期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Secure and energy-efficient UAV-assisted maritime communication under multiple eavesdroppers with imperfect CSI and collusion
1
作者 Fang MEI Yuqing LIU +4 位作者 Shuo GAO Jiahui LI Hui KANG Sujin HOU Geng SUN 《Chinese Journal of Aeronautics》 2025年第10期170-184,共15页
The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MC... The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MCNs to extend flexibility and mobility.However,harsh maritime environments and open line-of-sight(LoS)links increase the UAV onboard energy consumption and worsen communication security.In this work,we aim to propose a collaborative beamforming-based physical layer secure and energy-efficient communication method for UAV-assisted MCNs,in which the energy limitations of UAVs and the interference from both known and unknown eavesdroppers as well as the possible collusion among eavesdroppers are considered.Specifically,we formulate a multi-objective optimization problem(MOP)to improve the system confidentiality rate,reduce the level ratio of the UAV virtual antenna array,and decrease the energy consumption of the UAVs by jointly optimizing the UAV positions and synthesizing the UAV virtual antenna array.This MOP is non-convex and NP-hard,and thus we propose an enhanced non-dominated sorted whale optimization algorithm(ENSWOA)to solve the problem.In ENSWOA,the introduced chaotic solution initialization,adaptive weighting,and optimal position updating methods can increase the searching capability of the algorithm.Simulation results show that the proposed ENSWOA outperforms the baseline algorithms,and can effectively enhance the security and energy efficiency of the considered system. 展开更多
关键词 Channel state information Collaborative beamforming eavesdropper collusion 5G mobile communication systems Unmanned aerial vehicles
原文传递
Physical-layer security in MU-MISO downlink networks against potential eavesdroppers
2
作者 Woong Son Minkyu Oh +1 位作者 Heejung Yu Bang Chul Jung 《Digital Communications and Networks》 2025年第2期424-431,共8页
Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Se... Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations. 展开更多
关键词 Physical-layer security Opportunistic feedback Potential eavesdroppers Secrecy outage probability Secrecy energy-efficiency
在线阅读 下载PDF
Secure Rate Maximization for UAV-RIS-Aided IoT Network in Smart Grid
3
作者 Jian Wu Xiaowei Hao Chao Han 《Energy Engineering》 2026年第3期215-231,共17页
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat... Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios. 展开更多
关键词 Smart grid Internet of Things unmanned aerial vehicles reconfigurable intelligent surface eavesdropper secure capacity
在线阅读 下载PDF
Controlled Secure Quantum Dialogue Using a Pure Entangled GHZ States 被引量:9
4
作者 XIA Yan SONG Jie NIE Jing SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第5X期841-846,共6页
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We ... We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party. 展开更多
关键词 controlled secure quantum dialogue eavesdropper non-maximally entangled GHZ state
在线阅读 下载PDF
Statistical Analysis of a Class of Secure Relay Assisted Cognitive Radio Networks 被引量:1
5
作者 Mona Shokair Waleed Saad Shady M.Ibraheem 《China Communications》 SCIE CSCD 2018年第12期174-189,共16页
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward r... In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect. 展开更多
关键词 RELAY selection non-colluding or colluding eavesdroppers OUTAGE PROBABILITY SECRECY rate power constraints.
在线阅读 下载PDF
Anti-Jamming and Anti-Eavesdropping in A2G Communication System with Jittering UAV 被引量:1
6
作者 Huici Wu Yang Wen +1 位作者 Xiaofeng Tao Jin Xu 《China Communications》 SCIE CSCD 2023年第10期230-244,共15页
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd... This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method. 展开更多
关键词 UAV jitter A2G communication active eavesdropper non-cooperative game
在线阅读 下载PDF
Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order 被引量:1
7
作者 宋杰 朱爱东 张寿 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第3期621-623,共3页
This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotat... This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication. 展开更多
关键词 quantum secure direct communication eavesdropper blind polarization bases
原文传递
Eavesdropping on the quantum dialogue protocol in lossy channel
8
作者 刘恒 张秀兰 吕辉 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第7期69-73,共5页
We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] a... We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed. 展开更多
关键词 quantum dialogue eavesdropper transmission efficiency
原文传递
Controlled Secure Quantum Communication Using Pure Entangled W Class States
9
作者 XIA Yan SONG Jie SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第4期919-924,共6页
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorize... We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies. 展开更多
关键词 controlled secure quantum communication eavesdropper non-maximally entangled W state
在线阅读 下载PDF
Interference management for active RIS-aided symbiotic radio networks
10
作者 Weidong Wan Yi Liu Hailin Zhang 《Journal of Information and Intelligence》 2025年第4期326-344,共19页
Symbiotic radio(SR)is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems.In SR networks,utilizing active reconfigurable intelligent surface(RIS)as th... Symbiotic radio(SR)is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems.In SR networks,utilizing active reconfigurable intelligent surface(RIS)as the secondary transmitter(STx)enhances this mutual benefit compared to passive RIS.This paper addresses the interference management challenges that inevitably arise from employing active RIS.We consider a common SR network consisting of three types of users:SR users,non-SR users,and eavesdroppers.Additionally,each SR user has their own unique cellular services.We propose minimizing the total power consumption while satisfying a suffi-ciently large signal-to-interference-plus-noise ratio(SINR)for SR users,a small enough SINR for eavesdroppers,and a small enough interference temperature for non-SR users.The alternative optimization(AO)method is used for decoupling multi-variables.The non-convex constraints are relaxed as convex ones through first-order Taylor approximation,and the bounded channel state information(CSI)error model is handled using the S-procedure.Simulations validate the supe-riority of the proposed algorithm and demonstrate that the total power consumption is minimized while meeting performance thresholds.Additionally,the results offer valuable insights for SR network deployment. 展开更多
关键词 Symbiotic radio Active reconfigurable intelligent surface(RIS) Interference management eavesdropper Interference temperature Power consumption minimization
原文传递
Break-Pad: efective padding machines for tor with break burst padding
11
作者 Bin Huang Yanhui Du 《Cybersecurity》 2025年第4期197-214,共18页
Website Fingerprinting(WF)attacks enable a local eavesdropper to use metadata of packet fow,such as size,tim-ing,and direction,to infer the websites a user is visiting.This can damage the user privacy provided by anon... Website Fingerprinting(WF)attacks enable a local eavesdropper to use metadata of packet fow,such as size,tim-ing,and direction,to infer the websites a user is visiting.This can damage the user privacy provided by anonymity systems such as Tor.Tor has implemented the WF defense called Circuit Padding Framework,which provides an inter-face for developers to implement their own defenses.However,these defenses in the framework were overcome by the Deep Fingerprinting(DF)attack.In this paper,we propose a novel defense approach called break burst padding(Break-Pad),which injects a random number of padding packets into an incoming burst once the number of consecutive incoming packets exceeds a set number.We integrated Break-Pad into the existing Circuit Padding Framework.In addition,we have implemented two padding machines named August and October in the new framework and conducted experiments to evaluate these machines.In the open-world setting,our results show that August,with 29%bandwidth overhead,reduces Tik-Tok’s TPR by 14.48%and DF’s TPR by 22%.October outper-forms the best padding machine,RBB.With 36%bandwidth overhead,it drops Tik-Tok’s TPR to 74.24%and DF’s TPR to 65.36%.In the one-page setting,October further reduces the bandwidth overhead by 11%while achieving similar performance to RBB.In the information leak analysis,for the burst sequence feature of the trafc,October leaks at 2.453 bits,while the best comparable padding machine Interspace leaks at 2.629 bits. 展开更多
关键词 anonymity systems local eavesdropper website fingerprinting wf attacks break pad deep fingerprinting df attackin break burst padding circuit padding frameworkwhich circuit padding framework
原文传递
Game-theoretical analysis of strategic information transmission for gradient privacy protection
12
作者 Hanyuan Jiang Wanjun Song +2 位作者 Long Bai Yuzhe Li Tianyou Chai 《Journal of Control and Decision》 2025年第4期501-514,共14页
Privacy protection of shared gradients in machine learning model training is crucial,yet the coexistence of honest-curious learners and malicious eavesdroppers in the real world is overlooked in research.A linear stra... Privacy protection of shared gradients in machine learning model training is crucial,yet the coexistence of honest-curious learners and malicious eavesdroppers in the real world is overlooked in research.A linear strategy-based privacy protection method for three-party games with eavesdroppers is proposed to address privacy threats in machine learning model training.Firstly,a three-party game framework is designed based on machine learning model training,with the data owner as the leader and the learner and eavesdropper as followers,leading to a privacy protection optimisation problem.Secondly,two eavesdropping scenarios are considered:limited and complete encoded information.By solving the equilibrium solution of the optimisation problem,the optimal strategy pair is obtained,and a strategic privacy protection information transmission mechanism is proposed.Finally,simulation experiments illustrate the theoretical results,validating the effectiveness of the algorithms proposed in this paper. 展开更多
关键词 Machine learning privacy protection malicious eavesdropper game theory
原文传递
Securing acoustics-based short-range communication systems:an overview
13
作者 CHEN Si QIN Zhan +1 位作者 XING Guoliang REN Kui 《Journal of Communications and Information Networks》 2016年第4期44-51,共8页
Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple a... Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology. 展开更多
关键词 ACOUSTIC eavesdropper short-range communication ICA BSS randomize channel motion source usability
原文传递
Enhancing physical-layer security via big-data-aided hybrid relay selection
14
作者 Hongliang He Pinyi Ren +2 位作者 Qinghe Du Li Sun Yichen Wang 《Journal of Communications and Information Networks》 2017年第1期97-110,共14页
The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structu... The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme. 展开更多
关键词 Big data hybrid relay selection secrecy outage probability eavesdropper physical layer security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部