期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functions 被引量:10
1
作者 Liang Jin Xiaoyan Hu +4 位作者 Yangming Lou Zhou Zhong Xiaoli Sun Huiming Wang Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第9期88-99,共12页
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm... The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed. 展开更多
关键词 wireless communication endogenous security information security functional safety
下载PDF
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
2
作者 Wenxian Jiang Mengjuan Chen Jun Tao 《China Communications》 SCIE CSCD 2023年第3期69-85,共17页
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised abou... Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised about the security and privacy of vehicle data.The mobility and real-time characteristics of vehicle data make data sharing more difficult in Io V.The emergence of blockchain and federated learning brings new directions.In this paper,a data-sharing model that combines blockchain and federated learning is proposed to solve the security and privacy problems of data sharing in Io V.First,we use federated learning to share data instead of exposing actual data and propose an adaptive differential privacy scheme to further balance the privacy and availability of data.Then,we integrate the verification scheme into the consensus process,so that the consensus computation can filter out low-quality models.Experimental data shows that our data-sharing model can better balance the relationship between data availability and privacy,and also has enhanced security. 展开更多
关键词 blockchain federated learning PRIVACY data sharing Internet of Vehicles
下载PDF
Discussion on a new paradigm of endogenous security towards 6G networks 被引量:1
3
作者 Xinsheng JI Jiangxing WU +6 位作者 Liang JIN Kaizhi HUANG Yajun CHEN Xiaoli SUN Wei YOU Shumin HUO Jing YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第10期1421-1450,共30页
The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with the&#... The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with theªunknown unknownºsecurity threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security.Then,it analyzes the security problems faced by the 6G core network,wireless access network,and emerging associated technologies in detail,as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security.Furthermore,this paper describes the relevant security theories and technical concepts under the guidance of the new paradigm of endogenous security. 展开更多
关键词 6G security New paradigm of endogenous security Core network Wireless access network
原文传递
从完美保密到完美安全:基于密码学的内生安全分析
4
作者 金梁 胡晓言 邬江兴 《Security and Safety》 2023年第3期4-19,共16页
In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of i... In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced. 展开更多
关键词 perfect instinct function security perfect secrecy DHR endogenous security One-Time Reconstruction generalized safety and security perfect security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部