期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
1
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
Secure Rate Maximization for UAV-RIS-Aided IoT Network in Smart Grid
2
作者 Jian Wu Xiaowei Hao Chao Han 《Energy Engineering》 2026年第3期215-231,共17页
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat... Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios. 展开更多
关键词 Smart grid Internet of Things unmanned aerial vehicles reconfigurable intelligent surface EAVESDROPPER secure capacity
在线阅读 下载PDF
Deepening National Security Reforms to Guarantee Consistent Advancement in Chinese Modernization
3
作者 Chen Xiangyang 《Contemporary International Relations》 2024年第6期4-24,共21页
Persistent efforts are needed to fully implement the guiding principles of the third plenary session of the 20th Communist Party of China(CPC)Central Committee and advance the reform of China's national security w... Persistent efforts are needed to fully implement the guiding principles of the third plenary session of the 20th Communist Party of China(CPC)Central Committee and advance the reform of China's national security work on the new journey that lies ahead.All of us in the Party should never forget our original aspiration.Since the advent of the new era,China has pushed forward and made remarkable achievements in reforming its national security work,undergoing a process of constant evolvement and continuous improvement.The third plenary session of the 18th CPC Central Committee could be deemed the starting point of comprehensively deepening reform in the new era,opening a new epoch for reforming and innovating China's national security work.It identified modernizing China's system and capacity for governance as the overall goal of further deepening reform comprehensively and,most significantly,made a historic decision to establish the National Security Commission,having far-reaching impacts.General Secretary Xi Jinping stressed pursuing a holistic approach to national security,which provides us with fundamental guidance for further reform.The new version of the National Security Law of the People's Republic of China fully covers China's national security system and will guide the improvement of its legal system for national security in the new era.The fourth plenary session of the 19th CPC Central Committee called for improving China's national security system in efforts to modernize the country's system and capacity for governance.The 20th CPC National Congress clarified the Party's central task on the new journey and made strategic plans for safeguarding Chinese modernization through modernizing the country's national security system and capacity.The third plenary session of the 20th CPC Central Committee carried forward the spirit of the above meetings,from the third plenary session of the 18th CPC Central Committee to the 20th CPC National Congress,reiterating the importance of further deepening reform comprehensively on the new journey,emphasizing national security as the foundation for advancing Chinese modernization,and setting out the road map and agenda for modernizing China's national security system and capacity in the next five years.Therefore,we must study and implement the guiding principles of the third plenary session of the 2Oth CPC Central Committee. 展开更多
关键词 Chinese modernization deepening reform comprehensively modernizing China's national security system and capacity third plenary session of the 20th CPC Central Committee
在线阅读 下载PDF
A Wire-Line Secure Communication System Based on CCFD Self-Interference Cancellation
4
作者 LU Wenjian LIU Sanjun LAI Guohong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第6期507-512,共6页
This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the phys... This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the physical layer.This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node,and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain,so that the signal-to-noise ratio(SNR)received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver,so as to realize the absolutely secure communication in the sense of Wyner principle.This paper not only puts forward the specific design scheme of absolutely secure communication telephone,but also analyzes the calculation of security capacity under different eavesdropping positions,different SI cancellation capability and different system parameters according to Shannon theory. 展开更多
关键词 co-frequency co-time full-duplex(CCFD) physical layer security self-interference cancellation security capacity wire-line communication
原文传递
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:19
5
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
在线阅读 下载PDF
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states 被引量:2
6
作者 FangZhou Wu GuoJian Yang +4 位作者 HaiBo Wang Jun Xiong Faris Alzahrani Aatef Hobiny FuGuo Deng 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第12期19-25,共7页
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of phot... This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features. 展开更多
关键词 quantum secure direct communication high capacity hyperentanglement two-photon six-qubit systems decoy photons
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部