期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
PLAP-PCPE:Physical-Layer Authentication Protocol Based on PUF and Channel Pre-Equalization for the Internet of Things
1
作者 Guo Dengke Gao Yuwei +2 位作者 Cao Kuo Xiong Jun Ma Dongtang 《China Communications》 2025年第3期234-253,共20页
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with ... How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes. 展开更多
关键词 IoT physical-layer authentication preequalization PUF wireless channel
在线阅读 下载PDF
Physical-layer security in MU-MISO downlink networks against potential eavesdroppers
2
作者 Woong Son Minkyu Oh +1 位作者 Heejung Yu Bang Chul Jung 《Digital Communications and Networks》 2025年第2期424-431,共8页
Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Se... Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations. 展开更多
关键词 physical-layer security Opportunistic feedback Potential eavesdroppers Secrecy outage probability Secrecy energy-efficiency
在线阅读 下载PDF
Endogenous Security Through AI-Driven Physical-Layer Authentication for Future 6G Networks
3
作者 MENG Rui FAN Dayu +2 位作者 XU Xiaodong LYU Suyu TAO Xiaofeng 《ZTE Communications》 2025年第1期18-29,共12页
To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the ... To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the introduction of artificial intelligence(AI)facilitates the learning of the distribution characteristics of channel fingerprints,effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling.This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network(GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users.Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy.Furthermore,this paper outlines the future development directions of PLA. 展开更多
关键词 physical-layer authentication artificial intelligence wireless security intelligent authentication
在线阅读 下载PDF
Joint jammer and user scheduling scheme for wireless physical-layer security
4
作者 丁晓进 宋铁成 +1 位作者 邹玉龙 陈晓曙 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期261-266,共6页
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select... In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions. 展开更多
关键词 security-reliability tradeoff (SRT) multi-user scheduling artificial noise physical-layer security
在线阅读 下载PDF
Performance of Physical-Layer Network Coding in Asymmetric Two-Way Relay Channels 被引量:3
5
作者 李博 王钢 +3 位作者 Peter H.J.Chong 杨洪娟 Yongliang GUAN 沙学军 《China Communications》 SCIE CSCD 2013年第10期65-73,共9页
In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm... In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry. 展开更多
关键词 physical-layer network coding two-way relay channels asymmetric channels bit error rate
在线阅读 下载PDF
Improving the Covertness in the Physical-Layer Authentication 被引量:2
6
作者 Ning Xie TianXing Hu 《China Communications》 SCIE CSCD 2021年第3期122-131,共10页
A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lo... A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lower robustness.This paper concerns the problem of improving the covertness without sacrificing the robustness.This problem is important because of the following reasons:reducing the errors in recovered source message,improving the security,and ease of constructing a multi-factor authentication system.In this paper,we propose three covert PLA schemes to address the problem.In the first scheme,we improve the covertness by reducing the modification ratio on the source message based on an encoding mechanism.In the second scheme,we improve the covertness by optimizing the superimposing angle,which maximizes the minimum distance between the tagged symbols and the boundary line of the demodulation decision for the source message.In the third scheme,referred to as the hybrid scheme,we further improve the covertness by jointly using the advantages of both the above two schemes.Our experimental results show that when the SNR at a legitimate receiver is 25 dB,as compared with the prior scheme,the first scheme improves the covertness by 17:74%,the second scheme improves the covertness by 28:79%,and the third scheme improves the covertness by 32:09%,while they have similar robustness as Received:Aug.07,2020 Revised:Sep.08,2020 Editor:Nanrun Zhou that of the prior scheme. 展开更多
关键词 physical-layer AUTHENTICATION ENCODING covertness superimposing angle SECURITY
在线阅读 下载PDF
Low Transmission Overhead for Polar Coding Physical-Layer Encryption 被引量:1
7
作者 Hongxu Jin Rongke Liu Chenyu Zhang 《China Communications》 SCIE CSCD 2019年第2期246-256,共11页
In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhanc... In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks. 展开更多
关键词 WIRETAP channel polar codes physical-layer security CRYPTOGRAPHY attack
在线阅读 下载PDF
Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling 被引量:1
8
作者 Ding Xiaojin Song Tiecheng Zhang Gengxin 《Journal of Southeast University(English Edition)》 EI CAS 2019年第3期318-324,共7页
