期刊文献+
共找到133篇文章
< 1 2 7 >
每页显示 20 50 100
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security 被引量:3
1
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 CSCD 2020年第1期356-373,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security
2
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 2018年第1期1030-1047,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation layered security Element-layer obfuscation Component-layer obfuscation Inter-component obfuscation Application-layer obfuscation
原文传递
Physical Layer Security Scheme With AoI-Awareness for Industrial IoT Based on Covert Communications
3
作者 Yaping Li Zhi-Xin Liu +1 位作者 Jia-Wei Su Ya-Zhou Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期276-278,共3页
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo... Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1]. 展开更多
关键词 industrial iiot internet things iiot physical layer security covert communications malicious detections attacks cyberphysical system cps aoi awareness wireless communication
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
4
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Secrecy Performance Analysis Considering Channel Correlation of MIMO Scenario in Physical Layer Security
5
作者 Zhang Jiuning Wu Xuanli +3 位作者 Xu Zhicong Zhang Tingting Xu Tao Meng Xiangyun 《China Communications》 2025年第6期276-290,共15页
Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance ... Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP. 展开更多
关键词 average secrecy capacity channel correlation multiple-input multiple-output physical layer security secrecy outage probability
在线阅读 下载PDF
Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT:A DDPG-Based Approach with Physical Layer Security
6
作者 Syed Zain Ul Abideen Mian Muhammad Kamal +4 位作者 Eaman Alharbi Ashfaq Ahmad Malik Wadee Alhalabi Muhammad Shahid Anwar Liaqat Ali 《Computer Modeling in Engineering & Sciences》 2025年第3期2191-2210,共20页
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic... The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations. 展开更多
关键词 Computational optimization reconfigurable intelligent surfaces(RIS) 6G networks IoT and DDPG physical layer security(PLS) backscatter communication
在线阅读 下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:11
7
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
在线阅读 下载PDF
Security Enhancement of UAV Swarm Enabled Relaying Systems with Joint Beamforming and Resource Allocation 被引量:7
8
作者 Runze Dong Buhong Wang Kunrui Cao 《China Communications》 SCIE CSCD 2021年第9期71-87,共17页
The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable a... The high mobility of unmanned aerial vehicles(UAVs)could bring abundant degrees of freedom for the design of wireless communication systems,which results in that UAVs,especially UAV swarm,have attracted considerable attention.This paper considers a UAV Swarm enabled relaying communication system,where multiple UAV relays are organized via coordinated multiple points(CoMP)as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper.In order to maximize achievable secrecy rate of downlink,we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding,and both amplify-and-forward(AF)and decode-andforward(DF)protocols are considered on the UAV swarm.Due to the non-convexity of the joint optimization problem,we propose an alternating optimization(AO)algorithm to decompose it into two subproblems utilizing block coordinate descent technique,then each subproblem is solved by successive convex optimization method.Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies. 展开更多
关键词 UAV swarm physical layer security BEAMFORMING bandwidth allocation optimization
在线阅读 下载PDF
MP-WFRFT and Constellation Scrambling Based Physical Layer Security System 被引量:31
9
作者 FANG Xiaojie SHA Xuejun LI Yue 《China Communications》 SCIE CSCD 2016年第2期138-145,共8页
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two... In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers. 展开更多
关键词 weighted fractional Fourier transform(WFRFT) physical layer (PHY) security secrecycapacity
在线阅读 下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
10
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
在线阅读 下载PDF
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4
11
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
在线阅读 下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
12
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
在线阅读 下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:6
13
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
在线阅读 下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
14
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
15
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
在线阅读 下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
16
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
在线阅读 下载PDF
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks 被引量:1
17
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
在线阅读 下载PDF
Physical Layer Security in MIMO Wiretap Channels with Antenna Correlation 被引量:4
18
作者 Gangcan Sun Zhuo Han +2 位作者 Jingbo Jiao Zhongyong Wang Dagang Wang 《China Communications》 SCIE CSCD 2017年第8期149-156,共8页
To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Div... To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Diversity order and array gain were also achieved for further insight. The study was based on the information theory that physical layer security can be guaranteed when the quality of the main channel is higher than that of the eavesdropper's channel. Monte Carlo simulations well validated the numerical results of analytic expressions. It was shown that antenna correlation is detrimental to secrecy performance when average SNR of the main channel is at medium and high level. Interestingly, when average SNR of the main channel reduces to low level, the effect of antenna correlation becomes benefi cial to secrecy performance. 展开更多
关键词 physical layer security antenna correlation wiretap channels outage probability Nakagami-m fading
在线阅读 下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI 被引量:1
19
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 Physical layer security Full-duplex SELF-INTERFERENCE Eavesdropping CSI MULTI-ANTENNA
在线阅读 下载PDF
Performance Analysis of Physical Layer Security over α-η-κ-μ Fading Channels 被引量:1
20
作者 Shaobo Jia Jiayan Zhang +1 位作者 Honglin Zhao Yao Xu 《China Communications》 SCIE CSCD 2018年第11期138-148,共11页
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,... In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model. 展开更多
关键词 Physical layer security α-η-κ-μgeneralized fading channels average secrecycapacity secrecy outage probability
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部