期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Physical-Layer Key Generation Based on Multipath Channel Diversity Using Dynamic Metasurface Antennas 被引量:2
1
作者 Zheng Wan Yangming Lou +4 位作者 Xiaoming Xu Jinmei Yang Wenyu Jiang Kaizhi Huang Liang Jin 《China Communications》 SCIE CSCD 2023年第4期153-166,共14页
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-... Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes. 展开更多
关键词 physical layer security multipath channel diversity physical layer key generation dynamic metasurface antennas
在线阅读 下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
2
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC key MAC layer Technologies of Cognitive Radio Network RADIO
在线阅读 下载PDF
Evolution of Key Technologies for WiMAX Physical Layer
3
作者 Liu Qiaoyan Yu Qiuxing (Xi’an R&D Department of CDMA Research Institute, Corporation,Xi’an 710065,China) 《ZTE Communications》 2007年第3期15-19,共5页
Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient a... Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient and reliable communication performance,as well as to support a mobile environment with a higher transmisison rate. As an amendment to IEEE 802.16d (for fixed broadband wireless access systems),IEEE 802.16e (for mobile broadband wireless access systems) introduces the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO) technologies into the PHY,doubling the transmission rate while supporting a certain degree of mobility. In the future,more advanced Air Interface (AI) technology is to be applied in the IEEE 802.16m standard. 展开更多
关键词 WIMAX ACCESS Evolution of key Technologies for WiMAX Physical layer HARQ
在线阅读 下载PDF
RIS Enabled Simultaneous Transmission and Key Generation with PPO:Exploring Security Boundary of RIS Phase Shift
4
作者 FAN Kaiqing YAO Yuze +2 位作者 GAO Ning LI Xiao JIN Shi 《ZTE Communications》 2025年第1期11-17,共7页
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and... Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods. 展开更多
关键词 reconfigurable intelligent surfaces physical layer key generation integrated communications and security one-time pad deep reinforcement learning
在线阅读 下载PDF
Secret Key Generation Based on Two-Way Randomness for TDD-SISO System 被引量:10
5
作者 Shengjun Zhang Liang Jin +1 位作者 Yangming Lou Zhou Zhong 《China Communications》 SCIE CSCD 2018年第7期202-216,共15页
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi... A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test. 展开更多
关键词 secret key generation physical layer security information reconciliation information theory
在线阅读 下载PDF
An Efficient Impersonation Attack Detection Method in Fog Computing 被引量:3
6
作者 Jialin Wan Muhammad Waqas +4 位作者 Shanshan Tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman Muhammad Hanif 《Computers, Materials & Continua》 SCIE EI 2021年第7期267-281,共15页
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t... Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER). 展开更多
关键词 Fog computing double Sarsa attack detection physical layer key security
在线阅读 下载PDF
Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems 被引量:2
7
作者 Imtisal Qadeer Muhammad Khurram Ehsan 《Computers, Materials & Continua》 SCIE EI 2021年第5期2619-2630,共12页
To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G ... To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation(PLKG)tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square(TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validated by observing the relation between signalto-noise ratio(SNR)and the correlation coefficient of the corresponding channel measurements between communicating parties. 展开更多
关键词 Channel measurements physical layer key generation channel reciprocity Internet of things DECONVOLUTION
在线阅读 下载PDF
Reconfigurable intelligent surface-aided secret key generation using an autoencoder and K-means quantization
8
作者 Zhenling LI Panpan XU +2 位作者 Qiangqiang GAO Chunguo LI Weijie TAN 《Frontiers of Information Technology & Electronic Engineering》 2025年第8期1486-1500,共15页
In quasi-static wireless channel scenarios,the generation of physical layer keys faces the challenge of invariant spatial and temporal channel characteristics,resulting in a high key disagreement rate(KDR)and low key ... In quasi-static wireless channel scenarios,the generation of physical layer keys faces the challenge of invariant spatial and temporal channel characteristics,resulting in a high key disagreement rate(KDR)and low key generation rate(KGR).To address these issues,we propose a novel reconfigurable intelligent surface(RIS)-aided secret key generation approach using an autoencoder and K-means quantization algorithm.The proposed method uses channel state information(CSI)for channel estimation and dynamically adjusts the refection coeficients of the RIS to create a rapidly fuctuating channel.This strategy enables the extraction of dynamic channel parameters,thereby enhancing channel randomness.Additionally,by integrating the autoencoder with the K-means clustering quantization algorithm,the method eficiently extracts random bits from complex,ambiguous,and high-dimensional channel parameters,significantly reducing KDR.Simulations demonstrate that,under various signal-to-noise ratios(SNRs),the proposed method performs excellently in terms of KGR and KDR.Furthermore,the randomness of the generated keys is validated through the National Institute of Standards and Technology(NIST)test suite. 展开更多
关键词 Reconfigurable intelligent surface(RIS) Physical layer key generation QUANTIZATION Autoencoder
原文传递
Sequence stratigraphic analysis of superimposed coal measure gas-bearing system in Daning-Jixian block,eastern margin of Ordos Basin,China
9
作者 Shizhuang YANG Song LI +2 位作者 Wenguang TIAN Guanghao ZHONG Junjian WANG 《Frontiers of Earth Science》 SCIE CSCD 2024年第3期611-622,共12页
The identification of superimposed gas-bearing systems in coal measures is the basis for expediting the optimization of coal measure gas co-production.Through the analysis of drill cores and log data of Upper Carbonif... The identification of superimposed gas-bearing systems in coal measures is the basis for expediting the optimization of coal measure gas co-production.Through the analysis of drill cores and log data of Upper Carboniferous Benxi Formation to the member 8 of Middle Permian Lower Shihezi Formation in Daning-Jixian block,eastern margin of Ordos Basin,four distinct superimposed coal measure gas-bearing systems were identified,and their formation mechanism was discussed from the sequence stratigraphic perspective.Type Ⅰ system mainly contains multiple coal seams,shales and sandstone layers.Type Ⅱ system is dominated by multiple coal seams and shales.Type Ⅲ is characterized by multiple sandstone layers,and type Ⅳ system is dominated by limestones and mudstones.In general,the gas-bearing systems deposited in barrier-lagoon are type Ⅱ,those deposited in carbonate tidal flats are type IV,and those deposited in the delta front are types Ⅰ and Ⅲ.The marine mudstone,acting as a key layer near the maximum flooding surface,exhibits very low permeability,which is the main factor contributing to the formation of superimposed gas-bearing systems.The sedimentary environment plays a significant role in controlling the distribution of gas-bearing systems.Notably,the vertical gas-bearing systems in the south-western region,where delta front and lagoon facies overlap,are more complex than those in the north-eastern delta front facies. 展开更多
关键词 coal measure gas superimposed gas-bearing system sequence stratigraphic key layer
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部