期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Secrecy Rate Analysis for Reconfigurable Intelligent Surface-Assisted MIMO Communications with Statistical CSI 被引量:5
1
作者 Jie Liu Jun Zhang +2 位作者 Qi Zhang Jue Wang Xinghua Sun 《China Communications》 SCIE CSCD 2021年第3期52-62,共11页
In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state in... In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm. 展开更多
关键词 reconfigurable intelligent surface ergodic secrecy rate statistical CSI alternating optimization algorithm
下载PDF
Secrecy Rate Analysis for RIS-Aided Multi-User MISO System over Rician Fading Channel
2
作者 Jiaping Wang Jun Zhang +3 位作者 Jiacheng Lu Jue Wang Qi Zhang Dongqian Wang 《Journal of Communications and Information Networks》 EI CSCD 2023年第1期48-56,共9页
The reconfigurable intelligent surface(RIS),which is composed of multiple passive reflective components,is now considered as an effective mean to improve security performance in wireless communications,as it can enhan... The reconfigurable intelligent surface(RIS),which is composed of multiple passive reflective components,is now considered as an effective mean to improve security performance in wireless communications,as it can enhance the signal of legitimate users and suppress the power leakage at eavesdroppers by adjusting signal phases.In this paper,we maximize the downlink ergodic secrecy sum rate of a RIS-aided multi-user system over Rician fading channels,where we assume that only imperfect channel state information(CSI)is available at the base station(BS).Firstly,we obtain the deterministic approximate expression for the ergodic secrecy sum rate by resorting to the large-system approximation theory.Then the problem is formulated to maximize the downlink ergodic secrecy sum rate by optimizing the regularization coefficient of regularized zero-forcing(RZF)precoding and the phase-shifting matrix of the RIS.By using the particle swarm optimization(PSO)method,we propose an alternate optimization(AO)algorithm to solve this non-convex problem.Finally,the numerical simulations illustrate the accuracy of our large-system approximate expression as well as the effectiveness of the proposed algorithm. 展开更多
关键词 RIS large-system approximation RZF precoding imperfect CSI ergodic secrecy sum rate
原文传递
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems
3
作者 Hemant Kumar Narsani Ali Ranjha +2 位作者 Kapal Dev Fida Hussain Memon Nawab Muhammad Faseeh Qureshi 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1458-1464,共7页
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil... Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations. 展开更多
关键词 URLLC UAV-Assisted communications 6G systems secrecy rate
下载PDF
Security-Enhanced Directional Modulation Based on Two-Dimensional M-WFRFT
4
作者 Zhou Zhuang Luo Junshan +1 位作者 Wang Shilian Xia Guojiang 《China Communications》 SCIE CSCD 2024年第5期229-248,共20页
Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-sc... Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system. 展开更多
关键词 bit error rate directional modulation phased array secrecy rate weighted fractional Fourier transform
下载PDF
Secrecy-Enhancing Design for Two-Way Energy Harvesting Cooperative Networks with Full-Duplex Relay Jamming
5
作者 Siyang Xu Xin Song +3 位作者 Yiming Gao Suyuan Li Jing Cao Zhigang Xie 《China Communications》 SCIE CSCD 2021年第5期273-284,共12页
To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous infor... To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes. 展开更多
关键词 physical layer security two-way EH cooperative networks FD relay jamming minimum guaranteed secrecy rate
下载PDF
Secrecy Outage Probability Analysis Based on Cognitive Decode-and-Forward Relaying
6
作者 Ruoyu Su Xiaojun Sun +3 位作者 Fei Ding Dengyin Zhang Hongbo Zhu M.I.M.Wahab 《Computers, Materials & Continua》 SCIE EI 2020年第3期1387-1395,共9页
Wireless communications have to face to several different security issues in practice due to the nature of broadcast.The information theory is well known to provide efficient approaches to address security issues in w... Wireless communications have to face to several different security issues in practice due to the nature of broadcast.The information theory is well known to provide efficient approaches to address security issues in wireless communications,which attracts much attention in both industry and academia in recent years.In this paper,inspired by information theory,we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration.Specifically,the closed-form expression of the outage probability is proposed.Moreover,the asymptotic performance evaluation on the basis of the analytical results is investigated.The simulation results show that the relay selection can reduce the outage probability in accordance with our theoretical analysis. 展开更多
关键词 Secure communication average secrecy rate relay selection probability density function
下载PDF
Joint Optimization Scheme for the Reconfigurable Intelligent Surface-Assisted Untrusted Relay Networks
7
作者 Lihua Gong Wei Xu +2 位作者 Xiaoxiu Ding Nanrun Zhou Qibiao Zhu 《China Communications》 SCIE CSCD 2023年第12期19-29,共11页
To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the RIS.Th... To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the RIS.The eavesdropping on the UR is interfered by a source-based jamming strategy.Under the constraints of unit modulus and total power,the RIS phase shift,the power allocation between the confidential signal and the jamming signal,and the power allocation between the source node and the UR are jointly optimized to maximize the secrecy rate.The complex multivariable coupling problem is decomposed into three sub-problems,and the non-convexity of the objective function and the constraints is solved with semi-definite relaxation.Simulation results indicate that the secrecy rate is remarkably enhanced with the proposed scheme compared with the equal power allocation scheme,the random phase shift scheme,and the no-RIS scheme. 展开更多
关键词 iterative optimization physical layer security reconfigurable intelligent surface untrusted relay secrecy rate
下载PDF
SCIM: Incorporating secure communication and interference management in one operation
8
作者 Zhao Li Pintian Lyu +3 位作者 Jun Li Zhixian Chang Jia Liu Zheng Yan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期512-522,共11页
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne... Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission. 展开更多
关键词 Physical-layer security Secure communication Anti-eavesdropping Interference management secrecy rate
下载PDF
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI
9
作者 Wenwan Xu Jun Zhang +2 位作者 Shu Cai Jue Wang Yi Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第3期638-644,共7页
In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state informa... In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob. 展开更多
关键词 Reconfigurable intelligent surface MIMO Ergodic secrecy rate Statistical CSI Artificial noise
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
10
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
Secure Multigroup Multicast Communication Systems via Intelligent Reflecting Surface 被引量:2
11
作者 Weiping Shi Jiayu Li +4 位作者 Guiyang Xia Yuntian Wang Xiaobo Zhou Yonghui Zhang Feng Shu 《China Communications》 SCIE CSCD 2021年第3期39-51,共13页
This paper considers a secure multigroup multicast multiple-input single-output(MISO)communication system aided by an intelligent reflecting surface(IRS).Specifically,we aim to minimize the transmit power at Alice via... This paper considers a secure multigroup multicast multiple-input single-output(MISO)communication system aided by an intelligent reflecting surface(IRS).Specifically,we aim to minimize the transmit power at Alice via jointly optimizing the transmit beamformer,artificial noise(AN)vector and phase shifts at the IRS subject to the secrecy rate constraints as well as the unit modulus constraints of IRS phase shifts.To tackle the optimization problem,we first transform it into a semidefinite relaxation(SDR)problem,and then alternately update the transmit beamformer and AN matrix as well as the phase shifts at the IRS.In order to reduce the high computational complexity,we further propose a low-complexity algorithm based on second-order cone programming(SOCP).We decouple the optimization problem into two sub-problems and optimize the transmit beamformer,AN vector and the phase shifts alternately by solving two corresponding SOCP subproblem.Simulation results show that the proposed SDR and SOCP schemes require half or less transmit power than the scheme without IRS,which demonstrates the advantages of introducing IRS and the effectiveness of the proposed methods. 展开更多
关键词 intelligent reflecting surface multigroup multicast transmit beamformer secrecy rate phase shifts
下载PDF
Cluster Head Selection Algorithm for UAV Assisted Clustered IoT Network Utilizing Blockchain 被引量:2
12
作者 LIN Xinhua ZHANG Jing LI Qiang 《ZTE Communications》 2021年第1期30-38,共9页
To guarantee the security of Internet of Things(IoT)devices,the blockchain tech⁃nology is often applied to clustered IoT networks.However,cluster heads(CHs)need to un⁃dertake additional control tasks.For battery-power... To guarantee the security of Internet of Things(IoT)devices,the blockchain tech⁃nology is often applied to clustered IoT networks.However,cluster heads(CHs)need to un⁃dertake additional control tasks.For battery-powered IoT devices,the conventional CH se⁃lection algorithm is limited.Based on the above problem,an unmanned aerial vehicle(UAV)network assisted clustered IoT system is proposed,and a corresponding UAV CH se⁃lection algorithm is designed.In this scheme,UAVs are selected as CHs to serve IoT clus⁃ters.The proposed CH selection algorithm considers the maximal transmit power,residual energy and distance information of UAVs,which can greatly extend the working life of IoT clusters.Through Monte Carlo simulation,the key performance indexes of the system,in⁃cluding energy consumption,average secrecy rate and the maximal number of data packets received by the base station(BS),are evaluated.The simulation results show that the pro⁃posed algorithm has great advantages compared with the existing CH selection algorithms. 展开更多
关键词 cluster head selection unmanned aerial vehicle blockchain IOT average secrecy rate
下载PDF
Correlated channel model-based secure communications in dual-hop wireless communication networks
13
作者 Zhen-hua YUAN Chen CHEN +3 位作者 Xiang CHENG Guo-cheng LV Liu-qing YANG Ye JIN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第6期796-807,共12页
This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with ... This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance. 展开更多
关键词 Physical layer security Relay beamforming Correlated channels Ergodic secrecy rate
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部