In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pa... In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS. 展开更多
关键词 wireless heterogeneous network physical-layer security source-destination pair scheduling
在线阅读 下载PDF
Spatial-Modulated Physical-Layer Network Coding Based on Block Markov Superposition Transmission for Maritime Relay Communications 被引量:1
9
作者 Yao Shi Liming Zheng +1 位作者 Wenchao Lin Xiao Ma 《China Communications》 SCIE CSCD 2020年第3期26-35,共10页
As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,... As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,e.g.,weather conditions,evaporation ducting,and ship rocking caused by waves.To ensure the data transmission reliability,the block Markov superposition transmission(BMST)codes,which are easily configurable and have predictable performance,are applied in this study.Meanwhile,the physical-layer network coding(PNC)scheme with spatial modulation(SM)is adopted to improve the spectrum utilization.For the BMST-SMPNC system,we propose an iterative algorithm,which utilizes the channel observations and the a priori information from BMST decoder,to compute the soft information corresponding to the XORed bits constructed by the relay node.The results indicate that the proposed scheme outperforms the convolutional coded SM-PNC over fast-fading Rician channels.Especially,the performance can be easily improved in high spatial correlation maritime channel by increasing the memory m. 展开更多
关键词 block Markov superposition transmission maritime relay communications physical-layer network coding Rician fading spatial modulation
在线阅读 下载PDF
Independent component analysis to physical-layer network coding over wireless fading channels
10
作者 Bing Du Xiaoming Tao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期196-203,共8页
A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that so... A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that sources broadcast signals simultaneously without orthogonal scheduling.Naturally,the signals overlap in the free space at the receivers.Since the signals from different sources are mutual independent,rooted on this rational assumption,an enhanced joint diagonalization separation named altering row diagonalization(ARD) algorithm is exploited to separate these signals by maximizing the cost function measuring independence among them.This ARD PNC(APNC) methodology provides an innovative way to implement signal-level network coding at the presence of interference and without any priori information about channels in fading environments.In conclusions,the proposed APNC performs well with higher bandwidth utility and lower error rate. 展开更多
关键词 physical-layer network coding (PNC) independentcomponent analysis (ICA) joint diagonalization network coding cooperative communications.
在线阅读 下载PDF
Online Optimization of Physical-Layer Secure Computation Offloading in Dynamic Environments
11
作者 Chenshan Ren Wei Song +1 位作者 Lizhi Zhao Xiaobing Zhao 《China Communications》 SCIE CSCD 2020年第10期19-30,共12页
Mobile edge computing can provide powerful computation services around the end-users.However,given the broadcast nature of wireless transmissions,offloading the computation tasks via the uplink channels would raise se... Mobile edge computing can provide powerful computation services around the end-users.However,given the broadcast nature of wireless transmissions,offloading the computation tasks via the uplink channels would raise serious security concerns.This paper proposes an online approach to jointly optimize local processing,transmit power,and task offloading decisions without the a-priori knowledge of the dynamic environments.The proposed approach can guarantee the secure offloading and asymptotically minimize the time-average energy consumption of devices while maintaining the stability of the ergodic secrecy queues and task queues.By exploiting the Lyapunov optimization,the local processing,transmit power,and task offloading variables can be decoupled between time slots.The subproblems on local processing and computation offloading can be solved separately.Convex optimization and graph matching can be used to solve the computation offloading subproblem.Simulations show that the performances of the proposed approach are superior to other popular approaches. 展开更多
关键词 mobile edge computing physical-layer security Lyapunov optimization ergodic secrecy queue
在线阅读 下载PDF
Throughput Gain of Random Wireless Networks with Physical-Layer Network Coding 被引量:3
12
作者 Xican Yang Jian Li +1 位作者 Changliang Xie Li Li 《Tsinghua Science and Technology》 EI CAS 2012年第2期161-171,共11页
