Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance ...Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP.展开更多
Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improv...Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improve network performance and user experience.To improve spectrum utilization,this paper studies a UAV-assisted wireless communication network based on Cognitive Radio(CR)and Non-Orthogonal Multiple Access(NOMA)technologies.Considering the presence of potential malicious eavesdroppers in complex practical communication scenarios,multiple transmitting nodes cooperate through UAVs.To enhance physical layer security performance,an efficient low-complexity transmitter-relay selection scheme is proposed,which selects the optimal transmitting node based on link channel quality,referred to as the Suboptimal Node Transmission Strategy(SNTS).To further enhance system security performance,another scheme is proposed,which selects the optimal transmitting node by maximizing the transmission capacity of the far user,known as the Optimal Node Transmission Strategy(ONTS).Under the decode-and-forward relay strategy,the security performance of the network under both schemes is studied.Under the joint constraints imposed by the primary interference power and secondary maximum transmission power,the secrecy outage probability for users is derived and validated through simulations.The results indicate that under identical conditions,as the number of transmitting nodes increases,the probability of establishing a line-of-sight link in ground-air communications rises,leading to a decrease in the system’s secrecy outage probability.Furthermore,in terms of multi-user diversity gain,ONTS significantly outperforms SNTS.However,the computational overhead of ONTS is relatively high.Therefore,when meeting the actual communication needs of users,a trade-off between complexity and performance must be considered.展开更多
Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the pr...Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the proposed scheme,SM is used to activate one antenna from the transmit antennas,and the information symbols will be transmitted with the designed AN at each timeslot.By utilizing the legitimate channel’s imperfect CSI,AN is generated across two adjacent timeslots.Because the CSI is known at the legitimate receiver,then it can perfectly cancel the AN.However,the eavesdropper knows nothing of the legitimate channel’s CSI,so it can not recover any useful information from the AN.At the receiver,a new detection scheme that detects across two adjacent timeslots is also proposed.With imperfect CSI,the secrecy rate of the proposed scheme is derived over Rayleigh fading channels in order to investigate the performance.Moreover,based on the secrecy performance analysis,the lower bound of the ergodic secrecy rate(ESR),the corresponding closed form of the lower bound,and the approximated expression are also derived.The simulation results verified in this paper prove that the proposed scheme with imperfect CSI can achieve satisfactory performance.展开更多
This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable int...This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable intelligent surfaces(DARISs)as-sisted physical layer security(PLS)scheme denoted by DARISs-PLS to protect the secrecy message trans-mission.We formulate a secrecy rate maximization problem for the proposed DARISs-PLS scheme by considering a power budget constraint for the two ac-tive reconfigurable intelligent surfaces(ARISs)and AP.To address the formulated optimization problem,we jointly optimize the reflecting coefficients for the two ARISs and the beamforming at the AP in an it-erative manner by applying Dinkelbach based alter-nating optimization(AO)algorithm and a customized iterative algorithm together with the semidefinite re-laxation(SDR).Numerical results reveal that the pro-posed DARISs-PLS scheme outperforms the dou-ble passive reconfigurable intelligent surfaces-assisted PLS method(DPRISs-PLS)and single ARIS-assisted PLS method(SARIS-PLS)in terms of the secrecy rate.展开更多
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai...This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.展开更多
In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open...In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.展开更多
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e...Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.展开更多
Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Se...Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations.展开更多
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a...Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.展开更多
In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor...In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor F distribution.Specifically,we consider a RIS with N reflecting elements between the transmitter and the legitimate receiver to develop a smart environment and also meliorate secure communications.In this regard,we derive the closed-form expressions for the secrecy outage probability(SOP)and average secrecy capacity(ASC).We also analyze the asymptotic behaviour of the SOP and ASC by exploiting the residue approach.Monte-Carlo(MC)simulation results are provided throughout to validate the correctness of the developed analytical results,showing that considering RIS in wireless communication systems has constructive effects on the secrecy performance.展开更多
