Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ...Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.展开更多
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu...The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.展开更多
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ...Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years.展开更多
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati...Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include:展开更多
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic...NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.展开更多
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen...Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications.展开更多
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and...Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods.展开更多
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan...The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS.展开更多
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature...Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication.展开更多
Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c...Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.展开更多
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco...We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a...To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore.展开更多
The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all t...The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack.展开更多
Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communica...Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication.展开更多
Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal ...Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references.展开更多
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint...B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen...D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available.展开更多
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu...his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications.展开更多
文摘Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.
基金Supported by the National Natural Science Foundation of China (60673071)
文摘The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.
文摘Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years.
文摘Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include:
基金the Taif University Researchers Supporting Project number(TURSP-2020/36),Taif University,Taif,Saudi Arabiafundedby Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia。
文摘NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.
基金supported by the National Natural Science Foundation of China(Grant Nos.61927811,62035009,and 11974258)the Fundamental Research Program of Shanxi Province(Grant No.202103021224038)+3 种基金the Development Fund in Science and Technology of Shanxi Province(Grant No.YDZJSX2021A009)the Open Fund of State Key Laboratory of Applied Optics(Grant No.SKLAO2022001A09)the Science and Technology Foundation of Guizhou Province(Grant Nos.ZK[2021]031 and ZK[2023]049)the Program for Guangdong Introducing Innovative and Entrepreneurial Teams.
文摘Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications.
基金supported in part by the National Science Foundation of China(NSFC)under Grant No.62371131in part by the National Key R&D Program of China under Grant No.2024YFE0200700in part by the program of Zhishan Young Scholar of Southeast University under Grant No.2242024RCB0030。
文摘Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods.
基金supported in part by the Shenzhen Basic Research Program under Grant JCYJ20220531103008018,and Grants 20231120142345001 and 20231127144045001the Natural Science Foundation of China under Grant U20A20156.
文摘The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62071381 and 62301430)Shaanxi Fundamental Science Research Project for Mathematics and Physics(Grant No.23JSY014)+1 种基金Scientific Research Plan Project of Shaanxi Education Department Natural Science Special Project(Grant No.23JK0680)Young Talent Fund of Xi’an Association for Science and Technology(Grant No.959202313011)。
文摘Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3103500in part by the National Natural Science Foundation of China under Grant 62302195.
文摘Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.
基金funding from the Australian Government,via grant AUSMURIB000001 associated with ONR MURI Grant N00014-19-1-2571。
文摘We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61472048,61402058,61272511,61472046,61202082 and 61370194the Beijing Natural Science Foundation under Grant No 4152038the China Postdoctoral Science Foundation Funded Project under Grant No 2014M561826
文摘To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60873191 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 200800131016)+3 种基金the Foundation for Key Program of Ministry of Education of China (Grant No. 109014)the Beijing Nova Program, China (Grant No. 2008B51)the China Post-Doctoral Science Foundation (Grant No. 20090450018)the Natural Science Foundation of Beijing, China (Grant No. 4072020)
文摘The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack.
文摘Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication.
文摘Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references.
文摘B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-
文摘D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available.
文摘his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications.