期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
1
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
下载PDF
Distributed Secure State Estimation of Multi-Agent Systems Under Homologous Sensor Attacks
2
作者 Yukun Shi Youqing Wang Jianyong Tuo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期67-77,共11页
This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the sy... This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously.Specifically,the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication.It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value.Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived.Simulation examples are finally provided to demonstrate the effectiveness of the proposed results. 展开更多
关键词 Consensus-based Luenberger-like observer distributed secure state estimation homologous signal
下载PDF
Security estimation of LWE via BKW algorithms
3
作者 Yu Wei Lei Bi +1 位作者 Xianhui Lu Kunpeng Wang 《Cybersecurity》 EI CSCD 2024年第1期71-87,共17页
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography direction.There are a variety of LWE-solving methods,which can be classified into... The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography direction.There are a variety of LWE-solving methods,which can be classified into four groups:lattice methods,algebraic methods,combinatorial methods,and exhaustive searching.The Blum–Kalai–Wasserman(BKW)algorithm is an important variety of combinatorial algorithms,which was first presented for solving the Learning Parity With Noise(LPN)problem and then extended to solve LWE.In this paper,we give an overview of BKW algorithms for solving LWE.We introduce the framework and key techniques of BKW algorithms and make comparisons between different BKW algorithms and also with lattice methods by estimating concrete security of specific LWE instances.We also briefly discuss the current problems and potential future directions of BKW algorithms. 展开更多
关键词 Post-quantum cryptography Learning with errors problem Lattice-based cryptography security estimation
原文传递
Secure state estimation for cyber-physical systems with unknown input sliding mode observer
4
作者 Panpan Zhang Yuwei Ren +1 位作者 Yixian Fang Ang Liu 《Control Theory and Technology》 EI CSCD 2024年第2期244-253,共10页
In recent years, cyber attacks have posed great challenges to the development of cyber-physical systems. It is of great significance to study secure state estimation methods to ensure the safe and stable operation of ... In recent years, cyber attacks have posed great challenges to the development of cyber-physical systems. It is of great significance to study secure state estimation methods to ensure the safe and stable operation of the system. This paper proposes a secure state estimation for multi-input and multi-output continuous-time linear cyber-physical systems with sparse actuator and sensor attacks. First, for sparse sensor attacks, we propose an adaptive switching mechanism to mitigate the impact of sparse sensor attacks by filtering out their attack modes. Second, an unknown input sliding mode observer is designed to not only observe the system states, sensor attack signals, and measurement noise present in the system but also counteract the effects of sparse actuator attacks through an unknown input matrix. Finally, for the design of an unknown input sliding mode state observer, the feasibility of the observing system is demonstrated by means of Lyapunov functions. Additionally, simulation experiments are conducted to show the effectiveness of this method. 展开更多
关键词 Sparse attacks Cyber-physical systems Unknown input sliding mode Secure state estimation Adaptive switching mechanism
原文传递
A survey on the security of cyber-physical systems 被引量:8
5
作者 Guangyu WU Jian SUN Jie CHEN 《Control Theory and Technology》 EI CSCD 2016年第1期2-10,共9页
Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and m... Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and manufacturing. Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years. This paper surveys recent results in this area and mainly focusses on three important categories: attack detection, attack design and secure estimation and control. We also discuss several future research directions including risk assessment, modeling of attacks and attacks design, counter-attack strategy and testbed and validation. 展开更多
关键词 security cyber-physical systems attack detection secure estimation and control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部