In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state in...In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm.展开更多
The reconfigurable intelligent surface(RIS),which is composed of multiple passive reflective components,is now considered as an effective mean to improve security performance in wireless communications,as it can enhan...The reconfigurable intelligent surface(RIS),which is composed of multiple passive reflective components,is now considered as an effective mean to improve security performance in wireless communications,as it can enhance the signal of legitimate users and suppress the power leakage at eavesdroppers by adjusting signal phases.In this paper,we maximize the downlink ergodic secrecy sum rate of a RIS-aided multi-user system over Rician fading channels,where we assume that only imperfect channel state information(CSI)is available at the base station(BS).Firstly,we obtain the deterministic approximate expression for the ergodic secrecy sum rate by resorting to the large-system approximation theory.Then the problem is formulated to maximize the downlink ergodic secrecy sum rate by optimizing the regularization coefficient of regularized zero-forcing(RZF)precoding and the phase-shifting matrix of the RIS.By using the particle swarm optimization(PSO)method,we propose an alternate optimization(AO)algorithm to solve this non-convex problem.Finally,the numerical simulations illustrate the accuracy of our large-system approximate expression as well as the effectiveness of the proposed algorithm.展开更多
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil...Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.展开更多
Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-sc...Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.展开更多
To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous infor...To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.展开更多
Wireless communications have to face to several different security issues in practice due to the nature of broadcast.The information theory is well known to provide efficient approaches to address security issues in w...Wireless communications have to face to several different security issues in practice due to the nature of broadcast.The information theory is well known to provide efficient approaches to address security issues in wireless communications,which attracts much attention in both industry and academia in recent years.In this paper,inspired by information theory,we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration.Specifically,the closed-form expression of the outage probability is proposed.Moreover,the asymptotic performance evaluation on the basis of the analytical results is investigated.The simulation results show that the relay selection can reduce the outage probability in accordance with our theoretical analysis.展开更多
To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the RIS.Th...To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the RIS.The eavesdropping on the UR is interfered by a source-based jamming strategy.Under the constraints of unit modulus and total power,the RIS phase shift,the power allocation between the confidential signal and the jamming signal,and the power allocation between the source node and the UR are jointly optimized to maximize the secrecy rate.The complex multivariable coupling problem is decomposed into three sub-problems,and the non-convexity of the objective function and the constraints is solved with semi-definite relaxation.Simulation results indicate that the secrecy rate is remarkably enhanced with the proposed scheme compared with the equal power allocation scheme,the random phase shift scheme,and the no-RIS scheme.展开更多
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne...Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.展开更多
In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state informa...In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob.展开更多
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl...Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.展开更多
This paper considers a secure multigroup multicast multiple-input single-output(MISO)communication system aided by an intelligent reflecting surface(IRS).Specifically,we aim to minimize the transmit power at Alice via...This paper considers a secure multigroup multicast multiple-input single-output(MISO)communication system aided by an intelligent reflecting surface(IRS).Specifically,we aim to minimize the transmit power at Alice via jointly optimizing the transmit beamformer,artificial noise(AN)vector and phase shifts at the IRS subject to the secrecy rate constraints as well as the unit modulus constraints of IRS phase shifts.To tackle the optimization problem,we first transform it into a semidefinite relaxation(SDR)problem,and then alternately update the transmit beamformer and AN matrix as well as the phase shifts at the IRS.In order to reduce the high computational complexity,we further propose a low-complexity algorithm based on second-order cone programming(SOCP).We decouple the optimization problem into two sub-problems and optimize the transmit beamformer,AN vector and the phase shifts alternately by solving two corresponding SOCP subproblem.Simulation results show that the proposed SDR and SOCP schemes require half or less transmit power than the scheme without IRS,which demonstrates the advantages of introducing IRS and the effectiveness of the proposed methods.展开更多
To guarantee the security of Internet of Things(IoT)devices,the blockchain tech⁃nology is often applied to clustered IoT networks.However,cluster heads(CHs)need to un⁃dertake additional control tasks.For battery-power...To guarantee the security of Internet of Things(IoT)devices,the blockchain tech⁃nology is often applied to clustered IoT networks.However,cluster heads(CHs)need to un⁃dertake additional control tasks.For battery-powered IoT devices,the conventional CH se⁃lection algorithm is limited.Based on the above problem,an unmanned aerial vehicle(UAV)network assisted clustered IoT system is proposed,and a corresponding UAV CH se⁃lection algorithm is designed.In this scheme,UAVs are selected as CHs to serve IoT clus⁃ters.The proposed CH selection algorithm considers the maximal transmit power,residual energy and distance information of UAVs,which can greatly extend the working life of IoT clusters.Through Monte Carlo simulation,the key performance indexes of the system,in⁃cluding energy consumption,average secrecy rate and the maximal number of data packets received by the base station(BS),are evaluated.The simulation results show that the pro⁃posed algorithm has great advantages compared with the existing CH selection algorithms.展开更多
This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with ...This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant U1805262,62071247,61801244,61771264in part by the Natural Science Foundation of Jiangsu Province under Grant BK20180754+1 种基金in part by the Guangdong Provincial Special Fund For Modern Agriculture Industry Technology Innovation Teams under Grant 2020KJ122in part by the Initial Scientic Research Foundation of NJUPT under Grant NY218103.
