期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Secrecy Capacity Maximization for a UAV-Assisted MEC System 被引量:12
1
作者 Dongsheng Han Tianhao Shi 《China Communications》 SCIE CSCD 2020年第10期64-81,共18页
Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computi... Unmanned aerial vehicle(UAV)communication has attracted wide attentions in the mobile edge computing(MEC)system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system. 展开更多
关键词 physical layer secrecy secrecy capacity trajectory optimization MEC UAV communication
在线阅读 下载PDF
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:19
2
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
在线阅读 下载PDF
Achievable secrecy rate of bit-interleaved coded modulation schemes
3
作者 Weichen XIANG Stéphane Le Goff Zhiguo DING 《Journal of Modern Transportation》 2012年第4期243-248,共6页
We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayle... We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings. 展开更多
关键词 secrecy capacity MAPPING ergodic fading channel bit-interleaved coded modulation
在线阅读 下载PDF
Interference Coordination for Secrecy Enhancement in Random Wireless Networks
4
作者 BAI Juan TAO Xiaofeng XU Jin 《China Communications》 SCIE CSCD 2014年第8期28-36,共9页
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m... The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs. 展开更多
关键词 interference coordination poissonpoint process secrecy transmission capacity random wireless networks
在线阅读 下载PDF
Distributed Secure Relay Selection Approach over Wireless Cooperative Networks 被引量:1
5
作者 王莉 马跃 +2 位作者 柯腾辉 魏翼飞 宋梅 《China Communications》 SCIE CSCD 2011年第6期76-85,共10页
Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless r... Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones. 展开更多
关键词 cloud computing distributed relay selection secrecy capacity
在线阅读 下载PDF
Hybrid Protocol for Wireless-Powered Untrusted Relay Networks with Imperfect Channel Reciprocity
6
作者 Rui Ma Haowei Wu +2 位作者 Liubin Wang Jinglan Ou Lian Yan 《China Communications》 SCIE CSCD 2021年第9期116-129,共14页
This work investigates the security issue of the energy-constrained untrusted relay network with imperfect channel reciprocity,where the relay without the built-in power supply can only scavenge energy from radio-freq... This work investigates the security issue of the energy-constrained untrusted relay network with imperfect channel reciprocity,where the relay without the built-in power supply can only scavenge energy from radio-frequency signals radiated by the source and destination.A hybrid power-splitting(PS)-and time-switching(TS)-based relaying(HPTR)protocol is presented to improve the degraded secrecy performance due to the incomplete self-interference cancellation at the destination.To evaluate the secrecy throughput(ST)of the studied system,the analytical expression of the secrecy outage probability under the delay-limited transmission mode and the closed-form lower bound of the ergodic secrecy capacity under delay-tolerant transmission mode are derived.Both linear and nonlinear models for the energy harvester at the relay are compared.The optimal PS and TS ratios are evaluated numerically.The theoretical derivations are validated by numerical results,revealing that the residual jamming has a negative effect on the secrecy performance of untrusted relay networks,which can be alleviated by the HPTR protocol.Besides,we compare the ST performance of the HPTR protocol with that of the PS and TS relaying schemes,and the results show that the HPTR protocol outperforms both PS and TS relaying protocols in terms of the ST. 展开更多
关键词 untrusted relay physical layer security secrecy outage probability ergodic secrecy capacity energy harvesting
在线阅读 下载PDF
Energy-Efficient Jammer Selection Approach for QoS Provisioning in Distributed Wireless Cooperative Networks
7
作者 Ma Yue Wang Li +3 位作者 Ke Tenghui Zhang Yong Song Mei Wang Xiaojun 《China Communications》 SCIE CSCD 2012年第7期90-98,共9页
Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secre... Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secrecy Capacity (SC) to charac terize the security of transmission. In order to ac curately describe the timevarying characteristic, related channels are modeled as FiniteState M ark ov Channels (FSMCs). The remaining energy of candidate node is considered in a similar way. 展开更多
关键词 wireless cooperative network jammer selection secrecy capacity energy balance
在线阅读 下载PDF
Secure Resource Allocation in Device-to-Device Communications Underlaying Cellular Networks
8
作者 Hossein Ghavami Bahareh Akhbari 《China Communications》 SCIE CSCD 2022年第8期149-167,共19页
With increasing the demand for transmitting secure information in wireless networks,deviceto-device(D2D)communication has great potential to improve system performance.As a well-known security risk is eavesdropping in... With increasing the demand for transmitting secure information in wireless networks,deviceto-device(D2D)communication has great potential to improve system performance.As a well-known security risk is eavesdropping in D2D communication,ensuring information security is quite challenging.In this paper,we first obtain the closed-forms of the secrecy outage probability(SOP)and the secrecy ergodic capacity(SEC)for direct and decodeand-forward(DF)relay modes.Numerical results are presented to verify the theoretical results,and these results show the cases that the DF relay mode improves security performance compared to the direct mode at long distances between the transmitter and receiver nodes.Further,we look into the optimization problems of secure resource allocation in D2D communication to maximize the SEC and to minimize the SOP by considering the strictly positive secrecy capacity constraint as a mixed-integer non-linear programming(MINLP)problem.In the continue,we convert the MINLP to convex optimization.Finally,we solve this program with a dual method and obtain an optimal solution in the direct and DF relay modes. 展开更多
关键词 D2D communication secrecy ergodic capacity secrecy outage probability secrecy resource allocation Convex optimization
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部