CN111262644A - Transmission method for improving safety performance of edge computing system - Google Patents
Transmission method for improving safety performance of edge computing system Download PDFInfo
- Publication number
- CN111262644A CN111262644A CN202010047267.1A CN202010047267A CN111262644A CN 111262644 A CN111262644 A CN 111262644A CN 202010047267 A CN202010047267 A CN 202010047267A CN 111262644 A CN111262644 A CN 111262644A
- Authority
- CN
- China
- Prior art keywords
- edge computing
- signal
- terminal
- secret
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 35
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 18
- 230000005855 radiation Effects 0.000 claims abstract description 10
- 238000005562 fading Methods 0.000 claims description 9
- 238000005457 optimization Methods 0.000 claims description 5
- 239000002245 particle Substances 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims description 2
- 239000011159 matrix material Substances 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000010845 search algorithm Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
- H04B17/3911—Fading models or fading generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/60—Jamming involving special techniques
- H04K3/62—Jamming involving special techniques by exposing communication, processing or storing systems to electromagnetic wave radiation, e.g. causing disturbance, disruption or damage of electronic circuits, or causing external injection of faults in the information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a transmission method for improving the security performance of an edge computing system, which comprises the following steps: the edge computing equipment isolates a potential illegal terminal out of a circular area in a physical patrol mode; according to the power of the transmitted signal and the space propagation environment, the edge computing equipment determines the radiation range of the signal; the edge computing equipment collects communication network information, determines power distribution of a secret signal and an artificial noise signal through a transmission mode of combining artificial noise and safe beam forming, and transmits the secret signal to a legal terminal. The invention physically provides natural security guarantee for a legal terminal by utilizing a method of a security protection area, prevents a malicious terminal of any adjacent edge computing equipment from stealing a confidential signal, saves power for an energy-limited edge computing system and improves the security performance of the system.
Description
Technical Field
The invention relates to the field of information theory security, in particular to a transmission method for improving the security performance of an edge computing system.
Background
In the future, a communication system is responsible for various large data transmission and forwarding tasks, and the explosive growth of data not only increases the management difficulty of the communication system, but also faces unprecedented security threats, so that a safer and more reliable transmission medium is needed. The edge computing migrates all computing tasks or part of computing tasks of a traditional cloud computing model to network edge equipment in a near-node deployment mode, and the edge side can better meet communication requirements in the aspects of matching big data, energy consumption, instantaneity, safety and the like of edge terminal equipment. However, the edge computing device is close to a plurality of terminals, the terminals with limited resources are widely distributed and are very easy to attack, and compared with the cloud platform, the edge computing node security protection method is poor in security protection capability, and the problem to be solved is to protect the edge computing node security.
The physical characteristic safe transmission technology fully utilizes the openness of a wireless channel, and enhances the signal receiving quality of a legal communication terminal and/or reduces the signal receiving quality of an illegal terminal by adaptively optimizing system resources, thereby realizing the reliable and safe transmission of the system. Meanwhile, the physical characteristic secure transmission can be well compatible with the existing communication system, has higher practical deployment feasibility, and can adapt to the security requirement of the future emerging communication service, thereby being favored in the field of secure communication.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a transmission method for improving the security performance of an edge computing system.
The purpose of the invention is realized by the following technical scheme: a transmission method for improving the security performance of an edge computing system comprises the following steps:
s1, establishing a transmission model of an edge computing system:
the edge computing device Alice prepares to transmit a security signal to the legitimate terminal Bob, the security signalA plurality of illegal terminals are hidden around a communication link to prepare for eavesdropping on secret signals at any moment; assuming that Alice configures N transmitting antennas, Bob configures a single receiving antenna, and each illegal terminal configures a single receiving antenna; alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a); assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE(ii) a The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular region of (a); due to path loss and fading in the communication space, the radiation range of the transmitted signal is a radius R2The wireless channel is modeled into an independent same-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α being more than or equal to 2, and the channels from the edge computing equipment Alice to the legal terminal Bob and the k-th illegal terminal are represented asWherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1;
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2;
S4, the edge computing device transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, channel information is fed back to the edge computing device through a lossless feedback link;
s5, after the edge computing equipment obtains channel information, transmitting a secret signal by using a maximum ratio transmission beam forming strategy; meanwhile, in order to enhance the safe transmission quality, the edge computing device uses a part of the transmission power to transmit an artificial noise signal to disturb a potential illegal terminal, and the artificial noise signal is designed in a null space of a legal communication link and cannot influence the receiving quality of the legal terminal;
and S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
The invention has the beneficial effects that: the invention utilizes the safety protection area to combine with the artificial noise strategy, reduces the safety interruption probability of the edge computing system and improves the safety transmission performance of the confidential signals.
Drawings
FIG. 1 is a flow chart of the method of the present invention
FIG. 2 is a schematic diagram of a transmission model of an edge computing system.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
The invention is an improvement of a scheme based on a safety protection area and artificial noise, the current research based on the safety protection area is based on a single-transmitting single-receiving antenna, the safety strategy is simpler, and an approximate solution of the safety problem is generally obtained. The invention develops research under a multi-antenna system, and utilizes a one-dimensional linear search algorithm to obtain accurate power distribution of safety problems so as to realize optimal safety performance, and particularly,
as shown in fig. 1, a transmission method for improving security performance of an edge computing system includes the following steps:
s1, establishing a transmission model of an edge computing system:
as shown in fig. 2, the edge computing device Alice in the system is prepared to transmit a secure signal to the legitimate terminal Bob, around which many illegitimate terminals are hidden to prepare to eavesdrop on the secure signal. Assume Alice configures N transmissionsAnd the antenna Bob is configured with a single receiving antenna, and each illegal terminal is configured with a single receiving antenna. Alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a). Assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE. The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular area of (a). Due to path loss and fading in the communication space, the radiation range of the transmitted signal is a radius R2The wireless channel is modeled as an independent equal-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α (α ≧ 2.) the channels of the edge computing device Alice to the legal terminal Bob and the kth illegal terminal are represented asWherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1。
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2。
And S4, the edge computing equipment transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, the channel information is fed back to the edge computing equipment through a lossless feedback link.
And S5, after the edge computing equipment obtains the channel information, transmitting the secret signal by using a maximum ratio transmission beam forming strategy. Meanwhile, in order to enhance the secure transmission quality, the edge computing device uses a portion of the transmit power to transmit an artificial noise signal that is designed in the null space of the legitimate communication link and that does not affect the reception quality of the legitimate terminal, disrupting potentially illegitimate terminals.
S501, utilizing estimated main channel information hBThe edge computing device designs a secret signal:
where P is the power budget of the edge computing device,is an information-bearing security signal, phi ∈ [0,1 ]]Is the power allocation ratio of the security signal. Using primary channel information hBThe edge computing device aligns the transmission direction of the security signal with Bob, and the beamforming vector satisfies wB=hB/||hB||。
S502, adopting a zero-space artificial noise scheme, and enabling Alice to transmit an interference signal to disturb an illegal terminal:
wherein the weighting matrixIs hBA set of orthonormal bases in null space,is an artificial noise signal.
And S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
S601, the received signal-to-interference-and-noise ratio of the legal terminal and the k illegal terminal is as follows:
s602, the main channel capacity and the eavesdropping channel capacity are respectively expressed as: cB=log2(1+ρB),CE=log2(1+ρE). Wherein, the potential passive eavesdroppers independently crack the secret signals respectively, so the ability of stealing secret messages depends on the illegal terminal with the best channel quality,
s603, the edge computing system knows the complete main channel information and only knows the statistical channel information of the eavesdropping channel, and the security capacity of the system possibly cannot support the transmission rate of the transmitter secret message, so that the security communication can be interrupted at some time due to the insecure channel introduced by the illegal terminal. The outage probability is expressed as:
S604, the edge computing system minimizes the safe interruption probability of the system by designing a power distribution ratio. Since the safety interruption probability function is very complex, it is difficult to obtain the optimal power distribution ratio phi*So the invention adopts particle swarm optimization algorithm in the interval [0,1 ]]Inner search for optimum phi*And obtaining the minimum safe interruption probability. .