文摘In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm.
基金the National Natural Science Foundation of China.92067201the National Natural Science Foundation of China.62071247+2 种基金the National Natural Science Foundation of China.62171240the National Natural Science Foundation of China.62171231Jiangsu Provincial Key Research and Development Program.BE2020084-4
文摘The reconfigurable intelligent surface(RIS),which is composed of multiple passive reflective components,is now considered as an effective mean to improve security performance in wireless communications,as it can enhance the signal of legitimate users and suppress the power leakage at eavesdroppers by adjusting signal phases.In this paper,we maximize the downlink ergodic secrecy sum rate of a RIS-aided multi-user system over Rician fading channels,where we assume that only imperfect channel state information(CSI)is available at the base station(BS).Firstly,we obtain the deterministic approximate expression for the ergodic secrecy sum rate by resorting to the large-system approximation theory.Then the problem is formulated to maximize the downlink ergodic secrecy sum rate by optimizing the regularization coefficient of regularized zero-forcing(RZF)precoding and the phase-shifting matrix of the RIS.By using the particle swarm optimization(PSO)method,we propose an alternate optimization(AO)algorithm to solve this non-convex problem.Finally,the numerical simulations illustrate the accuracy of our large-system approximate expression as well as the effectiveness of the proposed algorithm.
文摘Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
基金supported by National Natural Science Foundation of China(No.62171445)。
文摘Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.
基金supported in part by the National Nature Science Foundation of China under Grant 61473066 and Grant 61601109the Fundamental Research Funds for the Central Universities under Grant No.N152305001the Natural Science Foundation of Hebei Province under Grant F2017501039.
文摘To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.
基金This work is partially supported by National Major Project of China(No.2010ZX03006-006)National Natural Science Foundation of China(No.61571241)+4 种基金the Ministry of Education-China Mobile Research Foundation,China(No.MCM20170205)the Communication Soft Science Research Project of Ministry of Industry and Information Technology,China(No.2017-R-34)the Scientific Research Foundation of the Higher Education Institutions of Jiangsu Province,China(No.15KJA510002 and 17KJB510043)the Research Foundation for Advanced Talents,Nanjing University of Posts and Telecommunications(No.NY217146)Open Foundation of the Remote Measuring and Control Key Lab of Jiangsu Province,China(No.2242015k30005).
文摘Wireless communications have to face to several different security issues in practice due to the nature of broadcast.The information theory is well known to provide efficient approaches to address security issues in wireless communications,which attracts much attention in both industry and academia in recent years.In this paper,inspired by information theory,we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration.Specifically,the closed-form expression of the outage probability is proposed.Moreover,the asymptotic performance evaluation on the basis of the analytical results is investigated.The simulation results show that the relay selection can reduce the outage probability in accordance with our theoretical analysis.
基金supported by the National Natural Science Foundation of China(Grant No.61961024)the Top Double 1000 Talent Programme of Jiangxi Province(Grant No.JXSQ2019201055)+1 种基金the Natural Science Foundation of Jiangxi Province(Grant No.20181BAB202001)the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security(Grant No.AGK201602)。
文摘To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the RIS.The eavesdropping on the UR is interfered by a source-based jamming strategy.Under the constraints of unit modulus and total power,the RIS phase shift,the power allocation between the confidential signal and the jamming signal,and the power allocation between the source node and the UR are jointly optimized to maximize the secrecy rate.The complex multivariable coupling problem is decomposed into three sub-problems,and the non-convexity of the objective function and the constraints is solved with semi-definite relaxation.Simulation results indicate that the secrecy rate is remarkably enhanced with the proposed scheme compared with the equal power allocation scheme,the random phase shift scheme,and the no-RIS scheme.
基金supported in part by the Natural Science Foundation of Shaanxi Province under Grant Number 2021JM-143the Fundamental Research Funds for the Central Universities under Grant Number JB211502+5 种基金the Project of Key Laboratory of Science and Technology on Communication Network under Grant Number 6142104200412the National Natural Science Foundation of China under Grant Number 61672410the Academy of Finland under Grant Number 308087the China 111 project under Grant Number B16037JSPS KAKENHI under Grant Number JP20K14742and the Project of Cyber Security Establishment with Inter University Cooperation.
文摘Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFB1804900in part by the National Natural Science Foundation of China under Grant 92067201,U1805262,62071247,62071249,62171240+2 种基金in part by the Jiangsu Provincial Key Research and Development Program of China under Grant BE2020084-5in part by Special Funds of the Central Government Guiding Local Science and Technology Development under Grant 2021L3010in part by Key provincial scientific and technological innovation projects under Grant 2021G02006.
文摘In this paper,we consider a reconfigurable intelligent surface(RIS)-assisted multiple-input multiple-output(MIMO)secure communication system,where only legitimate user's(Bob's)statistical channel state information(CSI)can be obtained at the transmitter(Alice),while eavesdropper's(Eve's)CSI is unknown.Firstly,the analytical expression of the achievable ergodic rate at Bob is obtained.Then,by exploiting Bob's statistical CSI,we jointly design the transmit covariance matrix at Alice and the phase shift matrix at the RIS to minimize the transmit power of the information signal under the quality-of-service(QoS)constraint of Bob.Finally,we propose an artificial noise(AN)-aided method without Eve's CSI to enhance the security of this system and use the residual power to design the transmit covariance for AN.Simulation results verify the convergence of the proposed method,and also show that there exists a trade-off between the secrecy rate and QoS of Bob.
基金This work was partially supported by the National Natural Science Foundation of China(No.61802034)National Key Research and Development Program of China(No.2019YFC1509602)Chongqing Natural Science Foundation(cstc2019jcyj-msxmX0264).
文摘Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.
基金supported in part by the National Natural Science Foundation of China under Grants 62071234,61901121 and 61771244in part by the Natural Science Research Project of Education Department of Anhui Province of China under Grant KJ2019A1002.
文摘This paper considers a secure multigroup multicast multiple-input single-output(MISO)communication system aided by an intelligent reflecting surface(IRS).Specifically,we aim to minimize the transmit power at Alice via jointly optimizing the transmit beamformer,artificial noise(AN)vector and phase shifts at the IRS subject to the secrecy rate constraints as well as the unit modulus constraints of IRS phase shifts.To tackle the optimization problem,we first transform it into a semidefinite relaxation(SDR)problem,and then alternately update the transmit beamformer and AN matrix as well as the phase shifts at the IRS.In order to reduce the high computational complexity,we further propose a low-complexity algorithm based on second-order cone programming(SOCP).We decouple the optimization problem into two sub-problems and optimize the transmit beamformer,AN vector and the phase shifts alternately by solving two corresponding SOCP subproblem.Simulation results show that the proposed SDR and SOCP schemes require half or less transmit power than the scheme without IRS,which demonstrates the advantages of introducing IRS and the effectiveness of the proposed methods.
文摘To guarantee the security of Internet of Things(IoT)devices,the blockchain tech⁃nology is often applied to clustered IoT networks.However,cluster heads(CHs)need to un⁃dertake additional control tasks.For battery-powered IoT devices,the conventional CH se⁃lection algorithm is limited.Based on the above problem,an unmanned aerial vehicle(UAV)network assisted clustered IoT system is proposed,and a corresponding UAV CH se⁃lection algorithm is designed.In this scheme,UAVs are selected as CHs to serve IoT clus⁃ters.The proposed CH selection algorithm considers the maximal transmit power,residual energy and distance information of UAVs,which can greatly extend the working life of IoT clusters.Through Monte Carlo simulation,the key performance indexes of the system,in⁃cluding energy consumption,average secrecy rate and the maximal number of data packets received by the base station(BS),are evaluated.The simulation results show that the pro⁃posed algorithm has great advantages compared with the existing CH selection algorithms.
基金supported by the National Natural Science Foundation of China(Nos.61471008,61571020,and 61622101)the National Key Research and Development Project of China(No.2016YFE0123100)
文摘This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.