期刊文献+
共找到101篇文章
< 1 2 6 >
每页显示 20 50 100
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
1
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital Communications and Networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden Jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
2
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
BCDH:Blockchain-based covert Diffie-Hellman key exchange scheme
3
作者 Qinghua Hu Chunxiang Xu Wanpeng Li 《Defence Technology(防务技术)》 2025年第10期24-31,共8页
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha... The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications. 展开更多
关键词 Diffie-Hellman key exchange Digital signature Covert communication Blockchain Blockchain-based covert communication
在线阅读 下载PDF
Reconfigurable Intelligent Surface-Aided MIMO Covert Communications in High-Speed Railway Scenario
4
作者 Zhang Zepeng Li Cuiran +1 位作者 Wu Hao Xie Jianli 《China Communications》 2025年第7期109-123,共15页
This paper investigates the reconfigurable intelligent surface(RIS)-aided MIMO covert communications in high-speed railway(HSR)scenario.In the scenario,RIS controls the phases of reflection elements dynamically to sen... This paper investigates the reconfigurable intelligent surface(RIS)-aided MIMO covert communications in high-speed railway(HSR)scenario.In the scenario,RIS controls the phases of reflection elements dynamically to send the signal in the desired direction,which facilitates the covert communication between base station(BS)and train mobile relay(MR)in the existence of a watchful warden(Willie).To protect the desired transmission,it is assumed that MR sends out jamming signals with a varying power to confuse the Willie.Considering the Doppler spread caused by the time-varying wireless channel,the joint optimization problem of the BS beamforming matrix,MR beamforming matrix,and the RIS phase shifts is established to maximize the covert throughput.An alternating optimization(AO)method for handling non convex problems is proposed based on coupling effects and the constraints of constant modulus,and a semidefinite relaxation method is provided.Finally,we achieve the optimal solutions of the multi-objective optimization problem by interior-point method.The simulation results demonstrate that the proposed algorithm exhibits the superior robustness and covert performances in high-speed railway scenarios. 展开更多
关键词 AO covert communications HSR MIMO mmWave RIS
在线阅读 下载PDF
A Blockchain-Based Covert Communication Model Based on Dynamic Base-K Encoding
5
作者 Wang Zhujun Zhang Lejun +7 位作者 Li Xueqing Tian Zhihong Su Shen Qiu Jing Chen Huiling Qiu Tie Sergey Gataullin Guo Ran 《China Communications》 2025年第6期319-333,共15页
Blockchain,as a distributed ledger,inherently possesses tamper-resistant capabilities,creating a natural channel for covert communication.However,the immutable nature of data storage might introduce challenges to comm... Blockchain,as a distributed ledger,inherently possesses tamper-resistant capabilities,creating a natural channel for covert communication.However,the immutable nature of data storage might introduce challenges to communication security.This study introduces a blockchain-based covert communication model utilizing dynamic Base-K encoding.The proposed encoding scheme utilizes the input address sequence to determine K to encode the secret message and determines the order of transactions based on K,thus ensuring effective concealment of the message.The dynamic encoding parameters enhance flexibility and address issues related to identical transaction amounts for the same secret message.Experimental results demonstrate that the proposed method maintains smooth communication and low susceptibility to tampering,achieving commendable concealment and embedding rates. 展开更多
关键词 base-K encoding blockchain CONCEALMENT covert communication
在线阅读 下载PDF
Covert wireless communication over uplink satellite-terrestrial network
6
作者 Shulei Zeng Bin Cao +2 位作者 Mugen Peng Shuo Wang Chen Sun 《Digital Communications and Networks》 2025年第5期1318-1329,共12页
