Massive Multiple Input Multiple Output(MIMO)has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.This paper derives a closedform a...Massive Multiple Input Multiple Output(MIMO)has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.This paper derives a closedform approximation for the Ergodic Achievable Secrecy Sum-Rate(EASSR)by considering the joint impact of eavesdroppers and jammers.Two widely used linear precoding techniques,Zero-Forcing(ZF)and Maximum Ratio Transmission(MRT),were used in conjunction with matrix and vector normalization to analyze the secrecy performance.Closed-form expressions are used to explain how the secrecy performance is affected when using the ZF and MRT precoding in the eavesdropping and jamming attack models.We also analyze and compare the performances of different combinations of normalization method and precoding technique in various scenarios.From the analytical expressions and simulation results,we observe that the vector and matrix normalization perform better for the ZF precoding than for the MRT precoding in high Signal-to-Noise Ratio(SNR)scenarios.However,in low SNR,the MRT with matrix normalization outperforms the ZF with vector normalization regardless of the number of users in the system.Further,we observe that the MRT fails to serve more than two users in high SNR scenario.Numerical results obtained from Monte Carlo simulation are used to corroborate the accuracy of the asymptotic secrecy analysis.展开更多
In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both...In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both wireless energy transfer(WET)from the power station(PS)to energyconstrained users and wireless information transmission(WIT)from users to the receiving station(RS).For further performance enhancement,we propose to employ both transmit beamforming at the PS and receive beamforming at the RS.We formulate a sumrate maximization problem by jointly optimizing the RIS phase shifts and amplitude reflection coefficients for both the WET and the WIT,transmit and receive beamforming vectors,and network resource allocation.To solve this non-convex problem,we propose an efficient alternating optimization algorithm with the linear minimum mean squared error criterion,semidefinite relaxation(SDR)and successive convex approximation techniques.Specifically,the tightness of applying the SDR is proved.Simulation results demonstrate that our proposed scheme with 10 reflecting elements(REs)and 4 antennas can achieve 17.78%and 415.48%performance gains compared to the single-antenna scheme with 10 REs and passive RIS scheme with 100 REs,respectively.展开更多
This paper studies large-scale multi-input multi-output(MIMO)orthogonal frequency division multiplexing(OFDM)communications in a broadband frequency-selective channel,where a massive MIMO base station(BS)communicates ...This paper studies large-scale multi-input multi-output(MIMO)orthogonal frequency division multiplexing(OFDM)communications in a broadband frequency-selective channel,where a massive MIMO base station(BS)communicates with multiple users equipped with multi-antenna.We develop a hybrid precoding design to maximize the weighted sum-rate(WSR)of the users by optimizing the digital and the analog precoders alternately.For the digital part,we employ block-diagonalization to eliminate inter-user interference and apply water-filling power allocation to maximize the WSR.For the analog part,the optimization of the PSN is formulated as an unconstrained problem,which can be efficiently solved by a gradient descent method.Numerical results show that the proposed block-diagonal hybrid precoding algorithm can outperform the existing works.展开更多
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai...This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.展开更多
In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open...In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.展开更多
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e...Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.展开更多
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil...Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.展开更多
This paper focuses on the secrecy efficiency maximization in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communication.With the popularization of UAV technology,more and more communication ...This paper focuses on the secrecy efficiency maximization in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communication.With the popularization of UAV technology,more and more communication scenarios need UAV support.We consider using IRS to improve the secrecy efficiency.Specifically,IRS and UAV trajectories work together to counter potential eavesdroppers,while balancing the secrecy rate and energy consumption.The original problem is difficult to solve due to the coupling of optimization variables.We first introduce secrecy efficiency as an auxiliary variable and propose relaxation optimization problem,and then prove the equivalence between relaxation problem and the original problem.Then an iterative algorithm is proposed by applying the block coordinate descent(BCD)method and the inner approximationmethod.The simulation results show that the proposed algorithm converges fast and is superior to the existing schemes.In addition,in order to improve the robustness of the algorithm,we also pay attention to the case of obtaining imperfect channel state information(CSI).展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性...为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性能.针对外部窃听和内部窃听两种情况,联合考虑背景噪声和脉冲噪声的影响,分析系统的可达速率、遍历安全速率和安全中断概率等性能,并利用高斯-切比雪夫求积方法获得其相应的闭合表达式.结果表明:较高的脉冲噪声会降低系统的频谱效率和安全传输性能;功率分配系数以及源用户到中继用户的距离均对系统安全传输产生显著影响.进一步地,通过蒙特卡罗仿真实验验证了理论分析的正确性.展开更多
保密通信作为物联网安全的一项核心技术近些年受到了广泛关注。无人机(UAV)由于其高机动和灵活部署等特性,被认为是提高物联网通信安全的有力手段。针对当前物联网中UAV辅助保密通信频谱利用率问题,研究了UAV和地面设备到设备(Device-to...保密通信作为物联网安全的一项核心技术近些年受到了广泛关注。无人机(UAV)由于其高机动和灵活部署等特性,被认为是提高物联网通信安全的有力手段。针对当前物联网中UAV辅助保密通信频谱利用率问题,研究了UAV和地面设备到设备(Device-to-Device, D2D)通信系统频谱共享的系统保密容量最大化,提出了一种基于块坐标下降(Block Coordinate Descent, BCD)法的频谱共享算法,该算法通过联合优化系统中发送方(UAV和地面设备对)的传输功率和无人机轨迹,在确保地面设备对和UAV能够共存的情况下最大化接收方的保密容量。具体来说,该算法通过差分凸规划(Difference of Two Convex Functions, DC)方法优化固定轨迹下的系统功率,利用连续凸优化方法解决给定发射功率的UAV轨迹优化问题。仿真结果表明,所提方法在多种参数配置下都能有效提高系统的保密容量,并且和其他算法相比有更低的功率消耗。展开更多
为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,...为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,IRS)辅助的SWIPT系统安全波束成形设计方法.考虑能量接收设备为潜在的窃听者,在基站最大发射功率、最小接收能量和IRS相移约束下,通过联合优化基站波束赋形矢量、人工噪声矢量和IRS的相移矩阵,构建系统安全速率最大化问题.针对该优化问题是非凸的,且优化变量是耦合的,提出一种基于交替优化和半正定松弛的有效算法来次优地解决该问题.仿真结果表明,本文所提算法能够在保障能量需求的同时,提升系统的安全性和抗硬件损伤能力.展开更多
研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬...研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬件损伤系统的物理层安全性能,本文考虑保护区的方法,针对地面用户与基站之间存在直连链路的情况,采用莱斯衰落来建模小尺度衰落。本文还假设多个窃听者的位置遵循齐次泊松点过程(Homogeneous Poisson point process,HPPP),借助高斯切比雪夫积分公式,推导了平均保密容量的闭式表达式,并给出了在高信噪比情况下的渐近表达式来获得进一步见解。仿真结果验证了保护区方法在增强安全性能方面的有效性,并说明了不同参数对系统保密性能的影响。展开更多
文摘Massive Multiple Input Multiple Output(MIMO)has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.This paper derives a closedform approximation for the Ergodic Achievable Secrecy Sum-Rate(EASSR)by considering the joint impact of eavesdroppers and jammers.Two widely used linear precoding techniques,Zero-Forcing(ZF)and Maximum Ratio Transmission(MRT),were used in conjunction with matrix and vector normalization to analyze the secrecy performance.Closed-form expressions are used to explain how the secrecy performance is affected when using the ZF and MRT precoding in the eavesdropping and jamming attack models.We also analyze and compare the performances of different combinations of normalization method and precoding technique in various scenarios.From the analytical expressions and simulation results,we observe that the vector and matrix normalization perform better for the ZF precoding than for the MRT precoding in high Signal-to-Noise Ratio(SNR)scenarios.However,in low SNR,the MRT with matrix normalization outperforms the ZF with vector normalization regardless of the number of users in the system.Further,we observe that the MRT fails to serve more than two users in high SNR scenario.Numerical results obtained from Monte Carlo simulation are used to corroborate the accuracy of the asymptotic secrecy analysis.
基金supported in part by the National Natural Science Foundation of China (No.62071242 and No.61901229)in part by the Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX22 0967)in part by the Open Research Project of Jiangsu Provincial Key Laboratory of Photonic and Electronic Materials Sciences and Technology (No.NJUZDS2022-008)
文摘In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both wireless energy transfer(WET)from the power station(PS)to energyconstrained users and wireless information transmission(WIT)from users to the receiving station(RS).For further performance enhancement,we propose to employ both transmit beamforming at the PS and receive beamforming at the RS.We formulate a sumrate maximization problem by jointly optimizing the RIS phase shifts and amplitude reflection coefficients for both the WET and the WIT,transmit and receive beamforming vectors,and network resource allocation.To solve this non-convex problem,we propose an efficient alternating optimization algorithm with the linear minimum mean squared error criterion,semidefinite relaxation(SDR)and successive convex approximation techniques.Specifically,the tightness of applying the SDR is proved.Simulation results demonstrate that our proposed scheme with 10 reflecting elements(REs)and 4 antennas can achieve 17.78%and 415.48%performance gains compared to the single-antenna scheme with 10 REs and passive RIS scheme with 100 REs,respectively.
基金supported by National Natural Science Foundation of China(No.61771005)
文摘This paper studies large-scale multi-input multi-output(MIMO)orthogonal frequency division multiplexing(OFDM)communications in a broadband frequency-selective channel,where a massive MIMO base station(BS)communicates with multiple users equipped with multi-antenna.We develop a hybrid precoding design to maximize the weighted sum-rate(WSR)of the users by optimizing the digital and the analog precoders alternately.For the digital part,we employ block-diagonalization to eliminate inter-user interference and apply water-filling power allocation to maximize the WSR.For the analog part,the optimization of the PSN is formulated as an unconstrained problem,which can be efficiently solved by a gradient descent method.Numerical results show that the proposed block-diagonal hybrid precoding algorithm can outperform the existing works.
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
文摘This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.
文摘In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.
基金the National Natural Science Foundation of China under Grants 62001517 and 61971474the Beijing Nova Program under Grant Z201100006820121.
文摘Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.
文摘Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
基金supported in part by the Key Scientific and Technological Project of Henan Province(Grant Nos.212102210558,222102210212)Doctoral Research Start Project of Henan Institute of Technology(Grant No.KQ1852).
文摘This paper focuses on the secrecy efficiency maximization in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communication.With the popularization of UAV technology,more and more communication scenarios need UAV support.We consider using IRS to improve the secrecy efficiency.Specifically,IRS and UAV trajectories work together to counter potential eavesdroppers,while balancing the secrecy rate and energy consumption.The original problem is difficult to solve due to the coupling of optimization variables.We first introduce secrecy efficiency as an auxiliary variable and propose relaxation optimization problem,and then prove the equivalence between relaxation problem and the original problem.Then an iterative algorithm is proposed by applying the block coordinate descent(BCD)method and the inner approximationmethod.The simulation results show that the proposed algorithm converges fast and is superior to the existing schemes.In addition,in order to improve the robustness of the algorithm,we also pay attention to the case of obtaining imperfect channel state information(CSI).
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.
文摘为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性能.针对外部窃听和内部窃听两种情况,联合考虑背景噪声和脉冲噪声的影响,分析系统的可达速率、遍历安全速率和安全中断概率等性能,并利用高斯-切比雪夫求积方法获得其相应的闭合表达式.结果表明:较高的脉冲噪声会降低系统的频谱效率和安全传输性能;功率分配系数以及源用户到中继用户的距离均对系统安全传输产生显著影响.进一步地,通过蒙特卡罗仿真实验验证了理论分析的正确性.
文摘保密通信作为物联网安全的一项核心技术近些年受到了广泛关注。无人机(UAV)由于其高机动和灵活部署等特性,被认为是提高物联网通信安全的有力手段。针对当前物联网中UAV辅助保密通信频谱利用率问题,研究了UAV和地面设备到设备(Device-to-Device, D2D)通信系统频谱共享的系统保密容量最大化,提出了一种基于块坐标下降(Block Coordinate Descent, BCD)法的频谱共享算法,该算法通过联合优化系统中发送方(UAV和地面设备对)的传输功率和无人机轨迹,在确保地面设备对和UAV能够共存的情况下最大化接收方的保密容量。具体来说,该算法通过差分凸规划(Difference of Two Convex Functions, DC)方法优化固定轨迹下的系统功率,利用连续凸优化方法解决给定发射功率的UAV轨迹优化问题。仿真结果表明,所提方法在多种参数配置下都能有效提高系统的保密容量,并且和其他算法相比有更低的功率消耗。
文摘为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,IRS)辅助的SWIPT系统安全波束成形设计方法.考虑能量接收设备为潜在的窃听者,在基站最大发射功率、最小接收能量和IRS相移约束下,通过联合优化基站波束赋形矢量、人工噪声矢量和IRS的相移矩阵,构建系统安全速率最大化问题.针对该优化问题是非凸的,且优化变量是耦合的,提出一种基于交替优化和半正定松弛的有效算法来次优地解决该问题.仿真结果表明,本文所提算法能够在保障能量需求的同时,提升系统的安全性和抗硬件损伤能力.
基金supported in part by the National Natrual Science Foundation of China(Nos.61971220,61971221)the Open Research Fund Key Laboratory of Wireless Sensor Network and Communication of Chinese Academy of Science(No.2017006).
文摘研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬件损伤系统的物理层安全性能,本文考虑保护区的方法,针对地面用户与基站之间存在直连链路的情况,采用莱斯衰落来建模小尺度衰落。本文还假设多个窃听者的位置遵循齐次泊松点过程(Homogeneous Poisson point process,HPPP),借助高斯切比雪夫积分公式,推导了平均保密容量的闭式表达式,并给出了在高信噪比情况下的渐近表达式来获得进一步见解。仿真结果验证了保护区方法在增强安全性能方面的有效性,并说明了不同参数对系统保密性能的影响。