In recent years,the demands of high traffic transmission motivate the rapid development of wireless access techniques,and it becomes promising to design the fifth generation(5G)wireless networks.Essential requirements...In recent years,the demands of high traffic transmission motivate the rapid development of wireless access techniques,and it becomes promising to design the fifth generation(5G)wireless networks.Essential requirements for 5G involve higher traffic volume,indoor or hotspot traffic,and spectrum,energy,and cost efficien-cy.展开更多
The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity g...The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.展开更多
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.展开更多
In Power Line Communications(PLC),there are regulatory masks that restrict the transmit power spectral density for electromagnetic compatibility reasons,which creates coverage issues despite the not too long distances...In Power Line Communications(PLC),there are regulatory masks that restrict the transmit power spectral density for electromagnetic compatibility reasons,which creates coverage issues despite the not too long distances.Hence,PLC networks often employ repeaters/relays,especially in smart grid neighborhood area networks.Even in broadband indoor PLC systems that offer a notable data rate,relaying may pave the way to new applications like being the backbone for wireless technologies in a cost-effective manner to support the Internet-of-things paradigm.In this paper,we study Multiple-Input Multiple-Output(MIMO)PLC systems that incorporate inband full-duplex functionality in relaying networks.We present several MIMO configurations that allow end-to-end half-duplex or full-duplex operations and analyze the achievable performance with state-of-the-art PLC systems.To reach this analysis,we get channel realizations from random network layouts for indoor and outdoor scenarios.We adopt realistic MIMO channel and noise models and consider transmission techniques according to PLC standards.The concepts discussed in this work can be useful in the design of future PLC relay-aided networks for different applications that look for a coverage extension and/or throughput:smart grids with enhanced communications in outdoor scenarios,and“last meter”systems for high-speed connections everywhere in indoor ones.展开更多
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.展开更多
This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying tec...This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying techniques are utilized to enhance secrecy performance. By jointly optimizing the link selection strategy, the UAV position, and the reflection coefficient of the IRS, we aim to maximize the long-term average secrecy rate. Specifically, we propose a novel buffer in/out stabilization scheme based on the Lyapunov framework, which transforms the long-term average secrecy rate maximization problem into two per-slot drift-plus-penalty minimization problems with different link selection factors. The hybrid Particle Swarm Optimization-Artificial Fish Swarm Algorithm (PSO-AFSA) is adopted to optimize the UAV position, and the IRS reflection coefficient optimization problem is solved by iterative optimization in which auxiliary variables and standard convex optimization algorithms are introduced. Finally, the delay constraint is set to ensure the timeliness of information packets. Simulation results demonstrate that our proposed scheme outperforms the comparison schemes in terms of average secrecy rate. Specifically, the addition of BA improves the average secrecy rate by 1.37 bps/Hz, and the continued optimizations of IRS reflection coefficients and UAV positions improve the average secrecy rate by 2.46 bps/Hz and 3.75 bps/Hz, respectively.展开更多
卫星下行链路因其开放性、广域覆盖性而面临严峻的窃听威胁,传统以加密技术为核心的卫星下行链路防窃听方案在计算复杂度与抗量子攻击能力上存在双重瓶颈,且现有卫星下行链路物理层安全防窃听方案的应用场景存在局限性。针对以上问题,...卫星下行链路因其开放性、广域覆盖性而面临严峻的窃听威胁,传统以加密技术为核心的卫星下行链路防窃听方案在计算复杂度与抗量子攻击能力上存在双重瓶颈,且现有卫星下行链路物理层安全防窃听方案的应用场景存在局限性。针对以上问题,通过基于动态扩展因子的扰码与编码级联设计,提出一种基于信道状态信息(Channel State Information,CSI)和协作中继的卫星下行链路防窃听方案。首先,通过部署地面中继基站,建立基于协作中继的卫星下行链路通信模型,扩大合法链路与窃听链路的CSI随机性差异;其次,通过合法链路CSI对准循环低密度奇偶校验码扩展因子进行动态调控,增加编码随机性,进而增加窃听者译码难度;最后,通过动态扩展因子与合法链路CSI在卫星端与用户端构建加扰与解扰机制,使窃听者因缺乏合法链路CSI而无法解扰保密信息。仿真结果表明,在用户端误码率低至10-6的情况下,利用扰码对CSI的依赖性构建窃听者解扰壁垒,可使窃听者误码率接近0.5。所提方案凭借对CSI与地面协作中继的协同设计,既具备抵御量子计算攻击的潜在能力,又契合卫星通信网络工程部署对高效低耗的需求,能够有效平衡卫星下行链路信息传输可靠性与安全性的矛盾,可为未来6G空天地一体化场景下的信息安全传输提供具备工程实践价值的技术参考路径。展开更多
A terrestrial relay-aided reconfigurable intelligent surface(RIS)system with decode,re-encode and forward(DRF)relaying scheme is presented where the RIS effectively contributes to both sourceto-destination and relay-t...A terrestrial relay-aided reconfigurable intelligent surface(RIS)system with decode,re-encode and forward(DRF)relaying scheme is presented where the RIS effectively contributes to both sourceto-destination and relay-to-destination signaling.While in the conventional decode and forward(DF)relaying scheme,the source signal is merely duplicated in the relay and the time intervals are equally allocated to the source and relay nodes,this paper considers DRF relaying scheme where versatile time-sharing is adopted for the source and relay nodes which can be optimized based on the relative coordinates of the involved nodes.Two protocols namely unidirectional connection(UC)and bidirectional connection(BC)are proposed based on the source awareness from the relay’s successful reception.The outage probability(OP)performance for both protocols and both DF and DRF relaying schemes is analyzed and tight approximations are obtained.The numerical results show the out-performance of the DRF over the DF relaying scheme in the both UC and BC protocols.Equipped with the obtained system OP,the system throughput is defined and the optimum system throughput is obtained by optimizing the system rate and the timesharing between the source and the relay.Analytical results are corroborated in the numerical examples.展开更多
文摘In recent years,the demands of high traffic transmission motivate the rapid development of wireless access techniques,and it becomes promising to design the fifth generation(5G)wireless networks.Essential requirements for 5G involve higher traffic volume,indoor or hotspot traffic,and spectrum,energy,and cost efficien-cy.
文摘The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.
基金Project supported by the Open Fund of Anhui Key Laboratory of Mine Intelligent Equipment and Technology (Grant No. ZKSYS202204)the Talent Introduction Fund of Anhui University of Science and Technology (Grant No. 2021yjrc34)the Scientific Research Fund of Anhui Provincial Education Department (Grant No. KJ2020A0301)。
文摘Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
基金supported by the Spanish Government and EU,under project PID2019-109842RB-I00/AEI/10.13039/501100011033。
文摘In Power Line Communications(PLC),there are regulatory masks that restrict the transmit power spectral density for electromagnetic compatibility reasons,which creates coverage issues despite the not too long distances.Hence,PLC networks often employ repeaters/relays,especially in smart grid neighborhood area networks.Even in broadband indoor PLC systems that offer a notable data rate,relaying may pave the way to new applications like being the backbone for wireless technologies in a cost-effective manner to support the Internet-of-things paradigm.In this paper,we study Multiple-Input Multiple-Output(MIMO)PLC systems that incorporate inband full-duplex functionality in relaying networks.We present several MIMO configurations that allow end-to-end half-duplex or full-duplex operations and analyze the achievable performance with state-of-the-art PLC systems.To reach this analysis,we get channel realizations from random network layouts for indoor and outdoor scenarios.We adopt realistic MIMO channel and noise models and consider transmission techniques according to PLC standards.The concepts discussed in this work can be useful in the design of future PLC relay-aided networks for different applications that look for a coverage extension and/or throughput:smart grids with enhanced communications in outdoor scenarios,and“last meter”systems for high-speed connections everywhere in indoor ones.
基金supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
文摘Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
基金co-supported by the National Natural Science Foundation of China(Nos.62271399,61901015,GNA22001 and GAA20024)the Zhejiang Provincial Natural Science Foundation of China(No.LQ24F010003).
文摘This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying techniques are utilized to enhance secrecy performance. By jointly optimizing the link selection strategy, the UAV position, and the reflection coefficient of the IRS, we aim to maximize the long-term average secrecy rate. Specifically, we propose a novel buffer in/out stabilization scheme based on the Lyapunov framework, which transforms the long-term average secrecy rate maximization problem into two per-slot drift-plus-penalty minimization problems with different link selection factors. The hybrid Particle Swarm Optimization-Artificial Fish Swarm Algorithm (PSO-AFSA) is adopted to optimize the UAV position, and the IRS reflection coefficient optimization problem is solved by iterative optimization in which auxiliary variables and standard convex optimization algorithms are introduced. Finally, the delay constraint is set to ensure the timeliness of information packets. Simulation results demonstrate that our proposed scheme outperforms the comparison schemes in terms of average secrecy rate. Specifically, the addition of BA improves the average secrecy rate by 1.37 bps/Hz, and the continued optimizations of IRS reflection coefficients and UAV positions improve the average secrecy rate by 2.46 bps/Hz and 3.75 bps/Hz, respectively.
文摘卫星下行链路因其开放性、广域覆盖性而面临严峻的窃听威胁,传统以加密技术为核心的卫星下行链路防窃听方案在计算复杂度与抗量子攻击能力上存在双重瓶颈,且现有卫星下行链路物理层安全防窃听方案的应用场景存在局限性。针对以上问题,通过基于动态扩展因子的扰码与编码级联设计,提出一种基于信道状态信息(Channel State Information,CSI)和协作中继的卫星下行链路防窃听方案。首先,通过部署地面中继基站,建立基于协作中继的卫星下行链路通信模型,扩大合法链路与窃听链路的CSI随机性差异;其次,通过合法链路CSI对准循环低密度奇偶校验码扩展因子进行动态调控,增加编码随机性,进而增加窃听者译码难度;最后,通过动态扩展因子与合法链路CSI在卫星端与用户端构建加扰与解扰机制,使窃听者因缺乏合法链路CSI而无法解扰保密信息。仿真结果表明,在用户端误码率低至10-6的情况下,利用扰码对CSI的依赖性构建窃听者解扰壁垒,可使窃听者误码率接近0.5。所提方案凭借对CSI与地面协作中继的协同设计,既具备抵御量子计算攻击的潜在能力,又契合卫星通信网络工程部署对高效低耗的需求,能够有效平衡卫星下行链路信息传输可靠性与安全性的矛盾,可为未来6G空天地一体化场景下的信息安全传输提供具备工程实践价值的技术参考路径。
文摘A terrestrial relay-aided reconfigurable intelligent surface(RIS)system with decode,re-encode and forward(DRF)relaying scheme is presented where the RIS effectively contributes to both sourceto-destination and relay-to-destination signaling.While in the conventional decode and forward(DF)relaying scheme,the source signal is merely duplicated in the relay and the time intervals are equally allocated to the source and relay nodes,this paper considers DRF relaying scheme where versatile time-sharing is adopted for the source and relay nodes which can be optimized based on the relative coordinates of the involved nodes.Two protocols namely unidirectional connection(UC)and bidirectional connection(BC)are proposed based on the source awareness from the relay’s successful reception.The outage probability(OP)performance for both protocols and both DF and DRF relaying schemes is analyzed and tight approximations are obtained.The numerical results show the out-performance of the DRF over the DF relaying scheme in the both UC and BC protocols.Equipped with the obtained system OP,the system throughput is defined and the optimum system throughput is obtained by optimizing the system rate and the timesharing between the source and the relay.Analytical results are corroborated in the numerical examples.