In the embodiment of the present application, the channel estimation algorithm of the edge computing device may be a least square, minimum mean square error, or other channel estimation method, and may also be an improved algorithm of these methods.
In the embodiment of the present application, the optimization algorithm of step S5 includes, but is not limited to, a particle swarm optimization algorithm, and may also be other one-dimensional linear search algorithms.
In conclusion, the invention utilizes the safety protection area and the artificial noise method under the multi-antenna system, is beneficial to the safe transmission of the confidential signals and improves the safety performance of the edge computing system.
The foregoing is a preferred embodiment of the present invention, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as excluding other embodiments, and is capable of other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (3)
1. A transmission method for improving security performance of an edge computing system, comprising: the method comprises the following steps:
s1, establishing a transmission model of an edge computing system:
the edge computing equipment Alice prepares to transmit a secret signal to a legal terminal Bob, and a plurality of illegal terminals are hidden around a secret communication link to prepare to eavesdrop the secret signal all the time; assuming that Alice configures N transmitting antennas, Bob configures a single receiving antenna, and each illegal terminal configures a single receiving antenna; alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a); assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE(ii) a The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular region of (a); transmitting due to path loss and fading in the communication spaceThe signal has a radiation range of a radius R2The wireless channel is modeled into an independent same-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α being more than or equal to 2, and the channels from the edge computing equipment Alice to the legal terminal Bob and the k-th illegal terminal are represented asWherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1;
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2;
S4, the edge computing device transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, channel information is fed back to the edge computing device through a lossless feedback link;
s5, after the edge computing equipment obtains channel information, transmitting a secret signal by using a maximum ratio transmission beam forming strategy; the edge computing device uses a part of the transmitting power to transmit an artificial noise signal to disturb a potential illegal terminal, wherein the artificial noise signal is designed in a null space of a legal communication link and does not influence the receiving quality of the legal terminal;
and S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
2. The transmission method for improving the security performance of the edge computing system according to claim 1, wherein: the step S5 includes the following sub-steps:
s501, utilizing estimated main channel information hBThe edge computing device designs a secret signal:
where P is the power budget of the edge computing device,is an information-bearing security signal, phi ∈ [0,1 ]]Is the power allocation ratio of the security signal; using primary channel information hBThe edge computing device aligns the transmission direction of the security signal with Bob, and the beamforming vector satisfies wB=hB/||hB||;
S502, adopting a zero-space artificial noise scheme, and enabling Alice to transmit an interference signal to disturb an illegal terminal:
3. The transmission method for improving the security performance of the edge computing system according to claim 1, wherein: the optimization design of the power distribution ratio of the secret signal and the artificial noise in the step S6 includes:
s601, the received signal-to-interference-and-noise ratio of the legal terminal and the k illegal terminal is as follows:
s602, the main channel capacity and the eavesdropping channel capacity are respectively expressed as: cB=log2(1+ρB),CE=log2(1+ρE) (ii) a Wherein, the potential passive eavesdroppers independently crack the secret signals respectively, so the ability of stealing secret messages depends on the illegal terminal with the best channel quality,
s603, the edge computing system knows the complete main channel information and only knows the statistical channel information of the eavesdropping channel, and the safety capacity of the system possibly cannot support the transmission rate of the transmitter secret message, so that the safety communication can be interrupted at some time due to the unsafe channel introduced by the illegal terminal; the outage probability is expressed as:
s604, the edge computing system minimizes the safe interruption probability of the system by designing a power distribution ratio; since the safety interruption probability function is very complex, it is difficult to obtain the optimal power distribution ratio phi*So that a particle swarm optimization algorithm is adopted in the interval [0,1 ]]Inner search for optimum phi*And obtaining the minimum safe interruption probability.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010047267.1A CN111262644A (en) | 2020-01-16 | 2020-01-16 | Transmission method for improving safety performance of edge computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010047267.1A CN111262644A (en) | 2020-01-16 | 2020-01-16 | Transmission method for improving safety performance of edge computing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111262644A true CN111262644A (en) | 2020-06-09 |
Family
ID=70948817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010047267.1A Pending CN111262644A (en) | 2020-01-16 | 2020-01-16 | Transmission method for improving safety performance of edge computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111262644A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225825A (en) * | 2021-05-10 | 2021-08-06 | 苏州大学 | Particle swarm optimization algorithm-based hybrid artificial noise-assisted safe transmission method and device |
CN113534829A (en) * | 2021-06-11 | 2021-10-22 | 南京邮电大学 | Daily detecting system that patrols of unmanned aerial vehicle based on edge calculation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915472A (en) * | 2016-05-20 | 2016-08-31 | 电子科技大学 | Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition |
CN106068032A (en) * | 2016-05-20 | 2016-11-02 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
CN110166096A (en) * | 2019-04-09 | 2019-08-23 | 西安电子科技大学 | A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise |
-
2020
- 2020-01-16 CN CN202010047267.1A patent/CN111262644A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915472A (en) * | 2016-05-20 | 2016-08-31 | 电子科技大学 | Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition |
CN106068032A (en) * | 2016-05-20 | 2016-11-02 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
CN110166096A (en) * | 2019-04-09 | 2019-08-23 | 西安电子科技大学 | A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise |
Non-Patent Citations (2)
Title |
---|
TENGYUE ZHANG 等: "Analysis of the physical layer security enhancing of wireless communication system under the random mobile", 《IET COMMUNICATIONS》 * |
章露萍: "《电子科技大学硕士学位论文 理想与非理想信道条件下物理层安全传输的理论与性能分析》", 8 February 2018 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225825A (en) * | 2021-05-10 | 2021-08-06 | 苏州大学 | Particle swarm optimization algorithm-based hybrid artificial noise-assisted safe transmission method and device |
CN113534829A (en) * | 2021-06-11 | 2021-10-22 | 南京邮电大学 | Daily detecting system that patrols of unmanned aerial vehicle based on edge calculation |
CN113534829B (en) * | 2021-06-11 | 2024-04-05 | 南京邮电大学 | Unmanned aerial vehicle daily patrol detecting system based on edge calculation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks | |
Mostafa et al. | Physical-layer security for indoor visible light communications | |
Lu et al. | Proactive eavesdropping in UAV-aided suspicious communication systems | |
Yesilkaya et al. | Physical-layer security in visible light communications | |
Yao et al. | 3D trajectory optimization for secure UAV communication with CoMP reception | |
CN113193891B (en) | Physical layer security authentication method for downlink non-orthogonal multiple access unmanned aerial vehicle system | |
Chen et al. | UAV-aided secure transmission in MISOME wiretap channels with imperfect CSI | |
Jung et al. | Security energy efficiency analysis of analog collaborative beamforming with stochastic virtual antenna array of UAV swarm | |
Sharma et al. | Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review | |
Mukherjee et al. | Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels | |
Nusenu et al. | Green secure communication range-angle focusing quadrature spatial modulation using frequency modulated diverse retrodirective array for mmWave wireless communications | |
Lai et al. | Directional modulation-enabled secure transmission with intelligent reflecting surface | |
CN108736989B (en) | The implementation method that optimal secrecy handling capacity and high efficiency energy are collected in SWIPT system | |
Zhu et al. | Secure precise transmission with multi-relay-aided directional modulation | |
Lu et al. | Optimal power allocation for secure directional modulation networks with a full-duplex UAV user | |
CN111262644A (en) | Transmission method for improving safety performance of edge computing system | |
Xu et al. | Beyond encryption: Exploring the potential of physical layer security in UAV networks | |
Maeng et al. | Power allocation for fingerprint-based PHY-Layer authentication with mmWave UAV networks | |
Shi et al. | Physical layer security techniques for data transmission for future wireless networks | |
Zhang et al. | Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities | |
Zhao et al. | Intelligent reflecting surface aided wireless information surveillance | |
Illi et al. | On the secrecy analysis of a RIS-aided wireless communication system subject to phase quantization errors | |
Bhuyan et al. | Secure mmWave cellular network for drone communication | |
Hu et al. | Maxmin fairness for UAV-enabled proactive eavesdropping with jamming over distributed transmit beamforming-based suspicious communications | |
Qiu et al. | Robust multi-beam secure mmwave wireless communication for hybrid wiretapping systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200609 |