Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems...Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.展开更多
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu...The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.展开更多
A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevat...A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevation and azimuth of the vortex beam are modulated into the constellation.which can form the digital waveform with the encoding modulation.Since the signal is direction-dependent,the modulated waveform is purposely distorted in other directions to offer a security technology.Two concentric uniform circular arrays(UCAs)with different radii are excited to generate dual vortex beams with orthogonality for the composite signal,which can increase the demodulation difficulty.Due to the phase propagation characteristics of vortex beam,the constellation at the desired azimuth angle will change continuously within a wavelength.A desired single antenna receiver can use the propagation phase compensation and an opposite helical phase factor for the signal demodulation in the desired direction.Simulations show that the proposed OAM-DM scheme offers a security approach with direction sensitivity transmission.展开更多
Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional securi...Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability.展开更多
基金supported by the National Natural Science Foundation of China(61571149,62001139)the Initiation Fund for Postdoctoral Research in Heilongjiang Province(LBH-Q19098)the Natural Science Foundation of Heilongjiang Province(LH2020F0178).
文摘Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.
文摘近日,武汉大学国家网络安全学院2023级硕士研究生闫楠作为第一作者撰写的论文被第34届USENIX安全研讨会(The34th USENIX Security Symposium 2025)录用。论文题目为“Embed X:Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models”(《Embed X:基于嵌入的跨触发器大语言模型后门攻击》),指导老师为国家网络安全学院副研究员李雨晴(通信作者)、教授陈晶(通信作者)、副教授何琨。华中科技大学副教授王雄、香港科技大学教授李波参与合作。
文摘The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.
基金supported by the National Natural Science Foundation of China(62031017,61971221)the Aeronautical Science Foundation of China(201901052001)。
文摘A two-dimensional directional modulation(DM)technology with dual-mode orbital angular momentum(OAM)beam is proposed for physical-layer security of the relay unmanned aerial vehicle(UAV)tracking transmission.The elevation and azimuth of the vortex beam are modulated into the constellation.which can form the digital waveform with the encoding modulation.Since the signal is direction-dependent,the modulated waveform is purposely distorted in other directions to offer a security technology.Two concentric uniform circular arrays(UCAs)with different radii are excited to generate dual vortex beams with orthogonality for the composite signal,which can increase the demodulation difficulty.Due to the phase propagation characteristics of vortex beam,the constellation at the desired azimuth angle will change continuously within a wavelength.A desired single antenna receiver can use the propagation phase compensation and an opposite helical phase factor for the signal demodulation in the desired direction.Simulations show that the proposed OAM-DM scheme offers a security approach with direction sensitivity transmission.
文摘Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability.