期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Max-min security energy efficiency optimization for UAV-RIS-enhanced short-packet communication systems 被引量:1
1
作者 Zhengqiang WANG Kunhao HUANG +3 位作者 Yongjun XU Bin DUO Chengyu WU Liuwei HUO 《Chinese Journal of Aeronautics》 2025年第10期271-285,共15页
This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The ba... This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The base station(BS)provides short packet services to ground users using the non-orthogonal multiple access(NOMA)protocol through UAV-RIS,while preventing eavesdropper attacks.To optimize SEE,a joint optimization is performed concerning power allocation,UAV position,decoding order,and RIS phase shifts.An iterative algorithm based on block coordinate descent is proposed for mixed-integer non-convex SEE optimization problem.The original problem is decomposed into three sub-problems,solved alternately using successive convex approximation(SCA),quadratic transformation,penalty function,and semi-definite programming(SDP).Simulation results demonstrate the performance of the UAV-RIS-enhanced short-packet system under different parameters and verify the algorithm’s convergence.Compared to benchmark schemes such as orthogonal multiple access,long packet communication,and sum SEE,the proposed UAV-RIS-enhanced short-packet scheme achieves the higher minimum user’s SEE. 展开更多
关键词 Block coordinate descent Non-orthogonal multiple access(NOMA) Reconfigurable intelligent surface(RIS) security energy efficiency(SEE) Short-packet communication Unmanned aerial vehicle(UAV)
原文传递
Secure Computation Efficiency Resource Allocation for Massive MIMO-Enabled Mobile Edge Computing Networks 被引量:1
2
作者 Sun Gangcan Sun Jiwei +3 位作者 Hao Wanming Zhu Zhengyu Ji Xiang Zhou Yiqing 《China Communications》 SCIE CSCD 2024年第11期150-162,共13页
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ... In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes. 展开更多
关键词 EAVESDROPPING massive multiple input multiple output mobile edge computing partial offloading secure computation efficiency
在线阅读 下载PDF
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming
3
作者 Xintong Zhou Kun Xiao Feng Ke 《Digital Communications and Networks》 2025年第3期829-836,共8页
In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi... In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system. 展开更多
关键词 Wireless cooperative network Physical layer security Energy harvesting Resource allocation Spectrum sharing Secure energy efficiency
在线阅读 下载PDF
Efficient and Secure Authenticated Quantum Dialogue Protocols over Collective-Noise Channels
4
作者 肖敏 曹云茹 宋秀丽 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第3期6-10,共5页
Based on the deterministic secure quantum communication, we present a novel quantum dialogue protocol with- out information leakage over the collective noise channel. The logical qubits and four-qubit decoherence-free... Based on the deterministic secure quantum communication, we present a novel quantum dialogue protocol with- out information leakage over the collective noise channel. The logical qubits and four-qubit decoherence-free states are introduced for resisting against collective-dephasing noise, collective-rotation noise and all kinds of unitary collective noise, respectively. Compared with the existing similar protocols, the analyses on security and information-theoretical emciency show that the proposed protocol is more secure and emeient. 展开更多
关键词 Efficient and Secure Authenticated Quantum Dialogue Protocols over Collective-Noise Channels
原文传递
Designing efficient proxy signature schemes for mobile communication 被引量:9
5
作者 LU RongXing DONG XiaoLei CAO ZhenFu 《Science in China(Series F)》 2008年第2期183-195,共13页
Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the ... Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al's pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment. 展开更多
关键词 proxy signature proxy protected signature proxy aggregate signature bilinear pairings provable secure efficiency
原文传递
Deep Learning for Secure Transmission in Reconfigurable Intelligent Surface-Assisted Communications
6
作者 Junhao Fang Xiangyu Zou +5 位作者 Chongwen Huang Zhaohui Yang Yongjun Xu Xiao Chen Jianfeng Shi Mohammad Shikh-Bahaei 《Journal of Communications and Information Networks》 EI CSCD 2023年第2期122-132,共11页
This paper investigates the secure transmission for reconfigurable intelligent surface(RIS)-assisted wireless communication systems.In the studied model,one user connects to the access point via a RIS while an eavesdr... This paper investigates the secure transmission for reconfigurable intelligent surface(RIS)-assisted wireless communication systems.In the studied model,one user connects to the access point via a RIS while an eavesdropper eavesdrops on the signal sent from the user to the access point.Therefore,it is necessary to design an appropriate RIS reflection vector to solve the eavesdropping problem.This problem is formulated as an optimization problem whose goal is to maximize the secure energy efficiency which is defined as the ratio of the secure rate to the total energy consumption of the system via jointly optimizing the RIS reflection reflector as well as the number of RIS elements,which results in a non-convex optimization problem that is intractable to solve by traditional methods.To tackle this issue,a new algorithm by leveraging the advance of the established deep learning(DL)technique is proposed so as to find the optimal RIS reflection vector and determine the optimal number of RIS reflection elements.Simulation results show that the proposed method reaches 96%of the optimal secure energy efficiency of the genie-aided algorithm. 展开更多
关键词 RISs physical layer security DL secure energy efficiency
原文传递
QUASI-CONVEX MULTIOBJECTIVE GAME-SOLUTION CONCEPTS,EXISTENCE AND SCALARIZATION
7
作者 LI YUANXI 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 1995年第2期233-244,共12页
This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be appl... This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished. 展开更多
关键词 Multiobjective generalized game Pareto-optimal absolute security strategy Pareto-optimal weakly efficient security strategy.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部