In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti...In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.展开更多
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of phot...This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features.展开更多
This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the phys...This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the physical layer.This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node,and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain,so that the signal-to-noise ratio(SNR)received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver,so as to realize the absolutely secure communication in the sense of Wyner principle.This paper not only puts forward the specific design scheme of absolutely secure communication telephone,but also analyzes the calculation of security capacity under different eavesdropping positions,different SI cancellation capability and different system parameters according to Shannon theory.展开更多
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
基金supported by the National Basic Research Program of China under Grant 2013CB329003the National Natural Science Founda-tion General Program of China under Grant 61171110
文摘In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11474027, 61675028, and 11674033)the Fundamental Research Funds for the Central Universities (Grant No. 2015KJJCA01)the National High Technology Research and Development Program of China(Grant No. 2013AA122902)
文摘This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features.
基金Supported by the Natural Science Foundation of Hubei Province(2019CFB593)the National Natural Science Foundation of China(61961016)+1 种基金Ph.D.Research Start-up Foundation of Hubei Minzu University(MY2018B08)Graduate Education Innovation Plan of Hubei Minzu University(DC2000000119)。
文摘This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the physical layer.This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node,and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain,so that the signal-to-noise ratio(SNR)received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver,so as to realize the absolutely secure communication in the sense of Wyner principle.This paper not only puts forward the specific design scheme of absolutely secure communication telephone,but also analyzes the calculation of security capacity under different eavesdropping positions,different SI cancellation capability and different system parameters according to Shannon theory.