This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ...This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications.展开更多
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r...In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance.展开更多
Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an ...Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an epidemic network can increase its epidemic threshold. In this paper, by using limit theory and dynamical system theory, we further give global stability analysis of a susceptible-infected-susceptible (SIS) epidemic model on networks with awareness. Results show that the obtained epidemic threshold is also a global stability condition for its endemic equilibrium, which implies the embedded awareness can enhance the epidemic threshold globally. Some numerical examples are presented to verify the theoretical results.展开更多
In next generation networks, multiradio networks are emerging in order to deal with exponential data traffic increasing. Integrated Femto-WiFi(IFW) small cells have been introduced by 3GPP to offload data from cellula...In next generation networks, multiradio networks are emerging in order to deal with exponential data traffic increasing. Integrated Femto-WiFi(IFW) small cells have been introduced by 3GPP to offload data from cellular networks recently. These IFW cells are multi-mode capable(i.e., both licensed bands via cellular interface and unlicensed bands via WiFi interface). Therefore how to offload data effectively has become one of the most significant discussions in 5G Multi-Radio Heterogeneous Network. So far, most researches mainly focus on the generality of UEs, few attention has been paid to UEs' individual requirements. Considering UE's preference vary from individual to individual, in this paper, we present an UE preference-aware network selection scheme for mobile data offloading. It intelligently supports the distribution of heterogeneous classes of services, considers different types of UEs and delay-tolerant flows, and handles the mobility of UEs. The simulation results show the superiority of the proposed algorithm in user fairness, enhanced capacity and energy saving maximization.展开更多
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects o...Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.展开更多
This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based ort...This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based orthogonal time frequency space(OTFS)transmission scheme,namely NOMAOTFS,in order to combat Doppler effect as well as to improve the spectral efficiency.Further,we propose a power allocation method addressing the trade-off between the reliability of multicast streaming and the confidentiality of unicast streaming.Based on that,we utilize the relay selection strategy,to improve the security of unicast streaming.In the context of multicastunicast streaming,our simulation findings validate the effectiveness of the NOMA-OTFS based cooperative transmission,which can significantly outperform the existing NOMA-OFDM in terms of both reliability and security.展开更多
In order to realize the coexistence between the LTE system and the spectrum authorized systems over 700MHz frequency band,the geographical position and operation band location between long term evolution(LTE)base stat...In order to realize the coexistence between the LTE system and the spectrum authorized systems over 700MHz frequency band,the geographical position and operation band location between long term evolution(LTE)base stations and digital tevevision transmission tower should satisfy certain constraints,which are analyzed and deduced in this paper.Under the concluded constraints,the interference to each other is lower than their interference tolerances,so that the coexistance between the two types of systems is performed.Based on the constraints for both LTE and spectrum authorized systems,numerical results of the geographical position interval and operation band location interval are obtained,which have significant practical value for the LTE base station placement,network planning and operation band selection.展开更多
To promote the application of edge com-puting in wireless blockchain networks,this paper presents a business ecosystem,where edge comput-ing is introduced to assist blockchain users in imple-menting the mining process...To promote the application of edge com-puting in wireless blockchain networks,this paper presents a business ecosystem,where edge comput-ing is introduced to assist blockchain users in imple-menting the mining process.This paper exploits re-source trading and miner competition to enable se-cure and efficient transactions in the presented busi-ness ecosystem.The resource trading problem is for-mulated as a Stackelberg game between miner candi-dates and edge computing servers,where computing,caching,and communication resources are jointly op-timized to maximize the potential profit.Partial of-floading is introduced to further enhance the system performance when compared with the existing work.We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium.Based on the optimization result,winners are selected from the set of miner candidates by bidding and constitute the mining network.Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners,thus stimulating more blockchain users to join the mining network.展开更多
Future Sixth-Generation (6G) mobile communication networks extremely require the global connectivity and the ground Base Stations (BSs) are difficult to develop in some specific areas,such as mountainous areas.Therefo...Future Sixth-Generation (6G) mobile communication networks extremely require the global connectivity and the ground Base Stations (BSs) are difficult to develop in some specific areas,such as mountainous areas.Therefore,the aerial networks are the key framework for the future communications,in which the aerial vehicle could act as the access point.Additionally,Mobile Edge Computing (MEC) is also essential to enhance the data processing capabilities of aerial networks.In this paper,we study a comprehensive communication-computation resource management problem for jointly optimizing user pairing,power and time allocation in the MEC aided Cognitive Radio (CR) aerial networks,namely CR-MEC aerial networks.Explicitly,this multilevel optimization problem could be decomposed into the user pairing and power allocation as well as time allocation sub-problems.In the conceived CR-MEC aerial networks,we propose a User Pairing and Computation Offloading Management Algorithm (UPCOMA) based on three-sided matching theory,aiming to minimize the system’s energy consumption.At the first step of UPCOMA,multiple Primary Users (PUs) and Cognitive Users (CUs) on the ground negotiate to each other with the suitable power allocation coefficients and construct the stable user pairs.Moreover,the stable user pairs would match to a high altitude platform who act as the base station,which is for appropriately allocating Transmission Time Slots (TSs) at the second step of UPCOMA.Additionally,a hybrid offloading mode is proposed in our conceived networks in order to support ground users to offload their tasks adaptively according to their individual deadlines.Furthermore,the simulation results reveal that the relative performance of UPCOMA is close to that of the Brute-Force Search Algorithm (BFSA) with low complexity.Meanwhile,the hybrid offloading mode with less energy consumption supports much more ground user pairs to offload tasks compared to the binary mode.展开更多
IEEE International Conference on Communication Technology(ICCT)was jointly initiated and organized by IEEE Beijing Section and IEEE Com Soc in 1986.It is one of the highest-level academic events in the field of commun...IEEE International Conference on Communication Technology(ICCT)was jointly initiated and organized by IEEE Beijing Section and IEEE Com Soc in 1986.It is one of the highest-level academic events in the field of communication technology in China.It is also an international gathering for research for information and communication technology.展开更多
5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques whic...5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack,physical-layer security(PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users,and realize keyless secure transmission via signal design and signal processing techniques.PLS avoids the difficulties in the distribution and management of secret keys,and provides flexible security levels through adaptive transmission protocol design.Moreover,PLS techniques match the features of 5G networks well.Therefore,the application of PLS to 5G networks is a promising solution to address the security threats.This article presents a comprehensive review of the state-of-the-art PLS techniques,and discusses their applications in 5G networks.We first summarize the principle and advantages of PLS techniques,and point out the reasons why PLS is suitable for 5G networks.Then,we review the existing PLS methods in literature,and highlight severalPLS solutions that are expected to be applied in 5G networks.Finally,we conclude this article and figure out some further research directions.展开更多
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no...In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.展开更多
To solve the contradiction between the increasing demand of diverse vehicular wireless applications and the shortage of spectrum resource, a novel cognitive cooperative vehicular ad-hoc network (CC- VANET) framework...To solve the contradiction between the increasing demand of diverse vehicular wireless applications and the shortage of spectrum resource, a novel cognitive cooperative vehicular ad-hoc network (CC- VANET) framework is proposed in this paper. Firstly, we develop an adaptive cognitive spectrum sensing (ACSS) mechanism which can help to trigger and adjust the spectrum sensing window according to network traffic load status and communication quality. And then, Generalized Nash Bargaining SoLution (GNBS), which can achieve a good tradeoff between efficiency and weighted fairness, is proposed to formulate the asymmetric inter- cell resource allocation. Finally, GNBS- Safety (GNBS-S) scheme is developed to enhance the Quality of Service (QoS) of safety applications, especially in the heavy load status, where the bandwidth demanded and supplied cannot be matched well. Furthermore, the primary user activity (PUA) which can cause rate loss to secondary users, is also considered to alleviate its influence to fairness. Simulation results indicate that the proposed CC-VANET scheme can greatly improve the spectrum efficiency and reduce the transmission delay and packet loss rate on the heavy contention status. And GNBS spectrum allocation scheme outperforms both the Max-rain and Max-rate schemes, and canenhance the communication reliability of safety service considerably in CC-VANET.展开更多
Cognitive Radio Network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obt...Cognitive Radio Network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obtain the Spectrum Availability Information(SAI). Energy detection is a typical technology to get SAI. With the mobility of primary users, the energy received by secondary users varies greatly with the distance from the target primary users. Most of the existing energy detection algorithms that use fixed thresholds are not suitable. We propose a Dynamic Matching-Based Spectrum Detection(DMBSD) scheme which can detect sensing data, reduce the impact of malicious data and make final sensing results more accurate with dynamic threshold setting and data matching. Simulation results show that the proposed scheme can detect tempered data, and increase detection probability by decreasing false alarm probability and missed detection probability.展开更多
This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(...This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(VCs)in the environment of the number of receive antennas being no less than that of transmit antennas.The VCs will cause a rank deficiency problem in computing the subspace information.With the subcarrier mapping matrix,the received signal is simplified to remove the rank deficiency.We use the RIS scheme to generate many times of equivalent symbols so the channel identification can converge with few received OFDM blocks.The RIS scheme will convert the white noise into non-white noise.With the Cholesky factorization,a noise whitening technique is developed to turn the non-white noise back to white noise.We further analyze the necessary conditions of identifiability of channel estimation.Simulations are performed to show the superiority of the proposed method.展开更多
Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear comp...Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear complexity,minimal polynomial,and autocorrelation are investigated.The results show that these sequences have a large linear complexity when 2∈D1,which means they can resist the Berlekamp-Massey attack.Furthermore,the autocorrelation values are close to 0 with a probability of approximately 1?1/r.Therefore,when r is a big prime,the new sequence has a good autocorrelation.展开更多
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha...For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.展开更多
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component...In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.展开更多
With the development of the Cyber-Physical Internet of Things System(CPIoTS),the number of Cyber-Physical System(CPS)applications accessed in networks has increased dramatically.Latency-sensitive resource orchestratio...With the development of the Cyber-Physical Internet of Things System(CPIoTS),the number of Cyber-Physical System(CPS)applications accessed in networks has increased dramatically.Latency-sensitive resource orchestration in CPS applications is extraordinarily essential for maintaining the Quality of Experience(QoE)for users.Although edge-cloud computing performs effectively in achieving latency-aware resource allocation in CPIoTS,existing methods fail to jointly consider the security and reliability requirements,thereby increasing the process latency of tasks and degrading the QoE of users.This paper aims to minimize the system latency of edge-cloud computing coupled with CPS while simultaneously considering the security and reliability requirements.We first consider a time-varying channel model as a Finite-State Markov Channel(FSMC)and propose a distributed blockchain-assisted CPIoTS to realize secure consensus and reliable resource orchestration by offloading computation tasks in edge-cloud computing.Moreover,we propose an efficient resource allocation algorithm,PPO-SRRA,that optimizes computing offloading and multi-dimension resource(e.g.,communication,computation,and consensus resource)allocation by using a policy-based Deep Reinforcement Learning(DRL)method.The experimental results show that the proposed resource allocation scheme can reduce the system latency and ensure consensus security.展开更多
Wireless Body Area Network(WBAN) is the most promising technology in e-health applications.Energy efficiency stands out as the paramount issue for WBAN.In this paper,an energy efficient MAC protocol named Quasi-Sleep-...Wireless Body Area Network(WBAN) is the most promising technology in e-health applications.Energy efficiency stands out as the paramount issue for WBAN.In this paper,an energy efficient MAC protocol named Quasi-Sleep-Preempt-Supported(QSPS) is proposed.The protocol is mainly TDMA-based:nodes transmit packets in the allocated slots,while entering the Q-Sleep mode in other slots.Moreover,for a node with emergency packet,it can broadcast a special designed Awakening Message to wake up the whole network and preempts the right to use the current slot to transmit that emergency packet,thus decreasing delay.Compared with relevant protocols,QS-PS can achieve high energy efficiency and decrease the delay of both normal packets and emergency packets.展开更多
基金supported in part by the NSF of China under Grant 62322106,62071131the Guangdong Basic and Applied Basic Research Foundation under Grant 2022B1515020086+2 种基金the International Collaborative Research Program of Guangdong Science and Technology Department under Grant 2022A0505050070in part by the Open Research Fund of the State Key Laboratory of Integrated Services Networks under Grant ISN22-23the National Research Foundation,Singapore University of Technology Design under its Future Communications Research&Development Programme“Advanced Error Control Coding for 6G URLLC and mMTC”Grant No.FCP-NTU-RG-2022-020.
文摘This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications.
基金supported in part by the National Natural Science Foundation of China(No.61941105,No.61901327 and No.62101450)in part by the National Natural Science Foundation for Distinguished Young Scholar(No.61825104)+1 种基金in part by the Fundamental Research Funds for the Central Universities(JB210109)in part by the Foundation of State Key Laboratory of Integrated Services Networks of Xidian University(ISN22-03)。
文摘In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance.
基金supported by the National Natural Science Foundation of China(Grant Nos.61004101,11161013,and 61164020)the Natural Science Foundation of Guangxi Province,China(Grant Nos.2011GXNSFB018059 and 2013GXNSFAA019006)+2 种基金the 2012 Open Grant of Guangxi Key Lab of Wireless Wideband Communication and Signal Processing,Chinathe 2012 Open Grant of the State Key Laboratory of Integrated Services Networks of Xidian University,Chinathe Graduate Education Innovation Project of Guilin University of Electronic Technology,China(Grant No.GDYCSZ201472)
文摘Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an epidemic network can increase its epidemic threshold. In this paper, by using limit theory and dynamical system theory, we further give global stability analysis of a susceptible-infected-susceptible (SIS) epidemic model on networks with awareness. Results show that the obtained epidemic threshold is also a global stability condition for its endemic equilibrium, which implies the embedded awareness can enhance the epidemic threshold globally. Some numerical examples are presented to verify the theoretical results.
文摘In next generation networks, multiradio networks are emerging in order to deal with exponential data traffic increasing. Integrated Femto-WiFi(IFW) small cells have been introduced by 3GPP to offload data from cellular networks recently. These IFW cells are multi-mode capable(i.e., both licensed bands via cellular interface and unlicensed bands via WiFi interface). Therefore how to offload data effectively has become one of the most significant discussions in 5G Multi-Radio Heterogeneous Network. So far, most researches mainly focus on the generality of UEs, few attention has been paid to UEs' individual requirements. Considering UE's preference vary from individual to individual, in this paper, we present an UE preference-aware network selection scheme for mobile data offloading. It intelligently supports the distribution of heterogeneous classes of services, considers different types of UEs and delay-tolerant flows, and handles the mobility of UEs. The simulation results show the superiority of the proposed algorithm in user fairness, enhanced capacity and energy saving maximization.
基金supported by the National Natural Science Foundation of China (60932003)the National High Technology Research and Development Program of China (863 Program)(2007AA01Z452+2 种基金 2009AA01Z118)Shanghai Municipal Natural Science Foundation (09ZR1414900)The National Undergraduate Innovative Test Program(091024812)
文摘Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.
基金supported in part by the National Natural Science Foundation of China(No.61941105,No.61901327 and No.62101450)in part by the National Natural Science Foundation for Distinguished Young Scholar(No.61825104)+1 种基金in part by the Fundamental Research Funds for the Central Universities(JB210109)in part by the Foundation of State Key Laboratory of Integrated Services Networks of Xidian University(ISN22-03)。
文摘This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based orthogonal time frequency space(OTFS)transmission scheme,namely NOMAOTFS,in order to combat Doppler effect as well as to improve the spectral efficiency.Further,we propose a power allocation method addressing the trade-off between the reliability of multicast streaming and the confidentiality of unicast streaming.Based on that,we utilize the relay selection strategy,to improve the security of unicast streaming.In the context of multicastunicast streaming,our simulation findings validate the effectiveness of the NOMA-OTFS based cooperative transmission,which can significantly outperform the existing NOMA-OFDM in terms of both reliability and security.
基金Supported by the National High Technology Research and Development Program of China(No.2011AA01A105)the Key Deplogment Project of China Academic of Sciences(KGZD-EW-103)Shanghai Committee of Science and Technology(11DZ1500500)
文摘In order to realize the coexistence between the LTE system and the spectrum authorized systems over 700MHz frequency band,the geographical position and operation band location between long term evolution(LTE)base stations and digital tevevision transmission tower should satisfy certain constraints,which are analyzed and deduced in this paper.Under the concluded constraints,the interference to each other is lower than their interference tolerances,so that the coexistance between the two types of systems is performed.Based on the constraints for both LTE and spectrum authorized systems,numerical results of the geographical position interval and operation band location interval are obtained,which have significant practical value for the LTE base station placement,network planning and operation band selection.
基金This work was supported by National Natural Science Foundation of China(No.62271368,No.62201421)National Natural Science Foundation of Shaanxi Province(No.2021JQ-206)+1 种基金Guangdong Basic and Applied Basic Research Foundation(No.2020A1515110084)China Postdoctoral Science Foundation(No.2018M640960,No.2019T120879).
文摘To promote the application of edge com-puting in wireless blockchain networks,this paper presents a business ecosystem,where edge comput-ing is introduced to assist blockchain users in imple-menting the mining process.This paper exploits re-source trading and miner competition to enable se-cure and efficient transactions in the presented busi-ness ecosystem.The resource trading problem is for-mulated as a Stackelberg game between miner candi-dates and edge computing servers,where computing,caching,and communication resources are jointly op-timized to maximize the potential profit.Partial of-floading is introduced to further enhance the system performance when compared with the existing work.We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium.Based on the optimization result,winners are selected from the set of miner candidates by bidding and constitute the mining network.Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners,thus stimulating more blockchain users to join the mining network.
基金supported by National Nature Science Foundation of China (No.62101450)in part by the Shenzhen Science Technology Program,China (No.JCYJ20210324121006017)in part by Key R&D Plan of Shaan Xi Province,China (No.2023YBGY037)。
文摘Future Sixth-Generation (6G) mobile communication networks extremely require the global connectivity and the ground Base Stations (BSs) are difficult to develop in some specific areas,such as mountainous areas.Therefore,the aerial networks are the key framework for the future communications,in which the aerial vehicle could act as the access point.Additionally,Mobile Edge Computing (MEC) is also essential to enhance the data processing capabilities of aerial networks.In this paper,we study a comprehensive communication-computation resource management problem for jointly optimizing user pairing,power and time allocation in the MEC aided Cognitive Radio (CR) aerial networks,namely CR-MEC aerial networks.Explicitly,this multilevel optimization problem could be decomposed into the user pairing and power allocation as well as time allocation sub-problems.In the conceived CR-MEC aerial networks,we propose a User Pairing and Computation Offloading Management Algorithm (UPCOMA) based on three-sided matching theory,aiming to minimize the system’s energy consumption.At the first step of UPCOMA,multiple Primary Users (PUs) and Cognitive Users (CUs) on the ground negotiate to each other with the suitable power allocation coefficients and construct the stable user pairs.Moreover,the stable user pairs would match to a high altitude platform who act as the base station,which is for appropriately allocating Transmission Time Slots (TSs) at the second step of UPCOMA.Additionally,a hybrid offloading mode is proposed in our conceived networks in order to support ground users to offload their tasks adaptively according to their individual deadlines.Furthermore,the simulation results reveal that the relative performance of UPCOMA is close to that of the Brute-Force Search Algorithm (BFSA) with low complexity.Meanwhile,the hybrid offloading mode with less energy consumption supports much more ground user pairs to offload tasks compared to the binary mode.
文摘IEEE International Conference on Communication Technology(ICCT)was jointly initiated and organized by IEEE Beijing Section and IEEE Com Soc in 1986.It is one of the highest-level academic events in the field of communication technology in China.It is also an international gathering for research for information and communication technology.
基金supported in part by the National Natural Science Foundation of China under Grants No.61671369 and 61431011the National Science and Technology Major Project of China under Grant No.2016ZX03001012004+1 种基金the Open Research Fund of the State Key Laboratory of Integrated Services Networks,Xidian University,under Grant No.ISN18-02the Fundamental Research Funds for the Central Universities of China
文摘5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack,physical-layer security(PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users,and realize keyless secure transmission via signal design and signal processing techniques.PLS avoids the difficulties in the distribution and management of secret keys,and provides flexible security levels through adaptive transmission protocol design.Moreover,PLS techniques match the features of 5G networks well.Therefore,the application of PLS to 5G networks is a promising solution to address the security threats.This article presents a comprehensive review of the state-of-the-art PLS techniques,and discusses their applications in 5G networks.We first summarize the principle and advantages of PLS techniques,and point out the reasons why PLS is suitable for 5G networks.Then,we review the existing PLS methods in literature,and highlight severalPLS solutions that are expected to be applied in 5G networks.Finally,we conclude this article and figure out some further research directions.
基金the National Natural Science Foundation of China under Grant 61701059,Grant 61941114,and Grant 61831002,in part by the Fundamental Research Funds for the Central Universities of New TeachersProject,in part by the Chongqing Technological Innovation and Application Development Projects under Grant cstc2019jscx-msxm1322,and in part by the Eighteentg Open Foundation of State Key Lab of Integrated Services Networks of Xidian University under Grant ISN20-05.
文摘In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.
基金supported in part by program for National Natural Science Foundation of China under Grant No.61271184863 Program of China under Grant No.2013AA013301+1 种基金New Century Excellent Talents in University(NCET-11-0594)Open Fund of the State Key Laboratory of Integrated Services Networks(No.ISN12-03)
文摘To solve the contradiction between the increasing demand of diverse vehicular wireless applications and the shortage of spectrum resource, a novel cognitive cooperative vehicular ad-hoc network (CC- VANET) framework is proposed in this paper. Firstly, we develop an adaptive cognitive spectrum sensing (ACSS) mechanism which can help to trigger and adjust the spectrum sensing window according to network traffic load status and communication quality. And then, Generalized Nash Bargaining SoLution (GNBS), which can achieve a good tradeoff between efficiency and weighted fairness, is proposed to formulate the asymmetric inter- cell resource allocation. Finally, GNBS- Safety (GNBS-S) scheme is developed to enhance the Quality of Service (QoS) of safety applications, especially in the heavy load status, where the bandwidth demanded and supplied cannot be matched well. Furthermore, the primary user activity (PUA) which can cause rate loss to secondary users, is also considered to alleviate its influence to fairness. Simulation results indicate that the proposed CC-VANET scheme can greatly improve the spectrum efficiency and reduce the transmission delay and packet loss rate on the heavy contention status. And GNBS spectrum allocation scheme outperforms both the Max-rain and Max-rate schemes, and canenhance the communication reliability of safety service considerably in CC-VANET.
基金supported by the National Natural Science Foundation of China (No.61602358)the Key Program of NSFC-Tongyong Union Foundation under Grant U1636209the Fundamental Research Funds for the Central Universities (No.XJS17078)
文摘Cognitive Radio Network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obtain the Spectrum Availability Information(SAI). Energy detection is a typical technology to get SAI. With the mobility of primary users, the energy received by secondary users varies greatly with the distance from the target primary users. Most of the existing energy detection algorithms that use fixed thresholds are not suitable. We propose a Dynamic Matching-Based Spectrum Detection(DMBSD) scheme which can detect sensing data, reduce the impact of malicious data and make final sensing results more accurate with dynamic threshold setting and data matching. Simulation results show that the proposed scheme can detect tempered data, and increase detection probability by decreasing false alarm probability and missed detection probability.
基金Fujian Province Education Department(No.JAT170470)in part by the National Nature Science Foundation of China(No.61501041)+1 种基金in part by the Open Foundation of State Key Laboratory(No.ISN19-19)in part by the Ministry of Science and Technology,Taiwan,China(No.MOST 104-2221-E-030-004-MY2,MOST 108-2221-E-030-002).
文摘This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(VCs)in the environment of the number of receive antennas being no less than that of transmit antennas.The VCs will cause a rank deficiency problem in computing the subspace information.With the subcarrier mapping matrix,the received signal is simplified to remove the rank deficiency.We use the RIS scheme to generate many times of equivalent symbols so the channel identification can converge with few received OFDM blocks.The RIS scheme will convert the white noise into non-white noise.With the Cholesky factorization,a noise whitening technique is developed to turn the non-white noise back to white noise.We further analyze the necessary conditions of identifiability of channel estimation.Simulations are performed to show the superiority of the proposed method.
基金supported by the National Key Research and Development Program of China(2016YFB0800601)the Natural Science Foundation of China(61303217+3 种基金61502372)the Fundamental Research Funds for the Central Universities(JB140115)the Natural Science Foundation of Shaanxi Province(2013JQ80022014JQ8313)
文摘Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear complexity,minimal polynomial,and autocorrelation are investigated.The results show that these sequences have a large linear complexity when 2∈D1,which means they can resist the Berlekamp-Massey attack.Furthermore,the autocorrelation values are close to 0 with a probability of approximately 1?1/r.Therefore,when r is a big prime,the new sequence has a good autocorrelation.
基金the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
文摘For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
基金supported by the National Natural Science Foundation of China(Grant No.61322104,61571240)the State Key Development Program of Basic Research of China(2013CB329005)+3 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe University Natural Science Research Foundation of Anhui Province(No.KJ2015A105,No.KJ2015A092)The open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(NYKL201509)The open research fund of the State Key Laboratory of Integrated Services Networks,Xidian University(ISN17-04)
文摘In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.
基金This work has been supported by the National Natural Science Foundation of China(Nos.62071354)Open Research Projects of Zhejiang Lab(No.2019KD0AD01/013)+1 种基金the Key Research and Development Program of Shaanxi(ProgramNo.2022ZDLGY05-08)also supported by the ISN State Key Laboratory.
文摘With the development of the Cyber-Physical Internet of Things System(CPIoTS),the number of Cyber-Physical System(CPS)applications accessed in networks has increased dramatically.Latency-sensitive resource orchestration in CPS applications is extraordinarily essential for maintaining the Quality of Experience(QoE)for users.Although edge-cloud computing performs effectively in achieving latency-aware resource allocation in CPIoTS,existing methods fail to jointly consider the security and reliability requirements,thereby increasing the process latency of tasks and degrading the QoE of users.This paper aims to minimize the system latency of edge-cloud computing coupled with CPS while simultaneously considering the security and reliability requirements.We first consider a time-varying channel model as a Finite-State Markov Channel(FSMC)and propose a distributed blockchain-assisted CPIoTS to realize secure consensus and reliable resource orchestration by offloading computation tasks in edge-cloud computing.Moreover,we propose an efficient resource allocation algorithm,PPO-SRRA,that optimizes computing offloading and multi-dimension resource(e.g.,communication,computation,and consensus resource)allocation by using a policy-based Deep Reinforcement Learning(DRL)method.The experimental results show that the proposed resource allocation scheme can reduce the system latency and ensure consensus security.
基金supported in part by National Natural Science Foundation of China(NSFC,No.61325012,6171219,6122001,61202373)
文摘Wireless Body Area Network(WBAN) is the most promising technology in e-health applications.Energy efficiency stands out as the paramount issue for WBAN.In this paper,an energy efficient MAC protocol named Quasi-Sleep-Preempt-Supported(QSPS) is proposed.The protocol is mainly TDMA-based:nodes transmit packets in the allocated slots,while entering the Q-Sleep mode in other slots.Moreover,for a node with emergency packet,it can broadcast a special designed Awakening Message to wake up the whole network and preempts the right to use the current slot to transmit that emergency packet,thus decreasing delay.Compared with relevant protocols,QS-PS can achieve high energy efficiency and decrease the delay of both normal packets and emergency packets.