The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the p...The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the primary user(PU)activity,it can re-sult in interference that limits the system performance.Additionally,since the wireless medium is broadcast in nature,there is a risk of eavesdroppers intercepting the cognitive users’data.Therefore,it is crucial to consider secrecy in the system analysis.In this paper,we analyze the secrecy outage probability(SOP)at the secondary receiver and derive the secret diversity gain for an interweave cognitive multiple-input multiple-output(MIMO)fading channel in the presence of an eavesdropper.Our study takes into account the ef-fects of the fading channel,the PU interference,and the eavesdropper on both spectrum sensing and data transmission phases.We demonstrate that utilizing all the antennas for sensing eliminates the limiting effects of missed detection probability and PU interference on the secret diversity gain.As a result,the cognitive user can achieve the same level of secret diversity gain as a conventional non-cognitive system(CNCS).Our an-alytical results are further validated through simula-tions.展开更多
In this paper,a novel directional modulation(DM)network utilizing the distributed active intelligent reflecting surface(IRS)to enhance the secrecy sum-rate(SSR)performance is established,with each unmanned aerial vehi...In this paper,a novel directional modulation(DM)network utilizing the distributed active intelligent reflecting surface(IRS)to enhance the secrecy sum-rate(SSR)performance is established,with each unmanned aerial vehicle(UAV)hanging an IRS.The degree of freedom(DoF)is only two in the single-IRS-aided DM network,which will seriously limit its rate performance.Multiple active IRSs will create more DoFs for DM network and dramatically enhance its rate.Three IRS-user matching methods,path loss coefficient(PLC)matching,distance matching,and signal-to-interference-plus-noise ratio(SINR)matching,are proposed to enhance the SSR performance,where all IRSs are equipartitioned into two parts,one part is matched to Bob and the other part to Eve.The double layer leakage(DLL)and minimum-mean square error(MMSE)rules,called DLL-MMSE,are adopted to construct beamforming at transmitter,IRS and receiver,respectively.The double layer null-space projection(DLNSP),Rayleigh ratio(RR)and MMSE schemes,called DLNSP-RR-MMSE,are used to acquire the transmit beamforming vector,phase shift matrix(PSM)and receive beamforming vector,respectively.Simulation results show that the proposed SINR matching scheme outperforms the remaining two ones in terms of SSR.It is also verified that a significant SSR enhancement over single IRS is achieved by using multiple distributed IRSs.展开更多
This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying tec...This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying techniques are utilized to enhance secrecy performance. By jointly optimizing the link selection strategy, the UAV position, and the reflection coefficient of the IRS, we aim to maximize the long-term average secrecy rate. Specifically, we propose a novel buffer in/out stabilization scheme based on the Lyapunov framework, which transforms the long-term average secrecy rate maximization problem into two per-slot drift-plus-penalty minimization problems with different link selection factors. The hybrid Particle Swarm Optimization-Artificial Fish Swarm Algorithm (PSO-AFSA) is adopted to optimize the UAV position, and the IRS reflection coefficient optimization problem is solved by iterative optimization in which auxiliary variables and standard convex optimization algorithms are introduced. Finally, the delay constraint is set to ensure the timeliness of information packets. Simulation results demonstrate that our proposed scheme outperforms the comparison schemes in terms of average secrecy rate. Specifically, the addition of BA improves the average secrecy rate by 1.37 bps/Hz, and the continued optimizations of IRS reflection coefficients and UAV positions improve the average secrecy rate by 2.46 bps/Hz and 3.75 bps/Hz, respectively.展开更多
The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacki...The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacking sufficient exploration of scenarios where communication nodes are in motion.This paper presents a multi-destination vehicle communication system based on decode-and-forward(DF)UAV relays,where source and destination vehicles are moving and an internal eavesdropper intercepts messages from UAV.The closed-form expressions for system outage probability and secrecy outage probability are derived to analyze the reliability and security of the system.Furthermore,the impact of the UAV's position,signal transmission power,and system time allocation ratio on the system's performance are also analyzed.The numerical simulation results validate the accuracy of the derived formulas and confirm the correctness of the analysis.The appropriate time allocation ratio significantly enhances the security performance of system under various environmental conditions.展开更多
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.展开更多
Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computi...Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system.展开更多
In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state in...In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm.展开更多
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir...According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.展开更多
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti...In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants NO.61971161 and 62171151in part by the Foundation of Heilongjiang Touyan Team under Grant NO.HITTY-20190009+3 种基金and in part by the Fundamental Research Funds for the Central Universities under Grant NO.HIT.OCEF.2021012supported in part by the Natural Science Foundation of China under Grant NO.62171160in part by the Fundamental Research Funds for the Central Universities under Grant NO.HIT.OCEF.2022055in part by the Shenzhen Science and Technology Program under Grants NO.JCYJ20190806143212658 and ZDSYS20210623091808025.
文摘Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP.
基金supported by the National Natural Science Foundation of China(Nos.62461032 and 62001359)the Tianyou Youth Talent Lift Program of Lanzhou Jiaotong University,Chinathe Key Research and Development Project of Lanzhou Jiaotong University,China(No.ZDYF2304).
文摘Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improve network performance and user experience.To improve spectrum utilization,this paper studies a UAV-assisted wireless communication network based on Cognitive Radio(CR)and Non-Orthogonal Multiple Access(NOMA)technologies.Considering the presence of potential malicious eavesdroppers in complex practical communication scenarios,multiple transmitting nodes cooperate through UAVs.To enhance physical layer security performance,an efficient low-complexity transmitter-relay selection scheme is proposed,which selects the optimal transmitting node based on link channel quality,referred to as the Suboptimal Node Transmission Strategy(SNTS).To further enhance system security performance,another scheme is proposed,which selects the optimal transmitting node by maximizing the transmission capacity of the far user,known as the Optimal Node Transmission Strategy(ONTS).Under the decode-and-forward relay strategy,the security performance of the network under both schemes is studied.Under the joint constraints imposed by the primary interference power and secondary maximum transmission power,the secrecy outage probability for users is derived and validated through simulations.The results indicate that under identical conditions,as the number of transmitting nodes increases,the probability of establishing a line-of-sight link in ground-air communications rises,leading to a decrease in the system’s secrecy outage probability.Furthermore,in terms of multi-user diversity gain,ONTS significantly outperforms SNTS.However,the computational overhead of ONTS is relatively high.Therefore,when meeting the actual communication needs of users,a trade-off between complexity and performance must be considered.
基金supported in part by the Natural Science Project of Hubei Province under Grant 2023AFB383in part by the Open Foundation of Hubei Key Laboratory for High-Efficiency Utilization of Solar Energy and Operation Control of Energy Storage System under Grant HBSEES202107.
文摘Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the proposed scheme,SM is used to activate one antenna from the transmit antennas,and the information symbols will be transmitted with the designed AN at each timeslot.By utilizing the legitimate channel’s imperfect CSI,AN is generated across two adjacent timeslots.Because the CSI is known at the legitimate receiver,then it can perfectly cancel the AN.However,the eavesdropper knows nothing of the legitimate channel’s CSI,so it can not recover any useful information from the AN.At the receiver,a new detection scheme that detects across two adjacent timeslots is also proposed.With imperfect CSI,the secrecy rate of the proposed scheme is derived over Rayleigh fading channels in order to investigate the performance.Moreover,based on the secrecy performance analysis,the lower bound of the ergodic secrecy rate(ESR),the corresponding closed form of the lower bound,and the approximated expression are also derived.The simulation results verified in this paper prove that the proposed scheme with imperfect CSI can achieve satisfactory performance.
基金supported in part by the National Natural Science Foundation of China under Grant 62071253,Grant 62371252 and Grant 62271268in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project.