This study analyzes the impact of Physical-layer Network Coding (PNC) on the throughput of a large random wireless network, including one-dimensional and two-dimensional networks. Three different transmission scheme... This study analyzes the impact of Physical-layer Network Coding (PNC) on the throughput of a large random wireless network, including one-dimensional and two-dimensional networks. Three different transmission schemes, (1) a traditional flow-based scheme, (2) a network coding scheme, and (3) the PNC scheme are compared to show that the PNC scheme improves wireless network throughput by a constant factor without changing the scaling law compared to the traditional flow-based and network coding schemes. Furthermore, PNC can reduce the effect of interference for the one-dimensional networks, and has a tighter throughput bound for the two-dimensional network. 展开更多
关键词 physical-layer network coding THROUGHPUT DELAY
原文传递
Zero-forcing dirty paper coding aided physical-layer network coding for MIMO two-way relaying channels with multiple users 被引量:2
13
作者 GONG Peng XU Jie QIU Ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期53-58,共6页
This article considers the two-way multiple-input multiple-output(MIMO) relaying channels with multiple users,in which multiple users are served simultaneously by the base station(BS) with the assistance of the re... This article considers the two-way multiple-input multiple-output(MIMO) relaying channels with multiple users,in which multiple users are served simultaneously by the base station(BS) with the assistance of the relay.The transmission consists of only two phases,doubling the system throughout over traditional one-way half-duplex transmission.A zero-forcing dirty paper coding(ZFDPC) aided physical-layer network coding(PNC) scheme is proposed in this article and the achievable capacity of the ZFDPC aided PNC scheme is derived.Simulation results show that the proposed scheme outperforms the previous decode-and-forward(DF) and zero-forcing beamforming(ZFBF) aided PNC scheme due to more degrees of freedoms and the advantage of PNC.Moreover,we analyze the effect of the imperfect channel state information(CSI) from RS to users at BS side to show the robustness of the proposed ZFDPC aided PNC scheme. 展开更多
关键词 zero-forcing dirty paper coding MIMO physical-layer network coding two-way relaying multiuser diversity
原文传递
Optimal power allocation for two-way relaying over OFDM using physical-layer network coding 被引量:1
14
作者 LI Fu-nian ZHU Guang-xi WANG De-sheng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第1期9-15,35,共8页
In this paper, a network scenario of two-way relaying over orthogonal frequency division multiplexing (OFDM) is considered, in which two nodes intend to exchange the information via a relay using physical-layer netw... In this paper, a network scenario of two-way relaying over orthogonal frequency division multiplexing (OFDM) is considered, in which two nodes intend to exchange the information via a relay using physical-layer network coding (PLNC). Assuming that the full channel knowledge is available, an optimization problem, which maximizes the achievable sum rate under a sum-power constraint, is investigated. It is shown that the optimization problem is non-convex, which is difficult to find the global optimum solution in terms of the computational complexity. In consequence, a low-complexity optimal power allocation scheme is proposed for practice implementation. A link capacity diagram is first employed for power allocation on each subcarrier. Subsequently, an equivalent relaxed optimization problem and Karush-Kuhn-Tucker (KKT) conditions are developed for power allocation among each subcarrier. Simulation results demonstrate that the substantial capacity gains are achieved by implementing the proposed schemes efficiently with a low-complexity computational effort. 展开更多
关键词 two-way relaying power allocation physical-layer network coding OFDM
原文传递
Downlink network-coded multiple access with diverse power
15
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 Network-coded multiple access physical-layer network coding Multi-user decoder Power allocation Throughput Downlink network
在线阅读 下载PDF
V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance
16
作者 Zerong Tang Tiecheng Song Jing Hu 《Computers, Materials & Continua》 SCIE EI 2024年第10期1835-1854,共20页
The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming... The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure(V2I)and Vehicle-toVehicle(V2V)communication with Reconfigurable Intelligent Surface(RIS)assistance,taking into account hardware impairments.A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS.Based on this model,we propose to maximize the V2I physical-layer security transmission rate.To solve the coupled non-convex optimization problem,an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix.Finally,simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate.The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm.Furthermore,increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate. 展开更多
关键词 Internet of vehicle reconfigurable intelligent surface physical-layer security transmission antenna hardware impairments
在线阅读 下载PDF
Overview of RIS-enabled secure transmission in 6G wireless networks
17
作者 JungSook Bae Waqas Khalid +3 位作者 Anseok Lee Heesoo Lee Song Noh Heejung Yu 《Digital Communications and Networks》 CSCD 2024年第6期1553-1565,共13页
As the 6th-Generation(6G)wireless communication networks evolve,privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information.In this context,a Reconfigurable Intellig... As the 6th-Generation(6G)wireless communication networks evolve,privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information.In this context,a Reconfigurable Intelligent Surface(RIS)emerges as a promising technology capable of enhancing transmission efficiency and strengthening information security.This study demonstrates how RISs can play a crucial role in making 6G networks more secure against eavesdropping attacks.We discuss the fundamentals and standardization aspects of RISs,along with an in-depth analysis of Physical-Layer Security(PLS).Our discussion centers on PLS design using RIS,highlighting aspects including beamforming,resource allocation,artificial noise,and cooperative communications.We also identify the research issues,propose potential solutions,and explore future perspectives.Finally,numerical results are provided to support our discussions and demonstrate the enhanced security enabled by RIS. 展开更多
关键词 6G physical-layer security Reconfigurable intelligent surface
在线阅读 下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
18
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
在线阅读 下载PDF
Robust Artificial Noise-Aided Beamforming for A Secure MISO-NOMA Visible Light Communication System 被引量:4
19
作者 Xiaodong Liu Zezong Chen +2 位作者 Yuhao Wang Fuhui Zhou Shuai Ma 《China Communications》 SCIE CSCD 2020年第11期42-53,共12页
Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of pote... Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks.In this paper,secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA.The artificial noise jamming and beamforming technologies are applied to improve secure performance.A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper,and the practical imperfect channel state information of both the desired users and the eavesdropper.The formulated non-convex optimization problem is tackled based onS-Procedure and semi-definite programming relaxation.Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving.Moreover,the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers. 展开更多
关键词 artificial noise non-orthogonal multiple access physical-layer secrecy robust resource allocation visible light communication
在线阅读 下载PDF
Three-Dimensional Trajectory Optimization for Secure UAV-Enabled Cognitive Communications 被引量:3
20
作者 Yuhan Jiang Jia Zhu 《China Communications》 SCIE CSCD 2021年第12期285-296,共12页
Unmanned aerial vehicles(UAVs)are en-visioned as a promising means of providing wireless services for various complex terrains and emergency situations.In this paper,we consider a wireless UAV-enabled cognitive commun... Unmanned aerial vehicles(UAVs)are en-visioned as a promising means of providing wireless services for various complex terrains and emergency situations.In this paper,we consider a wireless UAV-enabled cognitive communication network,where a rotary-wing UAV transmits confidential information to a ground cognitive user over the spectrum assigned to primary users(PUs),while eavesdroppers attempt to wiretap the legitimate transmission.In order to en-hance the secrecy performance of wireless communi-cations,the secrecy rate(SR)of the UAV-enabled cog-nitive communication system is maximized through optimizing UAV three-dimensional(3D)flying trajec-tory while satisfying the requirements of UAV’s initial and final locations and guaranteeing the constraint of maximum speed of UAV and the interference thresh-old of each PU.However,the formulated SR maxi-mization(SRM)problem is non-convex.For the pur-pose of dealing with this intractable problem,we em-ploy the difference of two-convex functions approxi-mation approach to convert the non-convex optimiza-tion problem into a convex one,which is then solved through applying standard convex optimization tech-niques.Moreover,an iterative 3D trajectory opti-mization algorithm for SRM scheme is proposed to achieve the near-optimal 3D trajectory.Simulation re-sults show that our proposed 3D trajectory optimiza-tion based SRM algorithm has good convergence,and the proposed SRM scheme outperforms the bench-mark approach in terms of the SR performance. 展开更多
关键词 UAV-enabled cognitive communications physical-layer security trajectory optimization
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部