期刊文献+
共找到111篇文章
< 1 2 6 >
每页显示 20 50 100
Secrecy Performance Analysis Considering Channel Correlation of MIMO Scenario in Physical Layer Security
1
作者 Zhang Jiuning Wu Xuanli +3 位作者 Xu Zhicong Zhang Tingting Xu Tao Meng Xiangyun 《China Communications》 2025年第6期276-290,共15页
Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance ... Physical layer security is an important method to improve the secrecy performance of wireless communication systems.In this paper,we analyze the effect of employing channel correlation to improve security performance in multiple-input multipleoutput(MIMO)scenario with antenna selection(AS)scheme.We first derive the analytical expressions of average secrecy capacity(ASC)and secrecy outage probability(SOP)by the first order Marcum Q function.Then,the asymptotic expressions of ASC and SOP in two specific scenarios are further derived.The correctness of analytical and asymptotic expressions is verified by Monte Carlo simulations.The conclusions suggest that the analytical expressions of ASC and SOP are related to the product of transmitting and receiving antennas;increasing the number of antennas is beneficial to ASC and SOP.Besides,when the target rate is set at a low level,strong channel correlation is bad for ASC,but is beneficial to SOP. 展开更多
关键词 average secrecy capacity channel correlation multiple-input multiple-output physical layer security secrecy outage probability
在线阅读 下载PDF
Secrecy performance analysis of UAV-assisted CR-NOMA wireless communication systems
2
作者 Haiyan HUANG Yuxin AI +2 位作者 Linlin LIANG Fuhui ZHOU Tony Q.S.QUEK 《Chinese Journal of Aeronautics》 2025年第10期260-270,共11页
Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improv... Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improve network performance and user experience.To improve spectrum utilization,this paper studies a UAV-assisted wireless communication network based on Cognitive Radio(CR)and Non-Orthogonal Multiple Access(NOMA)technologies.Considering the presence of potential malicious eavesdroppers in complex practical communication scenarios,multiple transmitting nodes cooperate through UAVs.To enhance physical layer security performance,an efficient low-complexity transmitter-relay selection scheme is proposed,which selects the optimal transmitting node based on link channel quality,referred to as the Suboptimal Node Transmission Strategy(SNTS).To further enhance system security performance,another scheme is proposed,which selects the optimal transmitting node by maximizing the transmission capacity of the far user,known as the Optimal Node Transmission Strategy(ONTS).Under the decode-and-forward relay strategy,the security performance of the network under both schemes is studied.Under the joint constraints imposed by the primary interference power and secondary maximum transmission power,the secrecy outage probability for users is derived and validated through simulations.The results indicate that under identical conditions,as the number of transmitting nodes increases,the probability of establishing a line-of-sight link in ground-air communications rises,leading to a decrease in the system’s secrecy outage probability.Furthermore,in terms of multi-user diversity gain,ONTS significantly outperforms SNTS.However,the computational overhead of ONTS is relatively high.Therefore,when meeting the actual communication needs of users,a trade-off between complexity and performance must be considered. 展开更多
关键词 Cognitive Radio Non-Orthogonal Multiple Access Physical layer security secrecy outage probability Unmanned Aerial Vehicles
原文传递
A Novel Secrecy Enhancing Scheme for Spatial Modulation in the Presence of Imperfect CSI
3
作者 Shang Pingping Chen Junqi +4 位作者 Tao Zhuofan Xie Longhui Wan Xiangkui Guan Liang Qin Jiangyi 《China Communications》 2025年第6期291-299,共9页
Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the pr... Based on the objective reality of channel estimation error,this paper introduces a novel artificial noise(AN)aided spatial modulation(SM)secrecyenhancing scheme under imperfect channel state information(CSI).In the proposed scheme,SM is used to activate one antenna from the transmit antennas,and the information symbols will be transmitted with the designed AN at each timeslot.By utilizing the legitimate channel’s imperfect CSI,AN is generated across two adjacent timeslots.Because the CSI is known at the legitimate receiver,then it can perfectly cancel the AN.However,the eavesdropper knows nothing of the legitimate channel’s CSI,so it can not recover any useful information from the AN.At the receiver,a new detection scheme that detects across two adjacent timeslots is also proposed.With imperfect CSI,the secrecy rate of the proposed scheme is derived over Rayleigh fading channels in order to investigate the performance.Moreover,based on the secrecy performance analysis,the lower bound of the ergodic secrecy rate(ESR),the corresponding closed form of the lower bound,and the approximated expression are also derived.The simulation results verified in this paper prove that the proposed scheme with imperfect CSI can achieve satisfactory performance. 展开更多
关键词 artificial noise ergodic secrecy rate imperfect channel state information physical layer security spatial modulation
在线阅读 下载PDF
Secrecy Rate Maximization for Double Active RISs-Aided Wireless MISO Systems
4
作者 Zhang Afei Zhu Jia +3 位作者 Zou Yulong Li Yizhi Qin Hao Hui Hao 《China Communications》 2025年第9期151-161,共11页
This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable int... This paper considers a multi-antenna ac-cess point(AP)transmitting secrecy message to a single-antenna user in the presence of a single-antenna illegal eavesdropper(Eve)and proposes a double ac-tive reconfigurable intelligent surfaces(DARISs)as-sisted physical layer security(PLS)scheme denoted by DARISs-PLS to protect the secrecy message trans-mission.We formulate a secrecy rate maximization problem for the proposed DARISs-PLS scheme by considering a power budget constraint for the two ac-tive reconfigurable intelligent surfaces(ARISs)and AP.To address the formulated optimization problem,we jointly optimize the reflecting coefficients for the two ARISs and the beamforming at the AP in an it-erative manner by applying Dinkelbach based alter-nating optimization(AO)algorithm and a customized iterative algorithm together with the semidefinite re-laxation(SDR).Numerical results reveal that the pro-posed DARISs-PLS scheme outperforms the dou-ble passive reconfigurable intelligent surfaces-assisted PLS method(DPRISs-PLS)and single ARIS-assisted PLS method(SARIS-PLS)in terms of the secrecy rate. 展开更多
关键词 active reconfigurable intelligent surface(ARIS) double RISs physical layer security(PLS) secrecy rate
在线阅读 下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
5
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPTOGRAPHY
在线阅读 下载PDF
Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network
6
作者 Mohammad Mehdi Sharifi Nevisi Elnaz Bashir +3 位作者 Diego Martín Seyedkian Rezvanjou Farzaneh Shoushtari Ehsan Ghafourian 《Computers, Materials & Continua》 SCIE EI 2024年第3期3971-3991,共21页
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai... This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs. 展开更多
关键词 Wireless-powered communications secrecy outage probability improved biogeography-based optimization recurrent neural network
在线阅读 下载PDF
Improved IChOA-Based Reinforcement Learning for Secrecy Rate Optimization in Smart Grid Communications
7
作者 Mehrdad Shoeibi Mohammad Mehdi Sharifi Nevisi +3 位作者 Sarvenaz Sadat Khatami Diego Martín Sepehr Soltani Sina Aghakhani 《Computers, Materials & Continua》 SCIE EI 2024年第11期2819-2843,共25页
In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open... In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error. 展开更多
关键词 Smart grid communication secrecy rate optimization reinforcement learning improved chimp optimization algorithm
在线阅读 下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
8
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
在线阅读 下载PDF
Physical-layer security in MU-MISO downlink networks against potential eavesdroppers
9
作者 Woong Son Minkyu Oh +1 位作者 Heejung Yu Bang Chul Jung 《Digital Communications and Networks》 2025年第2期424-431,共8页
Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Se... Recently,wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems.Many researchers have tried to improve the Physical-Layer Security(PLS)performance such as Secrecy Outage Probability(SOP)and Secrecy Energy-Efficiency(SEE).The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level,and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power.In this paper,we consider a Multi-User Multi-Input Single-Output(MU-MISO)downlink cellular network where a legitimate Base Station(BS)equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations(MSs),and multiple potential eavesdroppers(EVEs)equipped with a single receive antenna try to eavesdrop on this information.Each potential EVE tries to intercept the secure information,i.e.,the private message,from the legitimate BS to legitimate MSs with a certain eavesdropping probability.To securely receive the private information,each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold,i.e.,the legitimate MSs adopt an Opportunistic Feedback(OF)strategy.In such eavesdropping channels,both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically.Based on the analytical results,it is shown that the SOP of the OF strategy approaches that of a Full Feedback(FF)strategy as the number of legitimate MSs or the number of antennas at the BS increases.Furthermore,the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated.The analytical results and related observations are verified by numerical simulations. 展开更多
关键词 Physical-layer security Opportunistic feedback Potential eavesdroppers secrecy outage probability secrecy energy-efficiency
在线阅读 下载PDF
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks
10
作者 Xin Fan Guangkai Li +5 位作者 Jianqiang Li Yue Wang Chuanwen Luo Yi Hong Ting Chen Yan Huo 《Digital Communications and Networks》 2025年第3期925-936,共12页
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a... Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP. 展开更多
关键词 NOMA UAV COMP Physical layer security Stochastic geometry approaches secrecy outage probability
在线阅读 下载PDF
RIS-Aided Secure Communications over Fisher-Snedecor F Fading Channels
11
作者 Farshad Rostami Ghadi Zhu Weiping Diego Martin 《China Communications》 2025年第7期195-207,共13页
In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor... In this paper,we investigate the performance of physical layer security(PLS)over reconfigurable intelligent surfaces(RIS)-aided wireless communication systems,where all fading channels are modeled with Fisher-Snedecor F distribution.Specifically,we consider a RIS with N reflecting elements between the transmitter and the legitimate receiver to develop a smart environment and also meliorate secure communications.In this regard,we derive the closed-form expressions for the secrecy outage probability(SOP)and average secrecy capacity(ASC).We also analyze the asymptotic behaviour of the SOP and ASC by exploiting the residue approach.Monte-Carlo(MC)simulation results are provided throughout to validate the correctness of the developed analytical results,showing that considering RIS in wireless communication systems has constructive effects on the secrecy performance. 展开更多
关键词 average secrecy capacity Fisher-Snedecor F fading channels physical layer security reconfigurable intelligent surfaces secrecy outage probability
在线阅读 下载PDF
Diversity Gain of an Interweave Cognitive MIMO Wire-Tap Channel
12
作者 Atefeh Roostaei Mostafa Derakhtian 《China Communications》 2025年第9期162-181,共20页
The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the p... The quality of spectrum sensing plays a significant role in determining the outage probability during the data transmission phase in an interweave cognitive radio network.If the secondary user(SU)fails to detect the primary user(PU)activity,it can re-sult in interference that limits the system performance.Additionally,since the wireless medium is broadcast in nature,there is a risk of eavesdroppers intercepting the cognitive users’data.Therefore,it is crucial to consider secrecy in the system analysis.In this paper,we analyze the secrecy outage probability(SOP)at the secondary receiver and derive the secret diversity gain for an interweave cognitive multiple-input multiple-output(MIMO)fading channel in the presence of an eavesdropper.Our study takes into account the ef-fects of the fading channel,the PU interference,and the eavesdropper on both spectrum sensing and data transmission phases.We demonstrate that utilizing all the antennas for sensing eliminates the limiting effects of missed detection probability and PU interference on the secret diversity gain.As a result,the cognitive user can achieve the same level of secret diversity gain as a conventional non-cognitive system(CNCS).Our an-alytical results are further validated through simula-tions. 展开更多
关键词 cognitive radio diversity gain MIMO physical layer security secrecy outage probability spectrum sensing
在线阅读 下载PDF
IRS-user matching and beamforming design for multi-active-IRS-and-UAV-aided secure directional modulation networks
13
作者 Ke YANG Siling FENG +5 位作者 Rongen DONG Xuehui WANG Yan WANG Jiatong BAI Yuanjian LI Jiangzhou WANG 《Chinese Journal of Aeronautics》 2025年第10期158-169,共12页
In this paper,a novel directional modulation(DM)network utilizing the distributed active intelligent reflecting surface(IRS)to enhance the secrecy sum-rate(SSR)performance is established,with each unmanned aerial vehi... In this paper,a novel directional modulation(DM)network utilizing the distributed active intelligent reflecting surface(IRS)to enhance the secrecy sum-rate(SSR)performance is established,with each unmanned aerial vehicle(UAV)hanging an IRS.The degree of freedom(DoF)is only two in the single-IRS-aided DM network,which will seriously limit its rate performance.Multiple active IRSs will create more DoFs for DM network and dramatically enhance its rate.Three IRS-user matching methods,path loss coefficient(PLC)matching,distance matching,and signal-to-interference-plus-noise ratio(SINR)matching,are proposed to enhance the SSR performance,where all IRSs are equipartitioned into two parts,one part is matched to Bob and the other part to Eve.The double layer leakage(DLL)and minimum-mean square error(MMSE)rules,called DLL-MMSE,are adopted to construct beamforming at transmitter,IRS and receiver,respectively.The double layer null-space projection(DLNSP),Rayleigh ratio(RR)and MMSE schemes,called DLNSP-RR-MMSE,are used to acquire the transmit beamforming vector,phase shift matrix(PSM)and receive beamforming vector,respectively.Simulation results show that the proposed SINR matching scheme outperforms the remaining two ones in terms of SSR.It is also verified that a significant SSR enhancement over single IRS is achieved by using multiple distributed IRSs. 展开更多
关键词 Directional modulation Intelligent reflecting surface secrecy sum-rate Degree of freedom Unmanned aerial vehicle
原文传递
Secure transmission of IRS-UAV buffer-aided relaying system with delay constraint
14
作者 Dawei WANG Linfeng YUAN +2 位作者 Hongbo ZHAO Lingtong MIN Yixin HE 《Chinese Journal of Aeronautics》 2025年第3期447-461,共15页
This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying tec... This paper investigates the secure communication between legitimate users in the presence of eavesdroppers, where the Intelligent Reflective Surface-Unmanned Aerial Vehicle (IRS-UAV) and Buffer-Aided (BA) relaying techniques are utilized to enhance secrecy performance. By jointly optimizing the link selection strategy, the UAV position, and the reflection coefficient of the IRS, we aim to maximize the long-term average secrecy rate. Specifically, we propose a novel buffer in/out stabilization scheme based on the Lyapunov framework, which transforms the long-term average secrecy rate maximization problem into two per-slot drift-plus-penalty minimization problems with different link selection factors. The hybrid Particle Swarm Optimization-Artificial Fish Swarm Algorithm (PSO-AFSA) is adopted to optimize the UAV position, and the IRS reflection coefficient optimization problem is solved by iterative optimization in which auxiliary variables and standard convex optimization algorithms are introduced. Finally, the delay constraint is set to ensure the timeliness of information packets. Simulation results demonstrate that our proposed scheme outperforms the comparison schemes in terms of average secrecy rate. Specifically, the addition of BA improves the average secrecy rate by 1.37 bps/Hz, and the continued optimizations of IRS reflection coefficients and UAV positions improve the average secrecy rate by 2.46 bps/Hz and 3.75 bps/Hz, respectively. 展开更多
关键词 Buffer-aided relaying technique Intelligent reflective surface Unmanned aerial vehicle Delay constraint Average secrecy rate
原文传递
Outage Performance Analysis of UAV-Cooperative Vehicular Communication Systems
15
作者 Liang Linlin Tian Zongkai +4 位作者 Huang Haiyan Zhang Nina Zhang Dehua Song Qipeng Li Yue 《China Communications》 2025年第8期245-256,共12页
The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacki... The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacking sufficient exploration of scenarios where communication nodes are in motion.This paper presents a multi-destination vehicle communication system based on decode-and-forward(DF)UAV relays,where source and destination vehicles are moving and an internal eavesdropper intercepts messages from UAV.The closed-form expressions for system outage probability and secrecy outage probability are derived to analyze the reliability and security of the system.Furthermore,the impact of the UAV's position,signal transmission power,and system time allocation ratio on the system's performance are also analyzed.The numerical simulation results validate the accuracy of the derived formulas and confirm the correctness of the analysis.The appropriate time allocation ratio significantly enhances the security performance of system under various environmental conditions. 展开更多
关键词 covert communication outage probability secrecy outage probability transport communication
在线阅读 下载PDF
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
16
作者 Chen Dianxia Ma Xiaoshan +2 位作者 Yang Lin Yu Kan Feng Zhiyong 《China Communications》 2025年第4期100-116,共17页
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th... Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance. 展开更多
关键词 joint relay and jammer selection physical layer security secrecy outage probability
在线阅读 下载PDF
Secrecy Capacity Maximization for a UAV-Assisted MEC System 被引量:15
17
作者 Dongsheng Han Tianhao Shi 《China Communications》 SCIE CSCD 2020年第10期64-81,共18页
Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computi... Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system. 展开更多
关键词 physical layer secrecy secrecy capacity trajectory optimization MEC UAV communication
在线阅读 下载PDF
Secrecy Rate Analysis for Reconfigurable Intelligent Surface-Assisted MIMO Communications with Statistical CSI 被引量:8
18
作者 Jie Liu Jun Zhang +2 位作者 Qi Zhang Jue Wang Xinghua Sun 《China Communications》 SCIE CSCD 2021年第3期52-62,共11页
In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state in... In this paper,a reconfigurable intelligent surface(RIS)-assisted MIMO wireless secure communication system is considered,in which a base station(BS)equipped with multiple antennas exploits statistical channel state information to communicate with a legitimate multi-antenna user,in the presence of an eavesdropper,also equipped with multiple antennas.We firstly obtain an analytical expression of the ergodic secrecy rate based on the results of largedimensional random matrix theory.Then,a jointly alternating optimization algorithm with the method of Taylor series expansion and the projected gradient ascent method is proposed to design the transmit covariance matrix at the BS,as well as the diagonal phaseshifting matrix to maximize the ergodic secrecy rate.Simulations are conducted to demonstrate the accuracy of the derived analytical expressions,as well as the superior performance of our proposed algorithm. 展开更多
关键词 reconfigurable intelligent surface ergodic secrecy rate statistical CSI alternating optimization algorithm
在线阅读 下载PDF
Improvements on robust email protocols with perfect forward secrecy
19
作者 蒋睿 胡爱群 杨晓辉 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期139-142,共4页
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir... According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols. 展开更多
关键词 man-in-the-middle attack EMAIL network security perfect forward secrecy
在线阅读 下载PDF
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:19
20
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部