文摘This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable intelligent surfaces(DARISs)as-sisted physical layer security(PLS)scheme denoted by DARISs-PLS to protect the secrecy message trans-mission.We formulate a secrecy rate maximization problem for the proposed DARISs-PLS scheme by considering a power budget constraint for the two ac-tive reconfigurable intelligent surfaces(ARISs)and AP.To address the formulated optimization problem,we jointly optimize the reflecting coefficients for the two ARISs and the beamforming at the AP in an it-erative manner by applying Dinkelbach based alter-nating optimization(AO)algorithm and a customized iterative algorithm together with the semidefinite re-laxation(SDR).Numerical results reveal that the pro-posed DARISs-PLS scheme outperforms the dou-ble passive reconfigurable intelligent surfaces-assisted PLS method(DPRISs-PLS)and single ARIS-assisted PLS method(SARIS-PLS)in terms of the secrecy rate.
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
文摘This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.
文摘In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.
基金the National Natural Science Foundation of China under Grants 62001517 and 61971474the Beijing Nova Program under Grant Z201100006820121.
文摘Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.
基金supported in part by the National Research Foundation of Korea(NRF)funded by the Korea government(MSIT)under Grant NRF-2022R1I1A3073740in part by the Institute for Information and Communications Technology Promotion(IITP)Grant funded by the Korea Government(MSIP,Development of Cube Satellites Based on Core Technologies in Low Earth Orbit Satellite Communications)under Grant RS-2024-00396992in part by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(2022-0-00704,Development of 3D-NET Core Technology for High-Mobility Vehicular Service)。
文摘Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3104503in part by the National Natural Science Foundation of China under Grant 62202054,and Grant 61931001+2 种基金in part by the National Natural Science Foundation of China No.62202054the Young Elite Scientists Sponsorship Program of the China Association for Science and Technology under Grant 2023QNRC001in part by the U.S.National Science Foundation under Grant 2136202.
文摘Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.
基金supported by the European Union’s Horizon 2022 Research and Innovation Programme under Marie Skłodowska-Curie Grant No.10110799.
文摘In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor F distribution.Specifically,we consider a RIS with N reflecting elements between the transmitter and the legitimate receiver to develop a smart environment and also meliorate secure communications.In this regard,we derive the closed-form expressions for the secrecy outage probability(SOP)and average secrecy capacity(ASC).We also analyze the asymptotic behaviour of the SOP and ASC by exploiting the residue approach.Monte-Carlo(MC)simulation results are provided throughout to validate the correctness of the developed analytical results,showing that considering RIS in wireless communication systems has constructive effects on the secrecy performance.
文摘The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the primary user(PU)activity,it can re-sult in interference that limits the system performance.Additionally,since the wireless medium is broadcast in nature,there is a risk of eavesdroppers intercepting the cognitive users’data.Therefore,it is crucial to consider secrecy in the system analysis.In this paper,we analyze the secrecy outage probability(SOP)at the secondary receiver and derive the secret diversity gain for an interweave cognitive multiple-input multiple-output(MIMO)fading channel in the presence of an eavesdropper.Our study takes into account the ef-fects of the fading channel,the PU interference,and the eavesdropper on both spectrum sensing and data transmission phases.We demonstrate that utilizing all the antennas for sensing eliminates the limiting effects of missed detection probability and PU interference on the secret diversity gain.As a result,the cognitive user can achieve the same level of secret diversity gain as a conventional non-cognitive system(CNCS).Our an-alytical results are further validated through simula-tions.
基金supported in part by the National Key Research and Development Program of China(No.2023YFF0612900).
文摘In this paper,a novel directional modulation(DM)network utilizing the distributed active intelligent reflecting surface(IRS)to enhance the secrecy sum-rate(SSR)performance is established,with each unmanned aerial vehicle(UAV)hanging an IRS.The degree of freedom(DoF)is only two in the single-IRS-aided DM network,which will seriously limit its rate performance.Multiple active IRSs will create more DoFs for DM network and dramatically enhance its rate.Three IRS-user matching methods,path loss coefficient(PLC)matching,distance matching,and signal-to-interference-plus-noise ratio(SINR)matching,are proposed to enhance the SSR performance,where all IRSs are equipartitioned into two parts,one part is matched to Bob and the other part to Eve.The double layer leakage(DLL)and minimum-mean square error(MMSE)rules,called DLL-MMSE,are adopted to construct beamforming at transmitter,IRS and receiver,respectively.The double layer null-space projection(DLNSP),Rayleigh ratio(RR)and MMSE schemes,called DLNSP-RR-MMSE,are used to acquire the transmit beamforming vector,phase shift matrix(PSM)and receive beamforming vector,respectively.Simulation results show that the proposed SINR matching scheme outperforms the remaining two ones in terms of SSR.It is also verified that a significant SSR enhancement over single IRS is achieved by using multiple distributed IRSs.
基金co-supported by the National Natural Science Foundation of China(Nos.62271399,61901015,GNA22001 and GAA20024)the Zhejiang Provincial Natural Science Foundation of China(No.LQ24F010003).
文摘This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying techniques are utilized to enhance secrecy performance. By jointly optimizing the link selection strategy, the UAV position, and the reflection coefficient of the IRS, we aim to maximize the long-term average secrecy rate. Specifically, we propose a novel buffer in/out stabilization scheme based on the Lyapunov framework, which transforms the long-term average secrecy rate maximization problem into two per-slot drift-plus-penalty minimization problems with different link selection factors. The hybrid Particle Swarm Optimization-Artificial Fish Swarm Algorithm (PSO-AFSA) is adopted to optimize the UAV position, and the IRS reflection coefficient optimization problem is solved by iterative optimization in which auxiliary variables and standard convex optimization algorithms are introduced. Finally, the delay constraint is set to ensure the timeliness of information packets. Simulation results demonstrate that our proposed scheme outperforms the comparison schemes in terms of average secrecy rate. Specifically, the addition of BA improves the average secrecy rate by 1.37 bps/Hz, and the continued optimizations of IRS reflection coefficients and UAV positions improve the average secrecy rate by 2.46 bps/Hz and 3.75 bps/Hz, respectively.
基金supported by the National Natural Science Foundation of China under Grants 62001359 and 61901201by the Key Science and Technology Research Project of Henan Province under Grants 232102211059the Natural Science Basic Research Program of Shaanxi under Grants 2022JQ-658 and 2022JQ-621。
文摘The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacking sufficient exploration of scenarios where communication nodes are in motion.This paper presents a multi-destination vehicle communication system based on decode-and-forward(DF)UAV relays,where source and destination vehicles are moving and an internal eavesdropper intercepts messages from UAV.The closed-form expressions for system outage probability and secrecy outage probability are derived to analyze the reliability and security of the system.Furthermore,the impact of the UAV's position,signal transmission power,and system time allocation ratio on the system's performance are also analyzed.The numerical simulation results validate the accuracy of the derived formulas and confirm the correctness of the analysis.The appropriate time allocation ratio significantly enhances the security performance of system under various environmental conditions.
基金supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
文摘Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
基金the National Natural Science Foundation of China(No.61771195)The Natural Science Foundation of Hebei Province(No.F2018502047)The Fundamental Research Funds for the Central Universities(No.2020MS098).
文摘Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system.
基金supported in part by the National Natural Science Foundation of China under Grant U1805262,62071247,61801244,61771264in part by the Natural Science Foundation of Jiangsu Province under Grant BK20180754+1 种基金in part by the Guangdong Provincial Special Fund For Modern Agriculture Industry Technology Innovation Teams under Grant 2020KJ122in part by the Initial Scientic Research Foundation of NJUPT under Grant NY218103.
文摘In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.
基金supported by the National Basic Research Program of China under Grant 2013CB329003the National Natural Science Founda-tion General Program of China under Grant 61171110
文摘In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.