期刊文献+
共找到6,169篇文章
< 1 2 250 >
每页显示 20 50 100
Max-Min Security Rate Optimization in STAR-RIS Aided Secure MIMO Systems
1
作者 HUANG Jinhao MIAO Ling +1 位作者 SUO Long ZHOU Wen 《电讯技术》 北大核心 2025年第10期1657-1664,共8页
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu... The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems. 展开更多
关键词 multiple-input multiple-output(MIMO) reflecting reconfigurable intelligent surface(STAR-RIS) particle swarm optimization(PSO) max-min security rate optimization
在线阅读 下载PDF
Synchronization of a fractional-order chaotic memristive system and its application to secure image transmission
2
作者 Lamia Chouchane Hamid Hamiche +2 位作者 Karim Kemih Ouerdia Megherbi Karim Labadi 《Chinese Physics B》 2025年第12期174-191,共18页
The dynamics of chaotic memristor-based systems offer promising potential for secure communication.However,existing solutions frequently suffer from drawbacks such as slow synchronization,low key diversity,and poor no... The dynamics of chaotic memristor-based systems offer promising potential for secure communication.However,existing solutions frequently suffer from drawbacks such as slow synchronization,low key diversity,and poor noise resistance.To overcome these issues,a novel fractional-order chaotic system incorporating a memristor emulator derived from the Shinriki oscillator is proposed.The main contribution lies in the enhanced dynamic complexity and flexibility of the proposed architecture,making it suitable for cryptographic applications.Furthermore,the feasibility of synchronization to ensure secure data transmission is demonstrated through the validation of two strategies:an active control method ensuring asymptotic convergence,and a finite-time control method enabling faster stabilization.The robustness of the scheme is confirmed by simulation results on a color image:χ^(2)=253/237/267(R/G/B);entropy≈7.993;correlations between adjacent pixels in all directions are close to zero(e.g.,-0.0318 vertically);and high number of pixel change rate and unified average changing intensity(e.g.,33.40%and 99.61%,respectively).Peak signal-to-noise ratio analysis shows that resilience to noise and external disturbances is maintained.It is shown that multiple fractional orders further enrich the chaotic behavior,increasing the systems suitability for secure communication in embedded environments.These findings highlight the relevance of fractional-order chaotic memristive systems for lightweight secure transmission applications. 展开更多
关键词 MEMRISTOR fractional-order chaotic system SYNCHRONIZATION finite-time control active control CRYPTOGRAPHY secure communications
原文传递
Irregular IRS-aided SWIPT secure communication system with imperfect CSI
3
作者 Chunlong He Guanhai Lin +1 位作者 Chiya Zhang Xingquan Li 《Digital Communications and Networks》 2025年第3期878-885,共8页
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan... The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS. 展开更多
关键词 Irregular intelligent reflecting surface Simultaneous wireless information and power TRANSFER secure communication Topology optimization
在线阅读 下载PDF
A brief review on comparative analysis of IoT-based healthcare system for breast cancer prediction
4
作者 Krishna Murari Rajiv Ranjan Suman 《Medical Data Mining》 2026年第1期46-58,共13页
The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare I... The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts. 展开更多
关键词 IOT healthcare system machine learning breast cancer prediction medical data mining security challenges
在线阅读 下载PDF
Study of dual-directional high rate secure communication systems using chaotic multiple-quantum-well lasers 被引量:4
5
作者 颜森林 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3271-3278,共8页
A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of ... A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5 Gbit/s and a modulation frequency of 1 GHz, chaos modulation with a rate of 0.2 Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2 Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications. 展开更多
关键词 CHAOS MQW laser secure dual-directional communication
原文传递
SecIngress:An API Gateway Framework to Secure Cloud Applications Based on N-Variant System 被引量:6
6
作者 Dacheng Zhou Hongchang Chen +2 位作者 Guozhen Cheng Weizhen He Lingshu Li 《China Communications》 SCIE CSCD 2021年第8期17-34,共18页
Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multip... Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software in parallel and then checking their behaviors’consistency.However,it is complex to upgrade current Software as a Service(SaaS)applications to adapt N-variant system architecture.Challenges arise from the inability of tenants to adjust the application architecture in the cloud environment,and the difficulty for cloud service providers to implement N-variant systems using existing API gateways.This paper proposes SecIngress,an API gateway framework,to overcome the challenge that it is hard in the cloud environment to upgrade the applications based on N-variants system.We design a two-stage timeout processing method to lessen the service latency and an Analytic Hierarchy Process Voting under the Metadata mechanism(AHPVM)to enhance voting accuracy.We implement a prototype in a testbed environment and analyze the security and performance metrics before and after deploying the prototype to show the effectiveness of SecIngress.The results reveal that SecIngress enhances the reliability of cloud applications with acceptable performance degradation. 展开更多
关键词 N-variant system API gateway cloud security analytic hierarchy process
在线阅读 下载PDF
Adaptive projective synchronization of unified chaotic systems and its application to secure communication 被引量:4
7
作者 胡满峰 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3231-3237,共7页
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe... In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility. 展开更多
关键词 projective synchronization adaptive control unified chaotic system secure communication
原文传递
Robust Finite-time Synchronization of Non-identical Fractional-order Hyperchaotic Systems and Its Application in Secure Communication 被引量:5
8
作者 Hadi Delavari Milad Mohadeszadeh 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期228-235,共8页
This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and extern... This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and external disturbances,finite-time synchronization between two FO chaotic and hyperchaotic systems is achieved by introducing a novel adaptive sliding mode controller(ASMC). Here in this paper, a fractional sliding surface is proposed. A stability criterion for FO nonlinear dynamic systems is introduced. Sufficient conditions to guarantee stable synchronization are given in the sense of the Lyapunov stability theorem. To tackle the uncertainties and external disturbances, appropriate adaptation laws are introduced. Particle swarm optimization(PSO) is used for estimating the controller parameters. Finally, finite-time synchronization of the FO chaotic and hyper-chaotic systems is applied to secure communication. 展开更多
关键词 Adaptive SLIDING mode control (ASMC) CHAOS synchronization FRACTIONAL order (FO) hyper-chaotic system LYAPUNOV THEOREM secure communication
在线阅读 下载PDF
Secure Transmission for NOMA Systems with Imperfect SIC 被引量:3
9
作者 Zhongwu Xiang Xiaobing Tong Yueming Cai 《China Communications》 SCIE CSCD 2020年第11期67-78,共12页
This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A p... This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A power allocation scheme is designed for the legitimate users to mitigate the effect of the SIC error caused by imperfect SIC.For characterizing the secrecy performance of the NOMA system,the closed-form expressions for connection outage probability(COP),secrecy outage probability(SOP),and effective secrecy throughput(EST)are derived over Nakagami-m fading channels in both NOMA and benchmark orthogonal multiple access(OMA)systems.We also provide security and reliability trade-off results(SRT)for the users in the NOMA and OMA systems.Simulation results verify our analysis and show that the strong users achieve better secrecy performance but worse reliability performance and NOMA outperforms OMA in terms of SRT. 展开更多
关键词 physical layer security non-orthogonal multiple access imperfect SIC security and reliability trade-off
在线阅读 下载PDF
Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics 被引量:3
10
作者 Ning Wang Xiaojian Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1215-1224,共10页
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt... This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches. 展开更多
关键词 Algebraic Riccati equation(ARE) complex dynamical networks(CDNs) denial-of-service(DoS) secure control
在线阅读 下载PDF
Secure design for cloud control system against distributed denial of service attack 被引量:5
11
作者 Yasir ALI Yuanqing XIA +1 位作者 Liang MA Ahmad HAMMAD 《Control Theory and Technology》 EI CSCD 2018年第1期14-24,共11页
Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing... Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing produced many security challenges regarding the cyber-physical connection between the cloud and control system. The connection between the control system and cloud server can be subjected to distributed denial of service (DDoS) attack by an attacker to destabilize the NCS. In this paper, we will address this issue by building a secure mechanism for such systems. We will design a detection approach and a mitigation approach for better stable performance of NCS. To ensure the stability of NCS at the time of DDoS attack, we will also design a switching mechanism (SM) for cloud control system (CCS) when there are no more real time solutions available from the cloud. Finally, we will apply the proposed mechanism to an unmanned arial vehicle (UAV). Our simulation results show that the mechanism works well in stability and protection of NCS under DDoS attack. 展开更多
关键词 Cloud control system security of NCS analysis of DDoS attack on NCS
原文传递
Secure Transmission in Satellite-UAV Integrated System Against Eavesdropping and Jamming:A Two-Level Stackelberg Game Model 被引量:2
12
作者 Chengjian Liao Kui Xu +3 位作者 Hongpeng Zhu Xiaochen Xia Qiao Su Nan Sha 《China Communications》 SCIE CSCD 2022年第7期53-66,共14页
Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(F... Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(FD)eavesdropping and jamming attacks is proposed.The confrontation relationship between the UAV network and the attacker is established as the first layer Stackelberg game.The source UAV adjusts its own transmission power strategy according to the attacker’s jamming strategy to resist malicious jamming attacks.The internal competition and cooperation relationship in UAV network is modeled as the second layer Stackelberg game,and the optimal cooperative UAV transmits jamming signal to the attacker to resist malicious eavesdropping attacks.Aiming at the“selfishness”of UAV nodes,a price incentive mechanism is established to encourage UAV to actively participate in cooperation,so as to maximize the advantages of cooperative communication.For the proposed TSGM,we construct the utility function and analyze the closed equilibrium solution of the game model,and design a three-stage optimal response iterative(TORI)algorithm to solve the game equilibrium.The simulation results show that the proposed TSGM can effectively increase the utility of the source UAV and improve the enthusiasm of cooperation compared with other power control models. 展开更多
关键词 physical layer security secure transmission satellite-UAV system Stackelberg game
在线阅读 下载PDF
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
13
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
在线阅读 下载PDF
Robust Beamforming for Secured Wireless Power Transfer in MIMO Magnetic Resonant Coupling System:A Probabilistic Approach 被引量:2
14
作者 Ling Xing Kaikai Deng Feifei Gao 《China Communications》 SCIE CSCD 2019年第1期97-107,共11页
Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides... Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides better mobility,flexibility,and convenience due to its simplicity in hardware implementation and longer transmission distances.In this paper,we consider an MRCWPT system with multiple power transmitters,one intended power receiver and multiple unintended power receivers.We investigate the probabilistic robust beamforming designs and provide efficient algorithms to achieve the local optimums under two different criteria,i.e.,total source power minimization problem and min-max unintended receiving power restriction problem.As the problems are quite typical in robust design situations,our proposed robust beamformers can be conveniently applied to other probabilistic robust design problems,thus reduce the complexity as well as improve the beamforming performance.Numerical results demonstrate that the proposed algorithms can significantly improve the performance as well as the robustness of the WPT system. 展开更多
关键词 MAGNETIC RESONANCE coupling wireless POWER transfer BEAMFORMING probabilistic robustness POWER security
在线阅读 下载PDF
Distributed Secure State Estimation of Multi-Agent Systems Under Homologous Sensor Attacks 被引量:2
15
作者 Yukun Shi Youqing Wang Jianyong Tuo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期67-77,共11页
This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the sy... This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously.Specifically,the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication.It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value.Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived.Simulation examples are finally provided to demonstrate the effectiveness of the proposed results. 展开更多
关键词 Consensus-based Luenberger-like observer distributed secure state estimation homologous signal
在线阅读 下载PDF
An Efficient Sound and Data Steganography Based Secure Authentication System 被引量:2
16
作者 Debajit Datta Lalit Garg +5 位作者 Kathiravan Srinivasan Atsushi Inoue G.Thippa Reddy M.Praveen Kumar Reddy K.Ramesh Nidal Nasser 《Computers, Materials & Continua》 SCIE EI 2021年第4期723-751,共29页
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.... The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem. 展开更多
关键词 Cyber-attacks signals PRIVACY security organization ENCRYPTION DECRYPTION authentication effective communication STEGANOGRAPHY
在线阅读 下载PDF
Analysis and design of secure cyber-physical systems 被引量:2
17
作者 Ling SHI 《Control Theory and Technology》 EI CSCD 2014年第4期413-414,共2页
Cyber-physical systems (CPSs) are new emerging systems that seamlessly integrate physical systems, communication systems and computation systems. Their wide use has been witnessed in the past decades in many crossdi... Cyber-physical systems (CPSs) are new emerging systems that seamlessly integrate physical systems, communication systems and computation systems. Their wide use has been witnessed in the past decades in many crossdiscipline fields such as smart energy systems, industrial process control, aerospace and automobile engineering, health-care and assisted living, to just name a few. For many of these systems, secure operations are of key con- cerns. In particular, for some safety-critical applications, security is of paramount importance. Diverse motivations and strong incentives exist everywhere and at any time for launching malicious attacks on the CPSs, for example, economic reasons (e.g., by reducing or even not paying electricity charge) and terrorism the purpose of which is apparent. 展开更多
关键词 Analysis and design of secure cyber-physical systems CPS
原文传递
Secure Irrigation System for Olive Orchards Using Internet of Things 被引量:1
18
作者 Ayman Massaoudi Abdelwahed Berguiga Ahlem Harchay 《Computers, Materials & Continua》 SCIE EI 2022年第9期4663-4673,共11页
Smart irrigation system,also referred as precision irrigation system,is an attractive solution to save the limited water resources as well as to improve crop productivity and quality.In this work,by using Internet of ... Smart irrigation system,also referred as precision irrigation system,is an attractive solution to save the limited water resources as well as to improve crop productivity and quality.In this work,by using Internet of things(IoT),we aim to design a smart irrigation system for olive groves.In such IoT system,a huge number of low-power and low-complexity devices(sensors,actuators)are interconnected.Thus,a great challenge is to satisfy the increasing demands in terms of spectral efficiency.Moreover,securing the IoT system is also a critical challenge,since several types of cybersecurity threats may pose.In this paper,we address these issues through the application of the massive multiple-input multiple-output(M-MIMO)technology.Indeed,M-MIMO is a key technology of the fifth generation(5G)networks and has the potential to improve spectral efficiency as well as the physical layer security.Specifically,by exploiting the available M-MIMO channel degrees of freedom,we propose a physical layer security scheme based on artificial noise(AN)to prevent eavesdropping.Numerical results demonstrate that our proposed scheme outperforms traditional ones in terms of spectral efficiency and secrecy rate. 展开更多
关键词 Smart farming OLIVE IOT massive MIMO spectral efficiency security
在线阅读 下载PDF
Low-power emerging memristive designs towards secure hardware systems for applications in internet of things 被引量:2
19
作者 Nan Du Heidemarie Schmidt Ilia Polian 《Nano Materials Science》 CAS CSCD 2021年第2期186-204,共19页
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security application... Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs. 展开更多
关键词 Memristive technology Nanoelectronic device Low-power consumption MINIATURIZATION Nonvolatility RECONFIGURABILITY In memory computing Artificial intelligence Hardware security primitives Machine learning-related attacks and defenses
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部