The emerging deployment of large-scale Low Earth Orbit(LEO)satellite constellations provides seamless global coverage.However,the increasing number of satellites also introduces significant security challenges,such as... The emerging deployment of large-scale Low Earth Orbit(LEO)satellite constellations provides seamless global coverage.However,the increasing number of satellites also introduces significant security challenges,such as eavesdropping and illegal communication behavior detection.This paper investigates covert wireless communication over uplink satellite-terrestrial network,focusing on scenarios with warden satellites.By accounting for shot noise generated by ambient signals from terrestrial interferers,the terrestrial transmitter Alice can effectively hide its signal from warden satellites.Leveraging stochastic geometry,the distributions of distances between transmitter and satellites are analyzed,enabling the assessment of uplink performance and interference within a satellite’s coverage area.Approximate expressions for detection error probability and transmission outage probability are derived.Based on the theoretical analysis,an optimal scheme is proposed to maximize covert throughput under the constraint of the average detection error probability of the most detrimental warden satellite.Extensive Monte Carlo simulations experiments are conducted to validate the accuracy of analytical methods for evaluating covert performance. 展开更多
关键词 Satellite communication systems Covert communication Stochastic geometry Physical layer security UPLINK
在线阅读 下载PDF
A survey of covert UAV communications
7
作者 Fangtao YANG Xiaoqi QIN +3 位作者 Shiqi GONG Na DENG Chengwen XING Nan ZHAO 《Chinese Journal of Aeronautics》 2025年第10期3-18,共16页
Unmanned aerial vehicles(UAVs),characterized by their low cost and operational flexibility,have been increasingly deployed across civilian,military,and commercial applications.To improve the coverage and connectivity,... Unmanned aerial vehicles(UAVs),characterized by their low cost and operational flexibility,have been increasingly deployed across civilian,military,and commercial applications.To improve the coverage and connectivity,UAVs can be utilized to realize the comprehensive spatial coverage for the sixth-generation mobile networks.However,the private data in UAV networks is easy to be exposed due to the light-of-sight links and openness of wireless transmission.Covert communication as an emerging technique has shown its superiority in hiding the transmission behavior,which can further enhance the security of UAV networks compared with the traditional physical-layer security.Therefore,in this article,we present a survey on the recent advanced research about covert UAV communications.First,the roles of UAVs for covert communications are described.Then,the covert UAV communications with different uncertainties are introduced.Moreover,the wireless techniques for covert UAV communications are explored.In addition,we point out the applications in covert UAV communications.Finally,the open research issues concerning practical scenarios and promising applications are highlighted. 展开更多
关键词 Covert communication Sixth-generation networks Unmanned aerial vehicle UNCERTAINTIES Wireless networks
原文传递
Joint Optimization Beamforming and Horizontal Trajectory for UAV Covert Communications in Non-Terrestrial Network
8
作者 Lyu Daxin Wen Zhaoxi +2 位作者 Ma Yingchang Zhang Junlin Liu Mingqian 《China Communications》 2025年第10期34-51,共18页
With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequ... With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequently,safeguarding com-munication information in the NTN has emerged as a critical challenge.To address this issue,we pro-pose a beamforming and horizontal trajectory joint op-timization method for unmanned aerial vehicle(UAV)covert communications in the NTN.First,we formu-late an optimization problem that considers constraints such as the transmitting power and the distance.More-over,we employ the integrated communication and jamming(ICAJ)signal as Alice’s transmitting signal,further protecting the content of communication in-formation.Next,we construct two subproblems,and we propose an alternate optimization(AO)algorithm based on quadratic transform and penalty term method to solve the proposed two subproblems.Simulation re-sults demonstrate that the proposed method is effective and has better performance than benchmarks. 展开更多
关键词 BEAMFORMING covert communications horizontal trajectory optimization integrated commu-nication and jamming non-terrestrial network.
在线阅读 下载PDF
Joint optimization of UAV aided covert edge computing via a deep reinforcement learning framework
9
作者 Wei WEI Shu FU +2 位作者 Yujie TANG Yuan WU Haijun ZHANG 《Chinese Journal of Aeronautics》 2025年第10期96-106,共11页
In this work,we consider an Unmanned Aerial Vehicle(UAV)aided covert edge computing architecture,where multiple sensors are scattered with a certain distance on the ground.The sensor can implement several computation ... In this work,we consider an Unmanned Aerial Vehicle(UAV)aided covert edge computing architecture,where multiple sensors are scattered with a certain distance on the ground.The sensor can implement several computation tasks.In an emergency scenario,the computational capabilities of sensors are often limited,as seen in vehicular networks or Internet of Things(IoT)networks.The UAV can be utilized to undertake parts of the computation tasks,i.e.,edge computing.While various studies have advanced the performance of UAV-based edge computing systems,the security of wireless transmission in future 6G networks is becoming increasingly crucial due to its inherent broadcast nature,yet it has not received adequate attention.In this paper,we improve the covert performance in a UAV aided edge computing system.Parts of the computation tasks of multiple ground sensors are offloaded to the UAV,where the sensors offload the computing tasks to the UAV,and Willie around detects the transmissions.The transmit power of sensors,the offloading proportions of sensors and the hovering height of the UAV affect the system covert performance,we propose a deep reinforcement learning framework to jointly optimize them.The proposed algorithm minimizes the system average task processing delay while guaranteeing that the transmissions of sensors are not detected by the Willie under the covertness constraint.Extensive simulations are conducted to verify the effectiveness of the proposed algorithm to decrease the average task processing delay with comparison with other algorithms. 展开更多
关键词 Covert communication Unmanned aerial vehicle Edge computing Joint optimization Deep reinforcement
原文传递
Covert Rate Characterization under Multi-Antenna Detection:A Study on Warden’s CSI Availability and Noise Uncertainty
10
作者 Zhang Yuchen Xiao Sa +3 位作者 Wang Jianquan Ning Boyu Yuan Xiaojun TangWanbin 《China Communications》 2025年第2期143-159,共17页
In this paper,we investigate covert communications under multi-antenna detection,and explore the impacts of the warden’s channel state information(CSI)availability and the noise uncertainty on system covert capabilit... In this paper,we investigate covert communications under multi-antenna detection,and explore the impacts of the warden’s channel state information(CSI)availability and the noise uncertainty on system covert capability.The detection performance at warden is analyzed in two cases under the perfect and statistical CSI at warden,respectively.In particular,for the former one,the warden utilizes the likelihood ratio(LR)detector,while for the latter one,the generalized likelihood ratio(GLR)detector is adopted.We first consider the scenario where the blocklength is finite,and demonstrate that the covert rate under both cases asymptotically goes to zero as the blocklength goes to infinity.Subsequently,we take the noise uncertainty at the warden into account which leads to positive covert rate,and characterize the covert rate for infinite blocklength.Specially,we derive the optimal transmit power for the legitimate transmitter that maximizes the covert rate.Besides,the rate gap under two cases,with different CSI availability at the warden,can be presented in closed form.Finally,numerical results validate the effectiveness of our theoretical analysis and also demonstrate the impacts of the factors studied on the system covertness. 展开更多
关键词 channel state information covert communications multiple antenna noise uncertainty
在线阅读 下载PDF
A deep reinforcement learning framework and its implementation for UAV-aided covert communication
11
作者 Shu FU Yi SU +1 位作者 Zhi ZHANG Liuguo YIN 《Chinese Journal of Aeronautics》 2025年第2期403-417,共15页
In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of Communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary Comm... In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of Communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary Communication Node(PCN).Specifically,all nodes transmit to the UAV exploiting uplink non-Orthogonal Multiple Access(NOMA),while the UAV performs covert transmission to the PCN at the same frequency.To minimize the average age of covert information,we formulate a joint optimization problem of UAV trajectory and power allocation designing subject to multi-dimensional constraints including covertness demand,communication quality requirement,maximum flying speed,and the maximum available resources.To address this problem,we embed Signomial Programming(SP)into Deep Reinforcement Learning(DRL)and propose a DRL framework capable of handling the constrained Markov decision processes,named SP embedded Soft Actor-Critic(SSAC).By adopting SSAC,we achieve the joint optimization of UAV trajectory and power allocation.Our simulations show the optimized UAV trajectory and verify the superiority of SSAC compared with various existing baseline schemes.The results of this study suggest that by maintaining appropriate distances from both the PCN and CNs,one can effectively enhance the performance of covert communication by reducing the detection probability of the CNs. 展开更多
关键词 Covert communication Unmanned aerial vehicle Deep reinforcement learning Trajectory planning Power allocation Communication systems
原文传递
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing
12
作者 Omar Darwish Shorouq Al-Eidi +4 位作者 Abdallah Al-Shorman Majdi Maabreh Anas Alsobeh Plamen Zahariev Yahya Tashtoush 《Computers, Materials & Continua》 2026年第1期2231-2251,共21页
Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remain... Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remains one of the security challenges. is paper proposes LinguTimeX,a new framework that combines natural language processing with arti cial intelligence,along with explainable Arti cial Intelligence(AI)not only to detect CTC but also to provide insights into the decision process.LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely.LinguTimeX demonstrates strong e ectiveness in detecting CTC across multiple languages;namely English,Arabic,and Chinese.Speci cally,the LSTM and RNN models achieved F1 scores of 90%on the English dataset,89%on the Arabic dataset,and 88%on the Chinese dataset,showcasing their superior performance and ability to generalize across multiple languages. is highlights their robustness in detecting CTCs within security systems,regardless of the language or cultural context of the data.In contrast,the DeepForest model produced F1-scores ranging from 86%to 87%across the same datasets,further con rming its e ectiveness in CTC detection.Although other algorithms also showed reasonable accuracy,the LSTM and RNN models consistently outperformed them in multilingual settings,suggesting that deep learning models might be better suited for this particular problem. 展开更多
关键词 Arabic language Chinese language covert timing channel CYBERSECURITY deep learning English language language processing machine learning
在线阅读 下载PDF
Outage Performance Analysis of UAV-Cooperative Vehicular Communication Systems
13
作者 Liang Linlin Tian Zongkai +4 位作者 Huang Haiyan Zhang Nina Zhang Dehua Song Qipeng Li Yue 《China Communications》 2025年第8期245-256,共12页
The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacki... The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacking sufficient exploration of scenarios where communication nodes are in motion.This paper presents a multi-destination vehicle communication system based on decode-and-forward(DF)UAV relays,where source and destination vehicles are moving and an internal eavesdropper intercepts messages from UAV.The closed-form expressions for system outage probability and secrecy outage probability are derived to analyze the reliability and security of the system.Furthermore,the impact of the UAV's position,signal transmission power,and system time allocation ratio on the system's performance are also analyzed.The numerical simulation results validate the accuracy of the derived formulas and confirm the correctness of the analysis.The appropriate time allocation ratio significantly enhances the security performance of system under various environmental conditions. 展开更多
关键词 covert communication outage probability secrecy outage probability transport communication
在线阅读 下载PDF
Secure and robust power allocation for covert UAV-aided IoT networks using NOMA
14
作者 Yuanai XIE Shisheng LIN +4 位作者 Xiao ZHANG Pan LAI Zhixin LIU Dusit NIYATO Tse-Tin CHAN 《Chinese Journal of Aeronautics》 2025年第10期144-157,共14页
The access of massive Internet of Things(IoT)users poses several challenges for Unmanned Aerial Vehicle(UAV)-aided communications,particularly in terms of security and reliability.This paper investigates a secure and ... The access of massive Internet of Things(IoT)users poses several challenges for Unmanned Aerial Vehicle(UAV)-aided communications,particularly in terms of security and reliability.This paper investigates a secure and robust power allocation scheme for UAV-aided IoT Non-Orthogonal Multiple Access(NOMA)downlink networks with a potential eavesdropper,considering imperfect Channel State Information(CSI).Given the noise uncertainty caused by the UAV’s mobility and the statistical channel estimation error,we formulate a robust optimization problem to maximize the total covert rate of all NOMA users,subject to covertness and rate-based reliability constraints.To solve this optimization problem,we first derive the minimum detection error rate and utilize the statistical characteristics(i.e.,the mean and variance of channel gain errors)to obtain the deterministic covertness and reliability constraints,respectively.We then prove that the problem is concave and determine the optimal power allocation algorithm using the Karush–Kuhn–Tucker conditions.Extensive numerical simulations validate the effectiveness of the proposed algorithm and demonstrate its ability to realize more secure and robust UAV-aided IoT systems. 展开更多
关键词 Unmanned aerial vehicle Wireless security Covert communication Non-orthogonal multiple access Imperfect channel state information Power allocation
原文传递
Total Variation Based Asymptotics of Covert Communication in AWGN Channels
15
作者 Wang Jianquan Tang Wanbin Li Xiaoping 《China Communications》 2025年第5期173-188,共16页
Covert communication guarantees the security of wireless communications via hiding the existence of the transmission.This paper focuses on the first and second order asymptotics of covert communication in the AWGN cha... Covert communication guarantees the security of wireless communications via hiding the existence of the transmission.This paper focuses on the first and second order asymptotics of covert communication in the AWGN channels.The covertness is measured by the total variation distance between the channel output distributions induced with and without the transmission.We provide the exact expressions of the maximum amount of information that can be transmitted with the maximum error probability and the total variation less than any small numbers.The energy detection and the random coding are employed to prove our results.We further compare our results with those under relative entropy.The results show how many additional amounts of information can be transmitted covertly when changing the covertness constraint to total variation. 展开更多
关键词 additive white Gaussian noise channels asymptotical analysis covert communication relative entropy total variation
在线阅读 下载PDF
Intelligent Covert Communication:Recent Advances and Future Research Trends
16
作者 Zan Li Jia Shi +6 位作者 Jiangbo Si Lu Lv Lei Guan Benjian Hao Danyang Wang Chengwen Xing Tony Q.S.Quek 《Engineering》 2025年第1期101-111,共11页
With the future substantial increase in coverage and network heterogeneity,emerging networks will encounter unprecedented security threats.Covert communication is considered a potential enhanced security and privacy s... With the future substantial increase in coverage and network heterogeneity,emerging networks will encounter unprecedented security threats.Covert communication is considered a potential enhanced security and privacy solution for safeguarding future wireless networks,as it can enable monitors to detect the transmitter's transmission behavior with a low probability,thereby ensuring the secure transmission of private information.Due to its favorable security,it is foreseeable that covert communication will be widely used in various wireless communication settings such as medical,financial,and military scenarios.However,existing covert communication methods still present many challenges toward practical applications.In particular,it is difficult to guarantee the effectiveness of covert schemes based on the randomness of eavesdropping environments,and it is challenging for legitimate users to detect weak covert signals.Considering that emerging artificial-intelligence-aided transmission technologies can open up entirely new opportunities to address the above challenges,we provide a comprehensive review of recent advances and potential research directions in the field of intelligent covert communications in this work.First,the basic concepts and performance metrics of covert communications are introduced.Then,existing effective covert communication techniques in the time,frequency,spatial,power,and modulation domains are reviewed.Finally,this paper discusses potential implementations and challenges for intelligent covert communications in future networks. 展开更多
关键词 Covert communication Artificial intelligence Wireless security
在线阅读 下载PDF
A blockchain-assisted lightweight UAV network authentication mechanism via covert communication
17
作者 Yuwen QIAN Huan CAI +4 位作者 Long SHI Zhen MEI Yumeng SHAO Feng SHU Xiangwei ZHOU 《Chinese Journal of Aeronautics》 2025年第10期216-229,共14页
The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional au... The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional authentication approaches are vulnerable due to the transmission of identity information between UAVs and cryptographic paradigm management centers over a public channel.These vulnerabilities include brute-force attacks,single point of failure,and information leakage.Blockchain,as a decentralized distributed ledger with blockchain storage,tamper-proof,secure,and trustworthy features,can solve problems such as single-point-of-failure and trust issues,while the hidden communication in the physical layer can effectively resist information leakage and violent attacks.In this paper,we propose a lightweight UAV network authentication mechanism that leverages blockchain and covert communication,where the identity information is transmitted as covert tags carried by normal modulated signals.In addition,a weight-based Practical Byzantine Fault-Tolerant(wPBFT)consensus protocol is devised,where the weights are determined by the channel states of UAVs and the outcomes of past authentication scenarios.Simulation results demonstrate that the proposed mechanism outperforms traditional benchmarks in terms of security and robustness,particularly under conditions of low Signal-to-Noise Ratio(SNR)and short tag length. 展开更多
关键词 Unmanned Aerial Vehicle(UAV)network Covert communication Blockchain Physical layer AUTHENTICATION
原文传递
Physical Layer Security Scheme With AoI-Awareness for Industrial IoT Based on Covert Communications
18
作者 Yaping Li Zhi-Xin Liu +1 位作者 Jia-Wei Su Ya-Zhou Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期276-278,共3页
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo... Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1]. 展开更多
关键词 industrial iiot internet things iiot physical layer security covert communications malicious detections attacks cyberphysical system cps aoi awareness wireless communication
在线阅读 下载PDF
Establishment and characterization of a continuous marine fish fin cell line from Epinephelus fuscoguttatus and viral susceptibility to crustacean CMNV
19
作者 Ting XUE Yue ZHANG +3 位作者 Zhenxin ZHAO Yaru LI Jinwu WANG Huarong GUO 《Journal of Oceanology and Limnology》 2025年第3期892-905,共14页
Fish cell line provide a useful tool for studies in virology and molecular biology.To establish a novel continuous marine fish cell line(EFF)from caudal fin tissue of brown-marbled grouper Epinephelus fuscoguttatus,it... Fish cell line provide a useful tool for studies in virology and molecular biology.To establish a novel continuous marine fish cell line(EFF)from caudal fin tissue of brown-marbled grouper Epinephelus fuscoguttatus,its susceptibility to the crustacean covert mortality nodavirus(CMNV)was evaluated.The primary cell cultures were initiated first by incomplete digestion of fin tissue blocks with dispase and collagenase,and then the explant was cultured in L-15 medium supplemented with 20%fetal bovine serum,10%grouper muscle extract,and 20-ng/mL growth factors of basic fibroblast growth factor(bFGF)and epidermal growth factor(EGF).The EFF cells were continuously passaged beyond 50 times in fibroblast-like morphology,and they grew well in L-15 medium supplemented with a lower concentration fetal bovine serum(10%)at 28℃ after passage 10,without muscle extract and the growth factors.In addition,their grouper origin was confirmed by chromosome analysis and cytochrome oxidase 1(CO 1)gene analysis of these EFF cells.Transfection experiment via lipofectamine 8000 indicated that the EFF cells had a high transfection potential with a transfection efficiency up to 32%.Cross-species viral susceptibility analysis showed that CMNV not only successfully infected the EFF cells as evidenced by obvious cytopathic effects like vacuolation,detachment and death of cells,but also multiplied in the EFF cells as indicated by the results of semi-quantitative RT-PCR in transmission electron microscopy.Therefore,the establishment of immortal EFF cell line provided a useful cell model for future works on the isolation,multiplication,and pathogenic mechanism of cross-species infection of CMNV as well as genetic manipulation. 展开更多
关键词 Epinephelus fuscoguttatus fish cell line(EFF) caudal fin TRANSFECTION covert mortality nodavirus(CMNV) cross-species infection
在线阅读 下载PDF
Multi-hop UAV relay covert communication:A multi-agent reinforcement learning approach
20
作者 Hengzhi BAI Haichao WANG +4 位作者 Rongrong HE Jiatao DU Guoxin LI Yuhua XU Yutao JIAO 《Chinese Journal of Aeronautics》 2025年第10期120-133,共14页
Due to the characteristics of line-of-sight(LoS)communication in unmanned aerial vehicle(UAV)networks,these systems are highly susceptible to eavesdropping and surveillance.To effectively address the security concerns... Due to the characteristics of line-of-sight(LoS)communication in unmanned aerial vehicle(UAV)networks,these systems are highly susceptible to eavesdropping and surveillance.To effectively address the security concerns in UAV communication,covert communication methods have been adopted.This paper explores the joint optimization problem of trajectory and transmission power in a multi-hop UAV relay covert communication system.Considering the communication covertness,power constraints,and trajectory limitations,an algorithm based on multi-agent proximal policy optimization(MAPPO),named covert-MAPPO(C-MAPPO),is proposed.The proposed method leverages the strengths of both optimization algorithms and reinforcement learning to analyze and make joint decisions on the transmission power and flight trajectory strategies for UAVs to achieve cooperation.Simulation results demonstrate that the proposed method can maximize the system throughput while satisfying covertness constraints,and it outperforms benchmark algorithms in terms of system throughput and reward convergence speed. 展开更多
关键词 Covert communication Unmanned aerial vehicle(UAV) Power optimization Trajectory planning Multi-agent reinforcement learning(MARL)
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部