期刊文献+
共找到135篇文章
< 1 2 7 >
每页显示 20 50 100
Physical Layer Security for Satellite Optical Communication under Angle-of-Arrival Fluctuations
1
作者 He Jinyu Xu Guanjun +1 位作者 Song Zhaohui Zhang Qinyu 《China Communications》 2026年第2期150-161,共12页
In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow t... In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems. 展开更多
关键词 angle-of-arrival fluctuations M´alaga distribution non-zero boresight pointing errors physical layer security satellite optical communication
在线阅读 下载PDF
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security 被引量:3
2
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 CSCD 2020年第1期356-373,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security
3
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 2018年第1期1030-1047,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
4
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Physical Layer Security Scheme With AoI-Awareness for Industrial IoT Based on Covert Communications
5
作者 Yaping Li Zhi-Xin Liu +1 位作者 Jia-Wei Su Ya-Zhou Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期276-278,共3页
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo... Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1]. 展开更多
关键词 industrial iiot internet things iiot physical layer security covert communications malicious detections attacks cyberphysical system cps aoi awareness wireless communication
在线阅读 下载PDF
Secrecy Performance Analysis Considering Channel Correlation of MIMO Scenario in Physical Layer Security
6
作者 Zhang Jiuning Wu Xuanli +3 位作者 Xu Zhicong Zhang Tingting Xu Tao Meng Xiangyun 《China Communications》 2025年第6期276-290,共15页
Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance ... Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP. 展开更多
关键词 average secrecy capacity channel correlation multiple-input multiple-output physical layer security secrecy outage probability
在线阅读 下载PDF
Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT:A DDPG-Based Approach with Physical Layer Security
7
作者 Syed Zain Ul Abideen Mian Muhammad Kamal +4 位作者 Eaman Alharbi Ashfaq Ahmad Malik Wadee Alhalabi Muhammad Shahid Anwar Liaqat Ali 《Computer Modeling in Engineering & Sciences》 2025年第3期2191-2210,共20页
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic... The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations. 展开更多
关键词 Computational optimization reconfigurable intelligent surfaces(RIS) 6G networks IoT and DDPG physical layer security(PLS) backscatter communication
在线阅读 下载PDF
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
8
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 北大核心 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
Single-channel blind source separation empowered joint transceiver optimization for wireless communications using deep learning
9
作者 Pengcheng Guo Fuqiang Yao +3 位作者 Miao Yu Cheng Li Yanqun Tang Zhaolong Ning 《Digital Communications and Networks》 2026年第1期76-85,共10页
To tackle the physical layer security challenges in wireless communication,this paper introduces a multiuser architecture that leverages single-channel blind source separation,centered around a Multi-source Signal Mix... To tackle the physical layer security challenges in wireless communication,this paper introduces a multiuser architecture that leverages single-channel blind source separation,centered around a Multi-source Signal Mixture Separator(MSMS).This architecture consists of a multi-user encoder,a channel layer,and a separation decoder,allowing it to handle multiple functions simultaneously,including encoding,modulation,signal separation,demodulation,and decoding.The MSMS receiver effectively enables the separation of numerous user signals,making it exceedingly difficult for unauthorized eavesdroppers to extract valuable information from the mixed signals,thus significantly enhancing communication security.The MSMS can address the challenges of few-shot sample training and achieve joint optimization during transmission by employing a deep learning-based network design.The design of a single receiver reduces system costs and improves spectrum efficiency.The MSMS outperforms traditional Space-time Block Coding(STBC)strategies regarding separation performance,particularly in Block Error Rate(BLER)metrics.Modulation constellation diagrams further analyze the effectiveness of multi-source signal mixture separation.Moreover,this study extends the MSMS framework from a two-user scenario to a three-user scenario,further demonstrating the flexibility and scalability of the proposed architecture. 展开更多
关键词 Physical layer security Multi-user wireless communication Single-channel source separation Deep learning Space-time block coding
在线阅读 下载PDF
Robust UAV-Assisted Jamming Secure Performance Improvement for Cognitive UAV Networks:Joint Resource Allocation and Trajectory Design
10
作者 Sun Ruomei Wu Yuhang +2 位作者 Tao Zhenhui Zhou Fuhui Wu Qihui 《China Communications》 2026年第2期137-149,共13页
Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum ... Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum sharing.In order to tackle this issue,a cognitive UAV network with cooperative jamming is studied in this paper.A robust resource allocation and trajectory joint optimization problem is formulated by considering the practical case that the channel state information(CSI)cannot be accurately obtained.An iterative algorithm is proposed to address this challenging non-convex problem.Simulation results demonstrate that the worst case robust resource allocation design can realize the secure communications even under the imperfect CSI.Moreover,compared with other benchmark schemes,the proposed scheme can achieve secure performance improvement. 展开更多
关键词 cognitive radio physical layer security robust design UAV communications
在线阅读 下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:11
11
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
在线阅读 下载PDF
Security Enhancement of UAV Swarm Enabled Relaying Systems with Joint Beamforming and Resource Allocation 被引量:7
12
作者 Runze Dong Buhong Wang Kunrui Cao 《China Communications》 SCIE CSCD 2021年第9期71-87,共17页
The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable a... The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable attention.This paper considers a UAV Swarm enabled relaying communication system,where multiple UAV relays are organized via coordinated multiple points(CoMP)as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper.In order to maximize achievable secrecy rate of downlink,we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding,and both amplify-and-forward(AF)and decode-andforward(DF)protocols are considered on the UAV swarm.Due to the non-convexity of the joint optimization problem,we propose an alternating optimization(AO)algorithm to decompose it into two subproblems utilizing block coordinate descent technique,then each subproblem is solved by successive convex optimization method.Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies. 展开更多
关键词 UAV swarm physical layer security BEAMFORMING bandwidth allocation optimization
在线阅读 下载PDF
MP-WFRFT and Constellation Scrambling Based Physical Layer Security System 被引量:31
13
作者 FANG Xiaojie SHA Xuejun LI Yue 《China Communications》 SCIE CSCD 2016年第2期138-145,共8页
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two... In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers. 展开更多
关键词 weighted fractional Fourier transform(WFRFT) physical layer (PHY) security secrecycapacity
在线阅读 下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
14
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
在线阅读 下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:4
15
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
在线阅读 下载PDF
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4
16
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
在线阅读 下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:6
17
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
在线阅读 下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
18
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
19
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
在线阅读 下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
20
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部