Kui 《Journal of Communications and Information Networks》 2016年第4期44-51,共8页
Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple a... Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology. 展开更多
关键词 ACOUSTIC eavesdropper short-range communication ICA BSS randomize channel motion source usability
原文传递
Enhancing physical-layer security via big-data-aided hybrid relay selection
8
作者 Hongliang He Pinyi Ren +2 位作者 Qinghe Du Li Sun Yichen Wang 《Journal of Communications and Information Networks》 2017年第1期97-110,共14页
The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structu... The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme. 展开更多
关键词 Big data hybrid relay selection secrecy outage probability eavesdropper physical layer security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部