The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu...The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.展开更多
The dynamics of chaotic memristor-based systems offer promising potential for secure communication.However,existing solutions frequently suffer from drawbacks such as slow synchronization,low key diversity,and poor no...The dynamics of chaotic memristor-based systems offer promising potential for secure communication.However,existing solutions frequently suffer from drawbacks such as slow synchronization,low key diversity,and poor noise resistance.To overcome these issues,a novel fractional-order chaotic system incorporating a memristor emulator derived from the Shinriki oscillator is proposed.The main contribution lies in the enhanced dynamic complexity and flexibility of the proposed architecture,making it suitable for cryptographic applications.Furthermore,the feasibility of synchronization to ensure secure data transmission is demonstrated through the validation of two strategies:an active control method ensuring asymptotic convergence,and a finite-time control method enabling faster stabilization.The robustness of the scheme is confirmed by simulation results on a color image:χ^(2)=253/237/267(R/G/B);entropy≈7.993;correlations between adjacent pixels in all directions are close to zero(e.g.,-0.0318 vertically);and high number of pixel change rate and unified average changing intensity(e.g.,33.40%and 99.61%,respectively).Peak signal-to-noise ratio analysis shows that resilience to noise and external disturbances is maintained.It is shown that multiple fractional orders further enrich the chaotic behavior,increasing the systems suitability for secure communication in embedded environments.These findings highlight the relevance of fractional-order chaotic memristive systems for lightweight secure transmission applications.展开更多
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan...The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS.展开更多
The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare I...The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts.展开更多
A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of ...A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5 Gbit/s and a modulation frequency of 1 GHz, chaos modulation with a rate of 0.2 Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2 Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications.展开更多
Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multip...Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software in parallel and then checking their behaviors’consistency.However,it is complex to upgrade current Software as a Service(SaaS)applications to adapt N-variant system architecture.Challenges arise from the inability of tenants to adjust the application architecture in the cloud environment,and the difficulty for cloud service providers to implement N-variant systems using existing API gateways.This paper proposes SecIngress,an API gateway framework,to overcome the challenge that it is hard in the cloud environment to upgrade the applications based on N-variants system.We design a two-stage timeout processing method to lessen the service latency and an Analytic Hierarchy Process Voting under the Metadata mechanism(AHPVM)to enhance voting accuracy.We implement a prototype in a testbed environment and analyze the security and performance metrics before and after deploying the prototype to show the effectiveness of SecIngress.The results reveal that SecIngress enhances the reliability of cloud applications with acceptable performance degradation.展开更多
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe...In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.展开更多
This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and extern...This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and external disturbances,finite-time synchronization between two FO chaotic and hyperchaotic systems is achieved by introducing a novel adaptive sliding mode controller(ASMC). Here in this paper, a fractional sliding surface is proposed. A stability criterion for FO nonlinear dynamic systems is introduced. Sufficient conditions to guarantee stable synchronization are given in the sense of the Lyapunov stability theorem. To tackle the uncertainties and external disturbances, appropriate adaptation laws are introduced. Particle swarm optimization(PSO) is used for estimating the controller parameters. Finally, finite-time synchronization of the FO chaotic and hyper-chaotic systems is applied to secure communication.展开更多
This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A p...This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A power allocation scheme is designed for the legitimate users to mitigate the effect of the SIC error caused by imperfect SIC.For characterizing the secrecy performance of the NOMA system,the closed-form expressions for connection outage probability(COP),secrecy outage probability(SOP),and effective secrecy throughput(EST)are derived over Nakagami-m fading channels in both NOMA and benchmark orthogonal multiple access(OMA)systems.We also provide security and reliability trade-off results(SRT)for the users in the NOMA and OMA systems.Simulation results verify our analysis and show that the strong users achieve better secrecy performance but worse reliability performance and NOMA outperforms OMA in terms of SRT.展开更多
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt...This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches.展开更多
Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing...Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing produced many security challenges regarding the cyber-physical connection between the cloud and control system. The connection between the control system and cloud server can be subjected to distributed denial of service (DDoS) attack by an attacker to destabilize the NCS. In this paper, we will address this issue by building a secure mechanism for such systems. We will design a detection approach and a mitigation approach for better stable performance of NCS. To ensure the stability of NCS at the time of DDoS attack, we will also design a switching mechanism (SM) for cloud control system (CCS) when there are no more real time solutions available from the cloud. Finally, we will apply the proposed mechanism to an unmanned arial vehicle (UAV). Our simulation results show that the mechanism works well in stability and protection of NCS under DDoS attack.展开更多
Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(F...Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(FD)eavesdropping and jamming attacks is proposed.The confrontation relationship between the UAV network and the attacker is established as the first layer Stackelberg game.The source UAV adjusts its own transmission power strategy according to the attacker’s jamming strategy to resist malicious jamming attacks.The internal competition and cooperation relationship in UAV network is modeled as the second layer Stackelberg game,and the optimal cooperative UAV transmits jamming signal to the attacker to resist malicious eavesdropping attacks.Aiming at the“selfishness”of UAV nodes,a price incentive mechanism is established to encourage UAV to actively participate in cooperation,so as to maximize the advantages of cooperative communication.For the proposed TSGM,we construct the utility function and analyze the closed equilibrium solution of the game model,and design a three-stage optimal response iterative(TORI)algorithm to solve the game equilibrium.The simulation results show that the proposed TSGM can effectively increase the utility of the source UAV and improve the enthusiasm of cooperation compared with other power control models.展开更多
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes...These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.展开更多
Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides...Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides better mobility,flexibility,and convenience due to its simplicity in hardware implementation and longer transmission distances.In this paper,we consider an MRCWPT system with multiple power transmitters,one intended power receiver and multiple unintended power receivers.We investigate the probabilistic robust beamforming designs and provide efficient algorithms to achieve the local optimums under two different criteria,i.e.,total source power minimization problem and min-max unintended receiving power restriction problem.As the problems are quite typical in robust design situations,our proposed robust beamformers can be conveniently applied to other probabilistic robust design problems,thus reduce the complexity as well as improve the beamforming performance.Numerical results demonstrate that the proposed algorithms can significantly improve the performance as well as the robustness of the WPT system.展开更多
This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the sy...This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously.Specifically,the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication.It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value.Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived.Simulation examples are finally provided to demonstrate the effectiveness of the proposed results.展开更多
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario....The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem.展开更多
Cyber-physical systems (CPSs) are new emerging systems that seamlessly integrate physical systems, communication systems and computation systems. Their wide use has been witnessed in the past decades in many crossdi...Cyber-physical systems (CPSs) are new emerging systems that seamlessly integrate physical systems, communication systems and computation systems. Their wide use has been witnessed in the past decades in many crossdiscipline fields such as smart energy systems, industrial process control, aerospace and automobile engineering, health-care and assisted living, to just name a few. For many of these systems, secure operations are of key con- cerns. In particular, for some safety-critical applications, security is of paramount importance. Diverse motivations and strong incentives exist everywhere and at any time for launching malicious attacks on the CPSs, for example, economic reasons (e.g., by reducing or even not paying electricity charge) and terrorism the purpose of which is apparent.展开更多
Smart irrigation system,also referred as precision irrigation system,is an attractive solution to save the limited water resources as well as to improve crop productivity and quality.In this work,by using Internet of ...Smart irrigation system,also referred as precision irrigation system,is an attractive solution to save the limited water resources as well as to improve crop productivity and quality.In this work,by using Internet of things(IoT),we aim to design a smart irrigation system for olive groves.In such IoT system,a huge number of low-power and low-complexity devices(sensors,actuators)are interconnected.Thus,a great challenge is to satisfy the increasing demands in terms of spectral efficiency.Moreover,securing the IoT system is also a critical challenge,since several types of cybersecurity threats may pose.In this paper,we address these issues through the application of the massive multiple-input multiple-output(M-MIMO)technology.Indeed,M-MIMO is a key technology of the fifth generation(5G)networks and has the potential to improve spectral efficiency as well as the physical layer security.Specifically,by exploiting the available M-MIMO channel degrees of freedom,we propose a physical layer security scheme based on artificial noise(AN)to prevent eavesdropping.Numerical results demonstrate that our proposed scheme outperforms traditional ones in terms of spectral efficiency and secrecy rate.展开更多
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security application...Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs.展开更多
文摘The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.
文摘The dynamics of chaotic memristor-based systems offer promising potential for secure communication.However,existing solutions frequently suffer from drawbacks such as slow synchronization,low key diversity,and poor noise resistance.To overcome these issues,a novel fractional-order chaotic system incorporating a memristor emulator derived from the Shinriki oscillator is proposed.The main contribution lies in the enhanced dynamic complexity and flexibility of the proposed architecture,making it suitable for cryptographic applications.Furthermore,the feasibility of synchronization to ensure secure data transmission is demonstrated through the validation of two strategies:an active control method ensuring asymptotic convergence,and a finite-time control method enabling faster stabilization.The robustness of the scheme is confirmed by simulation results on a color image:χ^(2)=253/237/267(R/G/B);entropy≈7.993;correlations between adjacent pixels in all directions are close to zero(e.g.,-0.0318 vertically);and high number of pixel change rate and unified average changing intensity(e.g.,33.40%and 99.61%,respectively).Peak signal-to-noise ratio analysis shows that resilience to noise and external disturbances is maintained.It is shown that multiple fractional orders further enrich the chaotic behavior,increasing the systems suitability for secure communication in embedded environments.These findings highlight the relevance of fractional-order chaotic memristive systems for lightweight secure transmission applications.
基金supported in part by the Shenzhen Basic Research Program under Grant JCYJ20220531103008018,and Grants 20231120142345001 and 20231127144045001the Natural Science Foundation of China under Grant U20A20156.
文摘The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS.
文摘The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts.
文摘A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical couphng-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5 Gbit/s and a modulation frequency of 1 GHz, chaos modulation with a rate of 0.2 Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2 Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications.
基金the Foundation of the National Natural Science Foundation of China(62072467)the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003)the Foundation of the National Natural Science Foundation of China(62002383).
文摘Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software in parallel and then checking their behaviors’consistency.However,it is complex to upgrade current Software as a Service(SaaS)applications to adapt N-variant system architecture.Challenges arise from the inability of tenants to adjust the application architecture in the cloud environment,and the difficulty for cloud service providers to implement N-variant systems using existing API gateways.This paper proposes SecIngress,an API gateway framework,to overcome the challenge that it is hard in the cloud environment to upgrade the applications based on N-variants system.We design a two-stage timeout processing method to lessen the service latency and an Analytic Hierarchy Process Voting under the Metadata mechanism(AHPVM)to enhance voting accuracy.We implement a prototype in a testbed environment and analyze the security and performance metrics before and after deploying the prototype to show the effectiveness of SecIngress.The results reveal that SecIngress enhances the reliability of cloud applications with acceptable performance degradation.
基金Project supported in part by the National Natural Science Foundation of China (Grant Nos 10372054 and 60575038) and the Science Foundation of Southern Yangtze University of China (Grant No 000408).
文摘In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.
文摘This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and external disturbances,finite-time synchronization between two FO chaotic and hyperchaotic systems is achieved by introducing a novel adaptive sliding mode controller(ASMC). Here in this paper, a fractional sliding surface is proposed. A stability criterion for FO nonlinear dynamic systems is introduced. Sufficient conditions to guarantee stable synchronization are given in the sense of the Lyapunov stability theorem. To tackle the uncertainties and external disturbances, appropriate adaptation laws are introduced. Particle swarm optimization(PSO) is used for estimating the controller parameters. Finally, finite-time synchronization of the FO chaotic and hyper-chaotic systems is applied to secure communication.
基金supported by the National Key R&D Program of China(No.2018YFB1801103)the National Natural Science Foundation of China(No.61771487).
文摘This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve).A power allocation scheme is designed for the legitimate users to mitigate the effect of the SIC error caused by imperfect SIC.For characterizing the secrecy performance of the NOMA system,the closed-form expressions for connection outage probability(COP),secrecy outage probability(SOP),and effective secrecy throughput(EST)are derived over Nakagami-m fading channels in both NOMA and benchmark orthogonal multiple access(OMA)systems.We also provide security and reliability trade-off results(SRT)for the users in the NOMA and OMA systems.Simulation results verify our analysis and show that the strong users achieve better secrecy performance but worse reliability performance and NOMA outperforms OMA in terms of SRT.
基金supported in part by the National Natural Science Foundation of China(61873050)the Fundamental Research Funds for the Central Universities(N180405022,N2004010)+1 种基金the Research Fund of State Key Laboratory of Synthetical Automation for Process Industries(2018ZCX14)Liaoning Revitalization Talents Program(XLYC1907088)。
文摘This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches.
基金This work was supported by the Beijing Natural Science Foundation (No. 4161001), the NSFC Projects of International Cooperation and Exchanges (No. 61 720106010) and the Foundation for Innovative Research Groups of the NSFC (No. 61621063).
文摘Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing produced many security challenges regarding the cyber-physical connection between the cloud and control system. The connection between the control system and cloud server can be subjected to distributed denial of service (DDoS) attack by an attacker to destabilize the NCS. In this paper, we will address this issue by building a secure mechanism for such systems. We will design a detection approach and a mitigation approach for better stable performance of NCS. To ensure the stability of NCS at the time of DDoS attack, we will also design a switching mechanism (SM) for cloud control system (CCS) when there are no more real time solutions available from the cloud. Finally, we will apply the proposed mechanism to an unmanned arial vehicle (UAV). Our simulation results show that the mechanism works well in stability and protection of NCS under DDoS attack.
基金supported in part by the National Natural Science Foundation of China under Grant 62071485, Grant 61901519, Grant 62001513in part by the Basic Research Project of Jiangsu Province under Grant BK 20192002the Natural Science Foundation of Jiangsu Province under Grant BK20201334, and BK20200579
文摘Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(FD)eavesdropping and jamming attacks is proposed.The confrontation relationship between the UAV network and the attacker is established as the first layer Stackelberg game.The source UAV adjusts its own transmission power strategy according to the attacker’s jamming strategy to resist malicious jamming attacks.The internal competition and cooperation relationship in UAV network is modeled as the second layer Stackelberg game,and the optimal cooperative UAV transmits jamming signal to the attacker to resist malicious eavesdropping attacks.Aiming at the“selfishness”of UAV nodes,a price incentive mechanism is established to encourage UAV to actively participate in cooperation,so as to maximize the advantages of cooperative communication.For the proposed TSGM,we construct the utility function and analyze the closed equilibrium solution of the game model,and design a three-stage optimal response iterative(TORI)algorithm to solve the game equilibrium.The simulation results show that the proposed TSGM can effectively increase the utility of the source UAV and improve the enthusiasm of cooperation compared with other power control models.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2022R1I1A3063257)supported by Electronics and Telecommunications Research Institute(ETRI)grant funded by the Korean Government[22ZR1300,Research on Intelligent Cyber Security and Trust Infra].
文摘These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.
基金supported by National Natural Science Foundation of China(Grant No.61771185,61831013)Science and Technology Research Project of Henan Province(Grant No.182102210044)+1 种基金Key Scientific Research Program of Henan Higher Education(Grant No.18A510009)Beijing Municipal Natural Science Foundation(Grant No.4182030)
文摘Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides better mobility,flexibility,and convenience due to its simplicity in hardware implementation and longer transmission distances.In this paper,we consider an MRCWPT system with multiple power transmitters,one intended power receiver and multiple unintended power receivers.We investigate the probabilistic robust beamforming designs and provide efficient algorithms to achieve the local optimums under two different criteria,i.e.,total source power minimization problem and min-max unintended receiving power restriction problem.As the problems are quite typical in robust design situations,our proposed robust beamformers can be conveniently applied to other probabilistic robust design problems,thus reduce the complexity as well as improve the beamforming performance.Numerical results demonstrate that the proposed algorithms can significantly improve the performance as well as the robustness of the WPT system.
基金supported by the Fundamental Research Funds for the Central Universities(buctrc202201)High Performance Computing Platform,College of Information Science and Technology,Beijing University of Chemical Technology。
文摘This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously.Specifically,the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication.It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value.Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived.Simulation examples are finally provided to demonstrate the effectiveness of the proposed results.
文摘The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem.
文摘Cyber-physical systems (CPSs) are new emerging systems that seamlessly integrate physical systems, communication systems and computation systems. Their wide use has been witnessed in the past decades in many crossdiscipline fields such as smart energy systems, industrial process control, aerospace and automobile engineering, health-care and assisted living, to just name a few. For many of these systems, secure operations are of key con- cerns. In particular, for some safety-critical applications, security is of paramount importance. Diverse motivations and strong incentives exist everywhere and at any time for launching malicious attacks on the CPSs, for example, economic reasons (e.g., by reducing or even not paying electricity charge) and terrorism the purpose of which is apparent.
基金The authors extend their appreciation to the Deanship of Scientific Research at Jouf University for funding this work through research Grant No:(DSR-2021-02-0107).
文摘Smart irrigation system,also referred as precision irrigation system,is an attractive solution to save the limited water resources as well as to improve crop productivity and quality.In this work,by using Internet of things(IoT),we aim to design a smart irrigation system for olive groves.In such IoT system,a huge number of low-power and low-complexity devices(sensors,actuators)are interconnected.Thus,a great challenge is to satisfy the increasing demands in terms of spectral efficiency.Moreover,securing the IoT system is also a critical challenge,since several types of cybersecurity threats may pose.In this paper,we address these issues through the application of the massive multiple-input multiple-output(M-MIMO)technology.Indeed,M-MIMO is a key technology of the fifth generation(5G)networks and has the potential to improve spectral efficiency as well as the physical layer security.Specifically,by exploiting the available M-MIMO channel degrees of freedom,we propose a physical layer security scheme based on artificial noise(AN)to prevent eavesdropping.Numerical results demonstrate that our proposed scheme outperforms traditional ones in terms of spectral efficiency and secrecy rate.
基金supported by the DFG(German Research Foundation)Priority Program Nano Security,Project MemCrypto(Projektnummer 439827659/funding id DU 1896/2–1,PO 1220/15–1)the funding by the Fraunhofer Internal Programs under Grant No.Attract 600768。
文摘Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs.