In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o...In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.展开更多
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.展开更多
A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevat...A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevation and azimuth of the vortex beam are modulated into the constellation.which can form the digital waveform with the encoding modulation.Since the signal is direction-dependent,the modulated waveform is purposely distorted in other directions to offer a security technology.Two concentric uniform circular arrays(UCAs)with different radii are excited to generate dual vortex beams with orthogonality for the composite signal,which can increase the demodulation difficulty.Due to the phase propagation characteristics of vortex beam,the constellation at the desired azimuth angle will change continuously within a wavelength.A desired single antenna receiver can use the propagation phase compensation and an opposite helical phase factor for the signal demodulation in the desired direction.Simulations show that the proposed OAM-DM scheme offers a security approach with direction sensitivity transmission.展开更多
针对无人机基站空对地通信链路易受窃听攻击的问题,提出一种基于隐蔽信息映射的广义空间方向调制系统(covert information mapped-generalized spatial and direction modulation,CIM-GSDM),将信息隐藏于激活接收机子集的索引及其选择...针对无人机基站空对地通信链路易受窃听攻击的问题,提出一种基于隐蔽信息映射的广义空间方向调制系统(covert information mapped-generalized spatial and direction modulation,CIM-GSDM),将信息隐藏于激活接收机子集的索引及其选择组合中,引入与合法方信道正交的人工噪声干扰窃听方。为进一步提升系统的传输安全性,研究提出了预编码矩阵和功率分配因子联合优化框架,通过有效管理多波束传输和人工噪声的功率分配,增强系统安全性。首先,推导基于系统安全速率的物理层安全性指标,以此为优化目标,联合优化预编码矩阵和人工噪声功率分配因子。为解决该非凸的联合优化问题,考虑交替优化2个变量,提出基于Nesterov下降的自然梯度下降法,通过快速迭代更新预编码矩阵,解决CIM-GSDM符号候选集规模较大带来的计算复杂度问题。基于合法方信噪比与窃听方干信噪比的乘积最大化准则,推导出功率分配因子的次优闭式解。仿真结果表明,所提优化算法在保证合法方可达到的速率前提下,显著降低窃听方的窃听速率,有效保证CIM-GSDM系统的传输安全性。相比传统波束成形算法及固定功率分配因子的方法,提出算法在安全性能上具有显著优势。展开更多
文摘In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.
基金This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131)the YIBIN Science and Technology Support Plan(No.2021CG003)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.
基金supported by the National Natural Science Foundation of China(62031017,61971221)the Aeronautical Science Foundation of China(201901052001)。
文摘A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevation and azimuth of the vortex beam are modulated into the constellation.which can form the digital waveform with the encoding modulation.Since the signal is direction-dependent,the modulated waveform is purposely distorted in other directions to offer a security technology.Two concentric uniform circular arrays(UCAs)with different radii are excited to generate dual vortex beams with orthogonality for the composite signal,which can increase the demodulation difficulty.Due to the phase propagation characteristics of vortex beam,the constellation at the desired azimuth angle will change continuously within a wavelength.A desired single antenna receiver can use the propagation phase compensation and an opposite helical phase factor for the signal demodulation in the desired direction.Simulations show that the proposed OAM-DM scheme offers a security approach with direction sensitivity transmission.
文摘针对无人机基站空对地通信链路易受窃听攻击的问题,提出一种基于隐蔽信息映射的广义空间方向调制系统(covert information mapped-generalized spatial and direction modulation,CIM-GSDM),将信息隐藏于激活接收机子集的索引及其选择组合中,引入与合法方信道正交的人工噪声干扰窃听方。为进一步提升系统的传输安全性,研究提出了预编码矩阵和功率分配因子联合优化框架,通过有效管理多波束传输和人工噪声的功率分配,增强系统安全性。首先,推导基于系统安全速率的物理层安全性指标,以此为优化目标,联合优化预编码矩阵和人工噪声功率分配因子。为解决该非凸的联合优化问题,考虑交替优化2个变量,提出基于Nesterov下降的自然梯度下降法,通过快速迭代更新预编码矩阵,解决CIM-GSDM符号候选集规模较大带来的计算复杂度问题。基于合法方信噪比与窃听方干信噪比的乘积最大化准则,推导出功率分配因子的次优闭式解。仿真结果表明,所提优化算法在保证合法方可达到的速率前提下,显著降低窃听方的窃听速率,有效保证CIM-GSDM系统的传输安全性。相比传统波束成形算法及固定功率分配因子的方法,提出算法在安全性能上具有显著优势。