Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
Entropy (Basel) ; 25(12)2023 Dec 09.
Artículo en Inglés | MEDLINE | ID: mdl-38136519

RESUMEN

By optimizing the reconfigurable intelligent surface (RIS) reflection coefficients, the channel capacity of legitimate users can be increased, thereby enhancing the anti-jamming performance of communication systems. However, existing studies on RIS-assisted anti-jamming assume that there is no coupling between the RIS reflection coefficients and the incident angle of electromagnetic (EM) waves, which is quite unreasonable. Therefore, we consider the effect of the incident angle of EM waves on the reflection coefficients of the RIS and propose a communication anti-jamming scheme assisted by an RIS with angular response. Specifically, a problem is formulated to optimize the RIS reflection coefficients so that the legitimate signal is amplified, but the jamming signal is attenuated, thus enhancing the legitimate channel capacity. However, the coupling of the EM incident angle and the RIS reflection coefficients causes the problem to be non-convex. To tackle this problem, we equivalently transform the RIS reflection coefficients optimization problem into a quadratically constrained quadratic programming (QCQP) problem using the complex Taylor expansion and the multidimensional complex quadratic transform (MCQT) and solve it utilizing the alternating direction method of the multipliers (ADMM) algorithm. The simulation results reveal that, compared to other schemes supported by RIS without angular response, the proposed scheme is able to achieve a significant improvement in the anti-jamming performance.

2.
Entropy (Basel) ; 25(7)2023 Jul 24.
Artículo en Inglés | MEDLINE | ID: mdl-37510049

RESUMEN

In this work, we investigate a novel intelligent surface-assisted multiuser multiple-input single-output multiple-eavesdropper (MU-MISOME) secure communication network where an intelligent reflecting surface (IRS) is deployed to enhance the secrecy performance and an intelligent transmission surface (ITS)-based transmitter is utilized to perform energy-efficient beamforming. A weighted sum secrecy rate (WSSR) maximization problem is developed by jointly optimizing transmit power allocation, ITS beamforming, and IRS phase shift. To solve this problem, we transform the objective function into an approximated concave form by using the successive convex approximation (SCA) technique. Then, we propose an efficient alternating optimization (AO) algorithm to solve the reformulated problem in an iterative way, where Karush-Kuhn-Tucker (KKT) conditions, the alternating direction method of the multiplier (ADMM), and majorization-minimization (MM) methods are adopted to derive the closed-form solution for each subproblem. Finally, simulation results are given to verify the convergence and secrecy performance of the proposed schemes.

3.
Entropy (Basel) ; 24(8)2022 Aug 22.
Artículo en Inglés | MEDLINE | ID: mdl-36010831

RESUMEN

Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and the risk of information leakage. Aiming at the problem, integrated secure communication schemes using non-reconciled keys have attracted extensive attention. These schemes exploit channel coding to correct both inconsistent keys and transmission error bits. Meanwhile, more redundant code bits must be added to correct errors, which results in a lower secure transmission rate. To address the problem, we analyze the merit of channel correlation between non-reconciled key generation and secure transmission. Inspired by this, we propose a non-reconciled physical-layer keys-assisted secure communication scheme based on channel correlation. First of all, the signal frame is designed to make use of channel correlation between non-reconciled key generation and secure transmission. Based on the channel correlation, non-reconciled keys are then generated from the wireless channel to encrypt transmitted data. Moreover, an adaptive coding algorithm based on the equivalent channel is presented to encode the data bits before encryption, to guarantee reliable transmission. Finally, theoretical analysis and simulations demonstrate the significant performance of the proposed scheme in terms of low bit error ratio and high secure transmission rate.

4.
Entropy (Basel) ; 24(4)2022 Mar 23.
Artículo en Inglés | MEDLINE | ID: mdl-35455109

RESUMEN

In this paper, we propose an improved physical layer key generation scheme that can maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the legitimate user aiming at improving its signal-to-noise ratio (SNR). We consider the scenario of multiple input single output (MISO) against multiple relevant eavesdroppers. We elaborately design and optimize the reflection coefficient matrix of IRS elements that can improve the legitimate user's SNR through IRS passive beamforming and deteriorate the channel quality of eavesdroppers at the same time. We first derive the lower bound expression of the achievable key capacity, then solve the optimization problem based on semi-definite relaxation (SDR) and the convex-concave procedure (CCP) to maximize the secret key capacity. Simulation results show that our proposed scheme can significantly improve the secret key capacity and reduce hardware costs compared with other benchmark schemes.

5.
Entropy (Basel) ; 24(4)2022 Mar 30.
Artículo en Inglés | MEDLINE | ID: mdl-35455151

RESUMEN

Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception 2-12Hk, where Hk is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA