Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ...Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.展开更多
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo...Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].展开更多
Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance ...Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP.展开更多
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic...The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations.展开更多
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom...Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.展开更多
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom...Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.展开更多
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p...In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes...The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.展开更多
Enhancing the security of the wireless communication is necessary to guarantee the reliable of the data transmission, due to the broadcast nature of wireless channels. In this paper, we provide a novel technology refe...Enhancing the security of the wireless communication is necessary to guarantee the reliable of the data transmission, due to the broadcast nature of wireless channels. In this paper, we provide a novel technology referred to as doubly multiple parameters weighted fractional Fourier transform(DMWFRFT), which can strengthen the physical layer security of wireless communication. This paper introduces the concept of DM-WFRFT based on multiple parameters WFRFT(MP-WFRFT), and then presents its four properties. Based on these properties, the parameters decryption probability is analyzed in terms of the number of parameters. The number of parameters for DM-WFRFT is more than that of the MP-WFRFT,which indicates that the proposed scheme can further strengthen the the physical layer security. Lastly, some numerical simulations are carried out to illustrate that the efficiency of proposed DM-WFRFT is related to preventing eavesdropping, and the effect of parameters variety on the system performance is associated with the bit error ratio(BER).展开更多
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a...Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.展开更多
The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the p...The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the primary user(PU)activity,it can re-sult in interference that limits the system performance.Additionally,since the wireless medium is broadcast in nature,there is a risk of eavesdroppers intercepting the cognitive users’data.Therefore,it is crucial to consider secrecy in the system analysis.In this paper,we analyze the secrecy outage probability(SOP)at the secondary receiver and derive the secret diversity gain for an interweave cognitive multiple-input multiple-output(MIMO)fading channel in the presence of an eavesdropper.Our study takes into account the ef-fects of the fading channel,the PU interference,and the eavesdropper on both spectrum sensing and data transmission phases.We demonstrate that utilizing all the antennas for sensing eliminates the limiting effects of missed detection probability and PU interference on the secret diversity gain.As a result,the cognitive user can achieve the same level of secret diversity gain as a conventional non-cognitive system(CNCS).Our an-alytical results are further validated through simula-tions.展开更多
In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi...In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system.展开更多
Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the pr...Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the proposed scheme,SM is used to activate one antenna from the transmit antennas,and the information symbols will be transmitted with the designed AN at each timeslot.By utilizing the legitimate channel’s imperfect CSI,AN is generated across two adjacent timeslots.Because the CSI is known at the legitimate receiver,then it can perfectly cancel the AN.However,the eavesdropper knows nothing of the legitimate channel’s CSI,so it can not recover any useful information from the AN.At the receiver,a new detection scheme that detects across two adjacent timeslots is also proposed.With imperfect CSI,the secrecy rate of the proposed scheme is derived over Rayleigh fading channels in order to investigate the performance.Moreover,based on the secrecy performance analysis,the lower bound of the ergodic secrecy rate(ESR),the corresponding closed form of the lower bound,and the approximated expression are also derived.The simulation results verified in this paper prove that the proposed scheme with imperfect CSI can achieve satisfactory performance.展开更多
In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor...In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor F distribution.Specifically,we consider a RIS with N reflecting elements between the transmitter and the legitimate receiver to develop a smart environment and also meliorate secure communications.In this regard,we derive the closed-form expressions for the secrecy outage probability(SOP)and average secrecy capacity(ASC).We also analyze the asymptotic behaviour of the SOP and ASC by exploiting the residue approach.Monte-Carlo(MC)simulation results are provided throughout to validate the correctness of the developed analytical results,showing that considering RIS in wireless communication systems has constructive effects on the secrecy performance.展开更多
This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable int...This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable intelligent surfaces(DARISs)as-sisted physical layer security(PLS)scheme denoted by DARISs-PLS to protect the secrecy message trans-mission.We formulate a secrecy rate maximization problem for the proposed DARISs-PLS scheme by considering a power budget constraint for the two ac-tive reconfigurable intelligent surfaces(ARISs)and AP.To address the formulated optimization problem,we jointly optimize the reflecting coefficients for the two ARISs and the beamforming at the AP in an it-erative manner by applying Dinkelbach based alter-nating optimization(AO)algorithm and a customized iterative algorithm together with the semidefinite re-laxation(SDR).Numerical results reveal that the pro-posed DARISs-PLS scheme outperforms the dou-ble passive reconfigurable intelligent surfaces-assisted PLS method(DPRISs-PLS)and single ARIS-assisted PLS method(SARIS-PLS)in terms of the secrecy rate.展开更多
Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems...Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.展开更多
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.展开更多
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an...Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS.展开更多
The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable a...The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable attention.This paper considers a UAV Swarm enabled relaying communication system,where multiple UAV relays are organized via coordinated multiple points(CoMP)as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper.In order to maximize achievable secrecy rate of downlink,we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding,and both amplify-and-forward(AF)and decode-andforward(DF)protocols are considered on the UAV swarm.Due to the non-convexity of the joint optimization problem,we propose an alternating optimization(AO)algorithm to decompose it into two subproblems utilizing block coordinate descent technique,then each subproblem is solved by successive convex optimization method.Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies.展开更多
基金supported in part by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant 102.04-2021.57in part by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.
基金partly supported by the National Natural Science Foundation of China(62273298,62273295)Hebei Natural Science Foundation(F2023203063,F2022203025)+1 种基金China Scholarship Council(CSC)(202308130180)Provincial Key Laboratory Performance Subsidy Project(22567612H)
文摘Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].
基金supported in part by the National Natural Science Foundation of China under Grants NO.61971161 and 62171151in part by the Foundation of Heilongjiang Touyan Team under Grant NO.HITTY-20190009+3 种基金and in part by the Fundamental Research Funds for the Central Universities under Grant NO.HIT.OCEF.2021012supported in part by the Natural Science Foundation of China under Grant NO.62171160in part by the Fundamental Research Funds for the Central Universities under Grant NO.HIT.OCEF.2022055in part by the Shenzhen Science and Technology Program under Grants NO.JCYJ20190806143212658 and ZDSYS20210623091808025.
文摘Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP.
基金funded by the deanship of scientific research(DSR),King Abdukaziz University,Jeddah,under grant No.(G-1436-611-225)。
文摘The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations.
基金The work described in this paper was supported by the Research Grants Council of the Hong Kong Special Administrative Region,China(No.CUHK 14210717 of the General Research Fund).
文摘Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.
基金supported by the Research Grants Council of the Hong Kong Special Administrative Region,China(No.CUHK 14210717 of the General Research Fund).
文摘Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.
基金supported in part by the National Natural Science Foundation of China under Grant 62271268,Grant 62071253,and Grant 62371252in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project。
文摘In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
基金funded by Taif University,Taif,Saudi Arabia,Project No.(TUDSPP-2024-139).
文摘The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.
文摘Enhancing the security of the wireless communication is necessary to guarantee the reliable of the data transmission, due to the broadcast nature of wireless channels. In this paper, we provide a novel technology referred to as doubly multiple parameters weighted fractional Fourier transform(DMWFRFT), which can strengthen the physical layer security of wireless communication. This paper introduces the concept of DM-WFRFT based on multiple parameters WFRFT(MP-WFRFT), and then presents its four properties. Based on these properties, the parameters decryption probability is analyzed in terms of the number of parameters. The number of parameters for DM-WFRFT is more than that of the MP-WFRFT,which indicates that the proposed scheme can further strengthen the the physical layer security. Lastly, some numerical simulations are carried out to illustrate that the efficiency of proposed DM-WFRFT is related to preventing eavesdropping, and the effect of parameters variety on the system performance is associated with the bit error ratio(BER).
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3104503in part by the National Natural Science Foundation of China under Grant 62202054,and Grant 61931001+2 种基金in part by the National Natural Science Foundation of China No.62202054the Young Elite Scientists Sponsorship Program of the China Association for Science and Technology under Grant 2023QNRC001in part by the U.S.National Science Foundation under Grant 2136202.
文摘Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.
文摘The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the primary user(PU)activity,it can re-sult in interference that limits the system performance.Additionally,since the wireless medium is broadcast in nature,there is a risk of eavesdroppers intercepting the cognitive users’data.Therefore,it is crucial to consider secrecy in the system analysis.In this paper,we analyze the secrecy outage probability(SOP)at the secondary receiver and derive the secret diversity gain for an interweave cognitive multiple-input multiple-output(MIMO)fading channel in the presence of an eavesdropper.Our study takes into account the ef-fects of the fading channel,the PU interference,and the eavesdropper on both spectrum sensing and data transmission phases.We demonstrate that utilizing all the antennas for sensing eliminates the limiting effects of missed detection probability and PU interference on the secret diversity gain.As a result,the cognitive user can achieve the same level of secret diversity gain as a conventional non-cognitive system(CNCS).Our an-alytical results are further validated through simula-tions.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62171188]the Guangdong Provincial Key Laboratory of Human Digital Twin[Grant 2022B1212010004].
文摘In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system.
基金supported in part by the Natural Science Project of Hubei Province under Grant 2023AFB383in part by the Open Foundation of Hubei Key Laboratory for High-Efficiency Utilization of Solar Energy and Operation Control of Energy Storage System under Grant HBSEES202107.
文摘Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the proposed scheme,SM is used to activate one antenna from the transmit antennas,and the information symbols will be transmitted with the designed AN at each timeslot.By utilizing the legitimate channel’s imperfect CSI,AN is generated across two adjacent timeslots.Because the CSI is known at the legitimate receiver,then it can perfectly cancel the AN.However,the eavesdropper knows nothing of the legitimate channel’s CSI,so it can not recover any useful information from the AN.At the receiver,a new detection scheme that detects across two adjacent timeslots is also proposed.With imperfect CSI,the secrecy rate of the proposed scheme is derived over Rayleigh fading channels in order to investigate the performance.Moreover,based on the secrecy performance analysis,the lower bound of the ergodic secrecy rate(ESR),the corresponding closed form of the lower bound,and the approximated expression are also derived.The simulation results verified in this paper prove that the proposed scheme with imperfect CSI can achieve satisfactory performance.
基金supported by the European Union’s Horizon 2022 Research and Innovation Programme under Marie Skłodowska-Curie Grant No.10110799.
文摘In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor F distribution.Specifically,we consider a RIS with N reflecting elements between the transmitter and the legitimate receiver to develop a smart environment and also meliorate secure communications.In this regard,we derive the closed-form expressions for the secrecy outage probability(SOP)and average secrecy capacity(ASC).We also analyze the asymptotic behaviour of the SOP and ASC by exploiting the residue approach.Monte-Carlo(MC)simulation results are provided throughout to validate the correctness of the developed analytical results,showing that considering RIS in wireless communication systems has constructive effects on the secrecy performance.
基金supported in part by the National Natural Science Foundation of China under Grant 62071253,Grant 62371252 and Grant 62271268in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project.
文摘This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable intelligent surfaces(DARISs)as-sisted physical layer security(PLS)scheme denoted by DARISs-PLS to protect the secrecy message trans-mission.We formulate a secrecy rate maximization problem for the proposed DARISs-PLS scheme by considering a power budget constraint for the two ac-tive reconfigurable intelligent surfaces(ARISs)and AP.To address the formulated optimization problem,we jointly optimize the reflecting coefficients for the two ARISs and the beamforming at the AP in an it-erative manner by applying Dinkelbach based alter-nating optimization(AO)algorithm and a customized iterative algorithm together with the semidefinite re-laxation(SDR).Numerical results reveal that the pro-posed DARISs-PLS scheme outperforms the dou-ble passive reconfigurable intelligent surfaces-assisted PLS method(DPRISs-PLS)and single ARIS-assisted PLS method(SARIS-PLS)in terms of the secrecy rate.
基金supported by the National Natural Science Foundation of China(61571149,62001139)the Initiation Fund for Postdoctoral Research in Heilongjiang Province(LBH-Q19098)the Natural Science Foundation of Heilongjiang Province(LH2020F0178).
文摘Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.
基金supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
文摘Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,61941104,61921004,62171240,61771264,62001254,61801248,61971467+2 种基金the Key Research and Development Program of Shandong Province under Grant 2020CXGC010108the Key Research and Development Program of Jiangsu Province of China under Grant BE2021013-1the Science and Technology Program of Nantong under Grants JC2021121,JC2021017。
文摘Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS.
文摘The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable attention.This paper considers a UAV Swarm enabled relaying communication system,where multiple UAV relays are organized via coordinated multiple points(CoMP)as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper.In order to maximize achievable secrecy rate of downlink,we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding,and both amplify-and-forward(AF)and decode-andforward(DF)protocols are considered on the UAV swarm.Due to the non-convexity of the joint optimization problem,we propose an alternating optimization(AO)algorithm to decompose it into two subproblems utilizing block coordinate descent technique,then each subproblem is solved by successive convex optimization method.Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies.