The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MC...The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MCNs to extend flexibility and mobility.However,harsh maritime environments and open line-of-sight(LoS)links increase the UAV onboard energy consumption and worsen communication security.In this work,we aim to propose a collaborative beamforming-based physical layer secure and energy-efficient communication method for UAV-assisted MCNs,in which the energy limitations of UAVs and the interference from both known and unknown eavesdroppers as well as the possible collusion among eavesdroppers are considered.Specifically,we formulate a multi-objective optimization problem(MOP)to improve the system confidentiality rate,reduce the level ratio of the UAV virtual antenna array,and decrease the energy consumption of the UAVs by jointly optimizing the UAV positions and synthesizing the UAV virtual antenna array.This MOP is non-convex and NP-hard,and thus we propose an enhanced non-dominated sorted whale optimization algorithm(ENSWOA)to solve the problem.In ENSWOA,the introduced chaotic solution initialization,adaptive weighting,and optimal position updating methods can increase the searching capability of the algorithm.Simulation results show that the proposed ENSWOA outperforms the baseline algorithms,and can effectively enhance the security and energy efficiency of the considered system.展开更多
Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Se...Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations.展开更多
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat...Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios.展开更多
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We ...We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party.展开更多
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward r...In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect.展开更多
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd...This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.展开更多
This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotat...This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.展开更多
We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] a...We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed.展开更多
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorize...We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies.展开更多
Symbiotic radio(SR)is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems.In SR networks,utilizing active reconfigurable intelligent surface(RIS)as th...Symbiotic radio(SR)is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems.In SR networks,utilizing active reconfigurable intelligent surface(RIS)as the secondary transmitter(STx)enhances this mutual benefit compared to passive RIS.This paper addresses the interference management challenges that inevitably arise from employing active RIS.We consider a common SR network consisting of three types of users:SR users,non-SR users,and eavesdroppers.Additionally,each SR user has their own unique cellular services.We propose minimizing the total power consumption while satisfying a suffi-ciently large signal-to-interference-plus-noise ratio(SINR)for SR users,a small enough SINR for eavesdroppers,and a small enough interference temperature for non-SR users.The alternative optimization(AO)method is used for decoupling multi-variables.The non-convex constraints are relaxed as convex ones through first-order Taylor approximation,and the bounded channel state information(CSI)error model is handled using the S-procedure.Simulations validate the supe-riority of the proposed algorithm and demonstrate that the total power consumption is minimized while meeting performance thresholds.Additionally,the results offer valuable insights for SR network deployment.展开更多
Website Fingerprinting(WF)attacks enable a local eavesdropper to use metadata of packet fow,such as size,tim-ing,and direction,to infer the websites a user is visiting.This can damage the user privacy provided by anon...Website Fingerprinting(WF)attacks enable a local eavesdropper to use metadata of packet fow,such as size,tim-ing,and direction,to infer the websites a user is visiting.This can damage the user privacy provided by anonymity systems such as Tor.Tor has implemented the WF defense called Circuit Padding Framework,which provides an inter-face for developers to implement their own defenses.However,these defenses in the framework were overcome by the Deep Fingerprinting(DF)attack.In this paper,we propose a novel defense approach called break burst padding(Break-Pad),which injects a random number of padding packets into an incoming burst once the number of consecutive incoming packets exceeds a set number.We integrated Break-Pad into the existing Circuit Padding Framework.In addition,we have implemented two padding machines named August and October in the new framework and conducted experiments to evaluate these machines.In the open-world setting,our results show that August,with 29%bandwidth overhead,reduces Tik-Tok’s TPR by 14.48%and DF’s TPR by 22%.October outper-forms the best padding machine,RBB.With 36%bandwidth overhead,it drops Tik-Tok’s TPR to 74.24%and DF’s TPR to 65.36%.In the one-page setting,October further reduces the bandwidth overhead by 11%while achieving similar performance to RBB.In the information leak analysis,for the burst sequence feature of the trafc,October leaks at 2.453 bits,while the best comparable padding machine Interspace leaks at 2.629 bits.展开更多
Privacy protection of shared gradients in machine learning model training is crucial,yet the coexistence of honest-curious learners and malicious eavesdroppers in the real world is overlooked in research.A linear stra...Privacy protection of shared gradients in machine learning model training is crucial,yet the coexistence of honest-curious learners and malicious eavesdroppers in the real world is overlooked in research.A linear strategy-based privacy protection method for three-party games with eavesdroppers is proposed to address privacy threats in machine learning model training.Firstly,a three-party game framework is designed based on machine learning model training,with the data owner as the leader and the learner and eavesdropper as followers,leading to a privacy protection optimisation problem.Secondly,two eavesdropping scenarios are considered:limited and complete encoded information.By solving the equilibrium solution of the optimisation problem,the optimal strategy pair is obtained,and a strategic privacy protection information transmission mechanism is proposed.Finally,simulation experiments illustrate the theoretical results,validating the effectiveness of the algorithms proposed in this paper.展开更多
Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple a...Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology.展开更多
The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structu...The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme.展开更多
基金supported in part by the National Natural Science Foundation of China(Nos.62172186,62002133,61872158,61806083)in part by the Key Research of Science and Technology Development Plan Project of Jilin Province,China(No.20240302075GX)+2 种基金in part by the Postdoctoral Fellowship Program of China Postdoctoral Science Foundation(No.GZC20240592)in part by the China Postdoctoral Science Foundation General Fund(No.2024M761123)in part by the Scientific Research Project of Jilin Provincial Department of Education,China(No.JJKH20250117KJ).
文摘The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MCNs to extend flexibility and mobility.However,harsh maritime environments and open line-of-sight(LoS)links increase the UAV onboard energy consumption and worsen communication security.In this work,we aim to propose a collaborative beamforming-based physical layer secure and energy-efficient communication method for UAV-assisted MCNs,in which the energy limitations of UAVs and the interference from both known and unknown eavesdroppers as well as the possible collusion among eavesdroppers are considered.Specifically,we formulate a multi-objective optimization problem(MOP)to improve the system confidentiality rate,reduce the level ratio of the UAV virtual antenna array,and decrease the energy consumption of the UAVs by jointly optimizing the UAV positions and synthesizing the UAV virtual antenna array.This MOP is non-convex and NP-hard,and thus we propose an enhanced non-dominated sorted whale optimization algorithm(ENSWOA)to solve the problem.In ENSWOA,the introduced chaotic solution initialization,adaptive weighting,and optimal position updating methods can increase the searching capability of the algorithm.Simulation results show that the proposed ENSWOA outperforms the baseline algorithms,and can effectively enhance the security and energy efficiency of the considered system.
基金supported in part by the National Research Foundation of Korea(NRF)funded by the Korea government(MSIT)under Grant NRF-2022R1I1A3073740in part by the Institute for Information and Communications Technology Promotion(IITP)Grant funded by the Korea Government(MSIP,Development of Cube Satellites Based on Core Technologies in Low Earth Orbit Satellite Communications)under Grant RS-2024-00396992in part by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(2022-0-00704,Development of 3D-NET Core Technology for High-Mobility Vehicular Service)。
文摘Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations.
基金supported by State Grid Shanxi Electric Power Company’s Science and Technology Projects(No.52051C230102).
文摘Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios.
基金The project supported by National Natural Science Foundation of China under Grant No. 10575017
文摘We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party.
文摘In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect.
基金supported in part by the Beijing Municipal Natural Science Foundation under Grant 4212005in part by the National Natural Science Foundation of China under 62271076+1 种基金in part by Young Elite Scientists Sponsorship Program by CAST(YESS20200283)in part by the Fundamental Research Funds for the Central Universities under Grant 2242022k60006.
文摘This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.
基金Project supported by the National Natural Science Foundation of China (Grant No 60667001).
文摘This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.
基金Project supported by the Natural Science Foundation of the Anhui Higher Education Institutions of China (Grant No.KJ2011Z359)
文摘We present an improved eavesdropping scheme on the quantum dialogue protocol in lossy channel, which is based on the strategies of Wojcik [Phys. Rev. Lett. 90 157901 (2003)] and ZML [Phys. Lett. A 333 46 (2004)] attack schemes. We show that our attack scheme doubles the domain of Eve's eavesdropping and Eve can gain more information of the communication with less risk of being detected. Finally, a possible improvement for the dialogue protocol security is proposed.
基金The project supported by National Natural Science Foundation of China under Grant No.10575017
文摘We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies.
基金supported in part by the National Key R&D Program of China(2021YFA0716500)and in part by the National 111 Project of China(B08038).
文摘Symbiotic radio(SR)is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems.In SR networks,utilizing active reconfigurable intelligent surface(RIS)as the secondary transmitter(STx)enhances this mutual benefit compared to passive RIS.This paper addresses the interference management challenges that inevitably arise from employing active RIS.We consider a common SR network consisting of three types of users:SR users,non-SR users,and eavesdroppers.Additionally,each SR user has their own unique cellular services.We propose minimizing the total power consumption while satisfying a suffi-ciently large signal-to-interference-plus-noise ratio(SINR)for SR users,a small enough SINR for eavesdroppers,and a small enough interference temperature for non-SR users.The alternative optimization(AO)method is used for decoupling multi-variables.The non-convex constraints are relaxed as convex ones through first-order Taylor approximation,and the bounded channel state information(CSI)error model is handled using the S-procedure.Simulations validate the supe-riority of the proposed algorithm and demonstrate that the total power consumption is minimized while meeting performance thresholds.Additionally,the results offer valuable insights for SR network deployment.
文摘Website Fingerprinting(WF)attacks enable a local eavesdropper to use metadata of packet fow,such as size,tim-ing,and direction,to infer the websites a user is visiting.This can damage the user privacy provided by anonymity systems such as Tor.Tor has implemented the WF defense called Circuit Padding Framework,which provides an inter-face for developers to implement their own defenses.However,these defenses in the framework were overcome by the Deep Fingerprinting(DF)attack.In this paper,we propose a novel defense approach called break burst padding(Break-Pad),which injects a random number of padding packets into an incoming burst once the number of consecutive incoming packets exceeds a set number.We integrated Break-Pad into the existing Circuit Padding Framework.In addition,we have implemented two padding machines named August and October in the new framework and conducted experiments to evaluate these machines.In the open-world setting,our results show that August,with 29%bandwidth overhead,reduces Tik-Tok’s TPR by 14.48%and DF’s TPR by 22%.October outper-forms the best padding machine,RBB.With 36%bandwidth overhead,it drops Tik-Tok’s TPR to 74.24%and DF’s TPR to 65.36%.In the one-page setting,October further reduces the bandwidth overhead by 11%while achieving similar performance to RBB.In the information leak analysis,for the burst sequence feature of the trafc,October leaks at 2.453 bits,while the best comparable padding machine Interspace leaks at 2.629 bits.
基金supported by the Key Research and Development Program of Liaoning Province[grant number 2023JH26/10200011lthe Research Program of the Liaoning Liaohe Laboratory[grant number LLL23ZZ-05-01]the National Natural Science Foundation of China[grant numbers 61991404 and 62394342).
文摘Privacy protection of shared gradients in machine learning model training is crucial,yet the coexistence of honest-curious learners and malicious eavesdroppers in the real world is overlooked in research.A linear strategy-based privacy protection method for three-party games with eavesdroppers is proposed to address privacy threats in machine learning model training.Firstly,a three-party game framework is designed based on machine learning model training,with the data owner as the leader and the learner and eavesdropper as followers,leading to a privacy protection optimisation problem.Secondly,two eavesdropping scenarios are considered:limited and complete encoded information.By solving the equilibrium solution of the optimisation problem,the optimal strategy pair is obtained,and a strategic privacy protection information transmission mechanism is proposed.Finally,simulation experiments illustrate the theoretical results,validating the effectiveness of the algorithms proposed in this paper.
基金This work is supported in part by the U.S.National Science Foundation(No.CNS-1421903)。
文摘Mobile devices such as smartphones and tablets have continued to grow in recent years.Nowadays,people rely on these ubiquitous smart devices and carry them everywhere in their daily lives.Acoustic signal,as a simple and prevalent transmitting vector for end-to-end communication,shows unique characteristics comparing with another popular communication method,i.e.,optical signal,especially on the applications performed over smart devices.Acoustic signal does not require line-of-sight when transmission,the computational power of most smart devices are sufficient to modulate/demodulate acoustic signal using software acoustic modem only,which can be easily deployed on current off-the-shelf smart devices.Therefore,many acoustics-based short range communication systems have been developed and are used in sensitive applications such as building access control and mobile payment system.However,past work shows that an acoustic eavesdropper snooping on the communication between a transmitter and its legitimate receiver can easily break their communication protocol and decode the transmitted information.To solve this problem,many solutions have been proposed to protect the acoustic signal against eavesdroppers.In this overview,we explore the designs of existing solutions,the corresponding implementations,and their methodologies to protect acoustic signal communication.For each dependable and secure acoustics-based short range communication system,we present the major technical hurdles to be overcome,the state-of-the-art,and also offer a vision of the future research issues on this promising technology.
基金This work is supported by the National Natural Science Foundation of China(NSFC)(No.61431011)the Fundamental Research Funds for the Central Universities.
文摘The explosive growth in data trac presents new challenges to the new generation of wireless communication systems,such as computing capabilities,spectrum eciency and security.In this paper,we use the network structure,which is adaptable for the big data trac,to improve the security of wireless networks.Speci cally,a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security.First,considering the ideal situation that an eavesdropper's CSI(Channel State Information)is known to the legal nodes,we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme.In this case,we analyze the upper bound of an eavesdropper's capacity in FD(Full-Duplex)mode and the secrecy outage probabilities of the optimal HD(Half-Duplex),FD,and hybrid relay selection schemes.Through the analysis of data,it is clear that the mode selection is decided by the self-interference of the FD technique.However,the instantaneous CSI of an eavesdropper is dicult to obtain due to the passive characteristic of eavesdroppers in practice.Therefore,a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied,where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows.Finally,the simulation results show the improved security of our proposed scheme.