Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 9 de 9
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Sensors (Basel) ; 24(2)2024 Jan 05.
Artigo em Inglês | MEDLINE | ID: mdl-38257430

RESUMO

Reconfigurable intelligent surfaces (RIS) are expected to bring about a revolutionary transformation in vehicular networks, thus paving the way for a future characterized by connected and automated vehicles (CAV). An RIS is a planar structure comprising many passive elements that can dynamically manipulate electromagnetic waves to enhance wireless communication by reflecting, refracting, and focusing signals in a programmable manner. RIS exhibits substantial potential for improving vehicle-to-everything (V2X) communication through various means, including coverage enhancement, interference mitigation, improving signal strength, and providing additional layers of privacy and security. This article presents a comprehensive survey that explores the emerging opportunities arising from the integration of RIS into vehicular networks. To examine the convergence of RIS and V2X communications, the survey adopted a holistic approach, thus highlighting the potential benefits and challenges of this combination. In this study, we examined several applications of RIS-aided V2X communication. Subsequently, we delve into the fundamental emerging technologies that are expected to empower vehicular networks, encompassing mobile edge computing (MEC), non-orthogonal multiple access (NOMA), millimeter-wave communication (mmWave), Artificial Intelligence (AI), and visible light communication (VLC). Finally, to stimulate further research in this domain, we emphasize noteworthy research challenges and potential avenues for future exploration.

2.
Sensors (Basel) ; 24(16)2024 Aug 10.
Artigo em Inglês | MEDLINE | ID: mdl-39204866

RESUMO

Intentional electromagnetic interference attacks (e.g., jamming) against wireless connected devices such as the Internet of Things (IoT) remain a serious challenge, especially as such attacks evolve in complexity. Similarly, eavesdropping on wireless communication channels persists as an inherent vulnerability that is often exploited by adversaries. This article investigates a novel approach to enhancing information security for IoT systems via collaborative strategies that can effectively mitigate attacks targeting availability via interference and confidentiality via eavesdropping. We examine the proposed approach for two use cases. First, we consider an IoT device that experiences an interference attack, causing wireless channel outages and hindering access to transmitted IoT data. A physical-layer-based security (PLS) transmission strategy is proposed in this article to maintain target levels of information availability for devices targeted by adversarial interference. In the proposed strategy, select IoT devices leverage a cooperative transmission approach to mitigate the IoT signal outages under active interference attacks. Second, we consider the case of information confidentiality for IoT devices as they communicate over wireless channels with possible eavesdroppers. In this case, we propose a collaborative transmission strategy where IoT devices create a signal outage for the eavesdropper, preventing it from decoding the signal of the targeted devices. The analytical and numerical results of this article illustrate the effectiveness of the proposed transmission strategy in achieving desired IoT security levels with respect to availability and confidentiality for both use cases.

3.
Sensors (Basel) ; 23(17)2023 Sep 02.
Artigo em Inglês | MEDLINE | ID: mdl-37688073

RESUMO

This paper investigates the security-reliability of simultaneous wireless information and power transfer (SWIPT)-assisted amplify-and-forward (AF) full-duplex (FD) relay networks. In practice, an AF-FD relay harvests energy from the source (S) using the power-splitting (PS) protocol. We propose an analysis of the related reliability and security by deriving closed-form formulas for outage probability (OP) and intercept probability (IP). The next contribution of this research is an asymptotic analysis of OP and IP, which was generated to obtain more insight into important system parameters. We validate the analytical formulas and analyze the impact on the key system parameters using Monte Carlo simulations. Finally, we propose a deep learning network (DNN) with minimal computation complexity and great accuracy for OP and IP predictions. The effects of the system's primary parameters on OP and IP are examined and described, along with the numerical data.

4.
Entropy (Basel) ; 25(7)2023 Jul 24.
Artigo em Inglês | MEDLINE | ID: mdl-37510049

RESUMO

In this work, we investigate a novel intelligent surface-assisted multiuser multiple-input single-output multiple-eavesdropper (MU-MISOME) secure communication network where an intelligent reflecting surface (IRS) is deployed to enhance the secrecy performance and an intelligent transmission surface (ITS)-based transmitter is utilized to perform energy-efficient beamforming. A weighted sum secrecy rate (WSSR) maximization problem is developed by jointly optimizing transmit power allocation, ITS beamforming, and IRS phase shift. To solve this problem, we transform the objective function into an approximated concave form by using the successive convex approximation (SCA) technique. Then, we propose an efficient alternating optimization (AO) algorithm to solve the reformulated problem in an iterative way, where Karush-Kuhn-Tucker (KKT) conditions, the alternating direction method of the multiplier (ADMM), and majorization-minimization (MM) methods are adopted to derive the closed-form solution for each subproblem. Finally, simulation results are given to verify the convergence and secrecy performance of the proposed schemes.

5.
Entropy (Basel) ; 25(3)2023 Mar 17.
Artigo em Inglês | MEDLINE | ID: mdl-36981407

RESUMO

This paper analyzes the physical layer security performance of hybrid automatic repeat request (HARQ) systems with the assistance of an intelligent reflecting surface (IRS) and aims to reveal the primary factors that enhance PLS. First, closed-form expressions for the connection outage probability (COP) and secrecy outage probability (SOP) in HARQ with chase combining (HARQ-CC) are acquired using the generalized-K (KG) distribution. Then, these two critical metrics are derived while adopting HARQ with incremental redundancy (HARQ-IR), resorting to the mixture gamma (MG) distribution and the Mellin transform. Diversity and coding gain are also addressed through an asymptotic analysis of the COP and SOP. Finally, an evaluation of the numerical results demonstrates that a greater gain in the main channel and the wiretap channel can be produced by increasing the number of meta-surfaces rather than increasing the maximum transmission number, except for the higher signal-to-noise (SNR) region of HARQ-IR where the latter is preferred. This finding provides a significant guidance for the joint configuration of IRS and HARQ to achieve secure communication.

6.
Sensors (Basel) ; 20(3)2020 Feb 07.
Artigo em Inglês | MEDLINE | ID: mdl-32046172

RESUMO

Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e 1 , e 2 from the source node S to User 1 (U 1 ) and User 2 (U 2 ), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U 1 and U 2 . The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U 1 was also compared to the secrecy performance of U 2 . Finally, the simulation results matched the Monte Carlo simulations well.

7.
Entropy (Basel) ; 22(4)2020 Mar 31.
Artigo em Inglês | MEDLINE | ID: mdl-33286177

RESUMO

In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency. First, we analyzed some critical performance metrics, including connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST). Then, to maximize the EST, three optimization problems of rate adaption were discussed: (i) optimizing the code rate with a given secrecy redundancy rate by a parameterized closed-form solution; (ii) optimizing the secrecy redundancy rate with a given code rate by a fixed-point method; (iii) optimizing both code rate and secrecy redundancy rate by an iterative optimization algorithm. We also considered COP and SOP constraints among the problems while corresponding solutions were deduced. Finally, numerical and simulated results verified our conclusions that the approximated SOP matches well with Monte-Carlo simulation for a strict reliable constraint, and that the optimized transmitting rate enhances EST efficiently with multiple eavesdroppers and retransmissions. Moreover, the influence of the number of eavesdroppers on secrecy performance was analyzed. Briefly, secrecy performance inevitably deteriorates with increasing number of eavesdroppers due to raised information leakage.

8.
Entropy (Basel) ; 21(7)2019 Jun 26.
Artigo em Inglês | MEDLINE | ID: mdl-33267340

RESUMO

In this paper, we present a new secrecy-enhancing scheme for the spatial modulation (SM) system, by considering imperfect channel state information (CSI). In the proposed scheme, two antennas are activated at the same time. One of the activated antennas transmits information symbols along with artificial noise (AN) optimized under the imperfect CSI condition. On the other hand, the other activated antenna transmits another AN sequence. Because the AN are generated by exploiting the imperfect CSI of the legitimate channel, they can only be canceled at the legitimate receiver, while the passive eavesdropper will suffer from interference. We derive the secrecy rate of the proposed scheme in order to estimate the performance. The numerical results demonstrated in this paper verify that the proposed scheme can achieve a better secrecy rate compared to the conventional scheme at the same effective data rate.

9.
EURASIP J Wirel Commun Netw ; 2021(1): 194, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34899875

RESUMO

Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox's H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner's wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA