This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The ba...This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The base station(BS)provides short packet services to ground users using the non-orthogonal multiple access(NOMA)protocol through UAV-RIS,while preventing eavesdropper attacks.To optimize SEE,a joint optimization is performed concerning power allocation,UAV position,decoding order,and RIS phase shifts.An iterative algorithm based on block coordinate descent is proposed for mixed-integer non-convex SEE optimization problem.The original problem is decomposed into three sub-problems,solved alternately using successive convex approximation(SCA),quadratic transformation,penalty function,and semi-definite programming(SDP).Simulation results demonstrate the performance of the UAV-RIS-enhanced short-packet system under different parameters and verify the algorithm’s convergence.Compared to benchmark schemes such as orthogonal multiple access,long packet communication,and sum SEE,the proposed UAV-RIS-enhanced short-packet scheme achieves the higher minimum user’s SEE.展开更多
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ...In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.展开更多
In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi...In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system.展开更多
Based on the deterministic secure quantum communication, we present a novel quantum dialogue protocol with- out information leakage over the collective noise channel. The logical qubits and four-qubit decoherence-free...Based on the deterministic secure quantum communication, we present a novel quantum dialogue protocol with- out information leakage over the collective noise channel. The logical qubits and four-qubit decoherence-free states are introduced for resisting against collective-dephasing noise, collective-rotation noise and all kinds of unitary collective noise, respectively. Compared with the existing similar protocols, the analyses on security and information-theoretical emciency show that the proposed protocol is more secure and emeient.展开更多
Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the ...Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al's pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment.展开更多
This paper investigates the secure transmission for reconfigurable intelligent surface(RIS)-assisted wireless communication systems.In the studied model,one user connects to the access point via a RIS while an eavesdr...This paper investigates the secure transmission for reconfigurable intelligent surface(RIS)-assisted wireless communication systems.In the studied model,one user connects to the access point via a RIS while an eavesdropper eavesdrops on the signal sent from the user to the access point.Therefore,it is necessary to design an appropriate RIS reflection vector to solve the eavesdropping problem.This problem is formulated as an optimization problem whose goal is to maximize the secure energy efficiency which is defined as the ratio of the secure rate to the total energy consumption of the system via jointly optimizing the RIS reflection reflector as well as the number of RIS elements,which results in a non-convex optimization problem that is intractable to solve by traditional methods.To tackle this issue,a new algorithm by leveraging the advance of the established deep learning(DL)technique is proposed so as to find the optimal RIS reflection vector and determine the optimal number of RIS reflection elements.Simulation results show that the proposed method reaches 96%of the optimal secure energy efficiency of the genie-aided algorithm.展开更多
This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be appl...This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished.展开更多
基金co-supported by the National Natural Science Foundation of China(Nos.U23A20279,62271094)the National Key R&D Program of China(No.SQ2023YFB2500024)+2 种基金the Science Foundation for Youths of Natural Science Foundation of Sichuan Provincial,China(No.2022NSFSC0936)the China Postdoctoral Science Foundation(No.2022M720666)the Open Fund of Key Laboratory of Big Data Intelligent Computing,Chongqing University of Posts and Telecommunications,China(No.BDIC-2023-B-002).
文摘This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The base station(BS)provides short packet services to ground users using the non-orthogonal multiple access(NOMA)protocol through UAV-RIS,while preventing eavesdropper attacks.To optimize SEE,a joint optimization is performed concerning power allocation,UAV position,decoding order,and RIS phase shifts.An iterative algorithm based on block coordinate descent is proposed for mixed-integer non-convex SEE optimization problem.The original problem is decomposed into three sub-problems,solved alternately using successive convex approximation(SCA),quadratic transformation,penalty function,and semi-definite programming(SDP).Simulation results demonstrate the performance of the UAV-RIS-enhanced short-packet system under different parameters and verify the algorithm’s convergence.Compared to benchmark schemes such as orthogonal multiple access,long packet communication,and sum SEE,the proposed UAV-RIS-enhanced short-packet scheme achieves the higher minimum user’s SEE.
基金The Natural Science Foundation of Henan Province(No.232300421097)the Program for Science&Technology Innovation Talents in Universities of Henan Province(No.23HASTIT019,24HASTIT038)+2 种基金the China Postdoctoral Science Foundation(No.2023T160596,2023M733251)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University(No.2023D11)the Song Shan Laboratory Foundation(No.YYJC022022003)。
文摘In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62171188]the Guangdong Provincial Key Laboratory of Human Digital Twin[Grant 2022B1212010004].
文摘In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system.
基金Supported by the Foundation and Frontier Research Program of Chongqing Science and Technology Commission of China under Grant No cstc2016jcyjA0571
文摘Based on the deterministic secure quantum communication, we present a novel quantum dialogue protocol with- out information leakage over the collective noise channel. The logical qubits and four-qubit decoherence-free states are introduced for resisting against collective-dephasing noise, collective-rotation noise and all kinds of unitary collective noise, respectively. Compared with the existing similar protocols, the analyses on security and information-theoretical emciency show that the proposed protocol is more secure and emeient.
基金Supported by the National Natural Science Foundation of China(Grant Nos.60572155 and 60673079)the National High Technology Development Program of China(Grant No.2006AA01Z424)the National Research Fund for the Doctoral Program of Higher Education of China(Grant No.20060248008)
文摘Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al's pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment.
基金China National Key R&D Program(2021YFA1000500)National Natural Science Foundation of China(62101492)+7 种基金Zhejiang Provincial Natural Science Foundation of China(LR22F010002)Natural Science Foundation of Jiangsu Province of China(BK20210641)Natural Science Foundation of Jiangsu Province of China(BK20210641)Engineering and Physical Sciences Research Council(EPSRC)(EP/P022723/1)National Natural Science Foundation of China(62271094)Key Fund of Natural Science Foundation of Chongqing(CSTB2022NSCQLZX0009)Scientific and Technological Research Program of Chongqing Municipal Education Commission(KJZD-K202200601)China Postdoctoral Science Foundation(2022MD723725)。
文摘This paper investigates the secure transmission for reconfigurable intelligent surface(RIS)-assisted wireless communication systems.In the studied model,one user connects to the access point via a RIS while an eavesdropper eavesdrops on the signal sent from the user to the access point.Therefore,it is necessary to design an appropriate RIS reflection vector to solve the eavesdropping problem.This problem is formulated as an optimization problem whose goal is to maximize the secure energy efficiency which is defined as the ratio of the secure rate to the total energy consumption of the system via jointly optimizing the RIS reflection reflector as well as the number of RIS elements,which results in a non-convex optimization problem that is intractable to solve by traditional methods.To tackle this issue,a new algorithm by leveraging the advance of the established deep learning(DL)technique is proposed so as to find the optimal RIS reflection vector and determine the optimal number of RIS reflection elements.Simulation results show that the proposed method reaches 96%of the optimal secure energy efficiency of the genie-aided algorithm.
文摘This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished.