Query:
学者姓名:王慧明
Refining:
Year
Type
Indexed by
Source
Complex
Co-Author
Language
Clean All
Abstract :
In this paper, we investigate physical-layer security of the uplink millimeter wave communications for a cellular vehicle-to-everything (C-V2X) network comprised of a large number of base stations (BSs) and different categories of V2X nodes, including vehicles, pedestrians, and road side units. Considering the dynamic change and randomness of the topology of the C-V2X network, we model the roadways, the V2X nodes on each roadway, and the BSs by a Poisson line process, a 1D Poisson point process (PPP), and a 2D PPP, respectively. We propose two uplink association schemes for a typical vehicle, namely, the smallest-distance association (SDA) scheme and the largest-power association (LPA) scheme, and we establish a tractable analytical framework to comprehensively assess the security performance of the uplink transmission, by leveraging the stochastic geometry theory. Specifically, for each association scheme, we first obtain new expressions for the association probability of the typical vehicle, and then derive the overall connection outage probability and secrecy outage probability by calculating the Laplace transform of the aggregate interference power. Numerical results are presented to validate our theoretical analysis, and we also provide interesting insights into how the security performance is influenced by various system parameters, including the densities of V2X nodes and BSs. Moreover, we show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput.
Keyword :
Cellular vehicle-to-everything millimeter wave physical-layer security Poisson line process Poisson point process Probability Roads Security stochastic geometry Stochastic processes Uplink Vehicle-to-everything Wireless communication
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Zheng, Tong-Xing , Wen, Yating , Liu, Hao-Wen et al. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2022 , 21 (11) : 9818-9833 . |
MLA | Zheng, Tong-Xing et al. "Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 21 . 11 (2022) : 9818-9833 . |
APA | Zheng, Tong-Xing , Wen, Yating , Liu, Hao-Wen , Ju, Ying , Wang, Hui-Ming , Wong, Kai-Kit et al. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2022 , 21 (11) , 9818-9833 . |
Export to | NoteExpress RIS BibTex |
Abstract :
This paper studies covert communications between a pair of legitimate transmitter-receiver against a watchful warden over fading channels. There coexist multiple friendly helper nodes who are willing to protect the covert communication from being detected by the warden. An uncoordinated jammer selection scheme is proposed where those helpers whose instantaneous channel gains to the legitimate receiver fall below a pre-established selection threshold will be chosen as jammers radiating jamming signals to defeat the warden. Afterwards, we jointly design the optimal selection threshold and transmission rate for maximizing covert throughput under the premise that the detection error of the warden exceeds a certain level. Numerical results demonstrate that the maximal covert throughput improves significantly as the total number of helpers increases.
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen et al. Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels [C] . 2021 . |
MLA | Zhengy, Tong-Xing et al. "Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels" . (2021) . |
APA | Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen , Wen, Yating , Mu, Pengcheng , Wang, Hui-Ming . Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels . (2021) . |
Export to | NoteExpress RIS BibTex |
Abstract :
In this correspondence, we study the physical layer security in a stochastic unmanned aerial vehicles (UAVs) network froma network-wide perspective, where the locations of UAVs are modeled as a Mat ' ern hardcore point process (MHCPP) to characterize the minimum safety distance between UAVs, and the locations of users and eavesdroppers are modeled as a Poisson cluster process and a Poisson point process, respectively. UAVs adopt zero-forcing precoding to serve multiple ground users and emit artificial noise to combat eavesdropping. We derive the approximations for the coverage probability and secrecy probability of a typical user, with which we derive the secrecy throughput of the whole network. Numerical results show the analytical results can well approximate the simulation results. Impacts of parameters on the secrecy performance are shown.
Keyword :
Matern hard-core point process Physical layer security UAV networks
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2856-2861 . |
MLA | Lyu, Jiawei et al. "Secure UAV Random Networks With Minimum Safety Distance" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2856-2861 . |
APA | Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2856-2861 . |
Export to | NoteExpress RIS BibTex |
Abstract :
We investigate covert communication under a sequential change-point detection (SCPD) framework, where a transmitter, Alice, attempts to communicate reliably with a receiver, Bob, over an additive white Gaussian noise channel, while simultaneously ensuring covertness (low probability of detection) with respect to an adversary, Willie. Different from the binary hypothesis test based detection framework considered in prior works where Willie collects all signal samples together and makes a decision in a batch manner, we view Willie's detection process as an SCPD process that works in a real-time manner. We establish a new criterion to evaluate the covertness of the communication between Alice and Bob, and investigate the performance of covert communication accordingly. Subject to the proposed constraint on covertness, we investigate the feasible transmit power and transmission duration under three SCPD algorithms, namely, the Shewhart test, the finite moving average chart (FMAC), and the cumulative sum (CUSUM) test, and characterize how the covert communication throughput scales with the average run length to false alarm (ARL2FA) of Willie's detector as the ARL2FA increases without bound. Our theoretical results can be viewed as upper bounds on the covert communication throughput that can be achieved, and we show that compared with the case where Willie performs the CUSUM test, Alice and Bob achieve a higher covert communication throughput if Willie performs the Shewhart test or the FMAC. © 1963-2012 IEEE.
Keyword :
Decoding Gaussian noise (electronic) Testing White noise
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection [J]. | IEEE Transactions on Information Theory , 2021 , 67 (11) : 7285-7303 . |
MLA | Huang, Ke-Wen et al. "On Covert Communication against Sequential Change-Point Detection" . | IEEE Transactions on Information Theory 67 . 11 (2021) : 7285-7303 . |
APA | Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection . | IEEE Transactions on Information Theory , 2021 , 67 (11) , 7285-7303 . |
Export to | NoteExpress RIS BibTex |
Abstract :
We consider that a transmitter covertly communicates with multiple receivers under the help of a friendly jammer. The messages intended for different receivers are transmitted in mutually orthogonal frequency bands. An adversary observes all these frequency bands aiming at detecting whether or not communication occurs, while the friendly jammer broadcasts jamming signals to degrade the detection performance of the adversary. We consider a block Rayleigh fading channel model and evaluate the performance of covert communication in two situations: 1) the wireless channels vary slowly such that the transmission ends within one channel coherent time block, and 2) the wireless channels vary fast such that the wireless channels have changed several times before the whole transmission is finished. In the former case, subject to a covertness constraint, we maximize the sum of the effective rates by optimizing the transmit power allocation and the transmission rate for each receiver. In the latter case, we take the channel training process into consideration, and subject to a covertness constraint, we maximize the sum of the ergodic rates by optimizing the power allocation and the pilot length. Though both of the two optimization problems are non-convex, we presented methods to find their global optimal solutions. Besides, we also present methods to find sub-optimal solutions with lower computational complexities. Numerical results are presented to evaluate the performance under the two situations.
Keyword :
Communication system security Covert communication Fading channels jamming Jamming power control Receivers resource allocation Resource management Transmitters Wireless communication wireless security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) : 4480-4494 . |
MLA | Huang, Ke-Wen et al. "Jamming Aided Covert Communication With Multiple Receivers" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 20 . 7 (2021) : 4480-4494 . |
APA | Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) , 4480-4494 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in order to wiretap the data transmitted from a transmitter, Alice, to a receiver, Bob. We propose a new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses an intelligent reflecting surface (IRS) to reflect the pilot sent by Bob to Alice. The proposed new PCA scheme, referred to as IRS-PCA, increases the signal leakage from Alice to the IRS during the data transmission phase, which is then reflected by the IRS to Eve in order to improve the wiretapping capability of Eve. The proposed IRS-PCA scheme disables many existing countermeasures on PCA due to the fact that with IRS-PCA, Eve no longer needs to know the pilot sequence of Bob, and therefore, poses severe threat to the security of the legitimate wireless communication system. In view of this, the problems of 1) IRS-PCA detection and 2) secure transmission under IRS-PCA are considered in this paper. For IRS-PCA detection, a generalized cumulative sum (GCUSUM) detection procedure is proposed based on the framework of quickest detection, aiming at detecting the occurrence of IRS-PCA as soon as possible once it occurs. For secure transmission under IRS-PCA, a cooperative channel estimation scheme is proposed to estimate the channel of the IRS, based on which zero-forcing beamforming is designed to reduce signal leakage. © 2002-2012 IEEE.
Keyword :
Data transfer Electrical engineering Mobile telecommunication systems
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure [J]. | IEEE Transactions on Wireless Communications , 2021 , 20 (1) : 345-359 . |
MLA | Huang, Ke-Wen et al. "Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure" . | IEEE Transactions on Wireless Communications 20 . 1 (2021) : 345-359 . |
APA | Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure . | IEEE Transactions on Wireless Communications , 2021 , 20 (1) , 345-359 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Millimeter-wave(Mmwave) networks with high directional antennas have enhanced security. However, eavesdroppers can still intercept confidential messages by residing in both signal main-lobe and side-lobe areas. This paper investigates the secrecy performance of artificial-noise (AN)-aided transmission in mmWave systems under the capacity-threshold on-off scheme in the presence of randomly distributed eavesdroppers, which utilizes AN to resist eavesdroppers in the side-lobe area. Considering the effects of mmWave channel characteristics, blockages, and directional antenna arrays, we derive the transmission probability (TP) and closed-form expression of secrecy outage probability (SOP) in the non-colluding eavesdropping scenario. What's more, we derive the analytical expression of SOP in the colluding eavesdropping scenario and its lower bound. Specifically, we characterize the impacts of various system parameters on the secrecy performance and verify the contribution of AN-jamming to inhibiting side-lobe information leakage, meanwhile, the optimal power allocation of AN is analyzed in non-colluding scenarios. Besides, our results reveal that with the narrower main beam and higher antenna gain, the secrecy performance is enhanced significantly. The analytical and numerical results show that the capacity-based transmission scheme with AN-jamming can effectively improve the secrecy performance of mmWave systems.
Keyword :
artificial noise blockage mmWave Physical layer security secrecy outage sector
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Wang, Haoyu , Ju, Ying , Pei, Qingqi et al. Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage [C] . 2021 . |
MLA | Wang, Haoyu et al. "Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage" . (2021) . |
APA | Wang, Haoyu , Ju, Ying , Pei, Qingqi , Wang, Hui-Ming . Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage . (2021) . |
Export to | NoteExpress RIS BibTex |
Abstract :
In this correspondence, we use double intelligent reflecting surface (IRS) assisted design to enhance the secrecy performance of wireless transmission. Different from the existing studies in the literature, the inter-surface signal reflection is considered in this work, which makes the formulated secrecy rate (SR) optimization problem difficult to tackle. In particular, to solve this problem, we propose a product Riemmanian manifold (PRM) based alternating optimization (AO) algorithm to jointly optimize the beamformer at transmitter as well as phase shift coefficients at double IRS, in which the PRM optimization algorithm is applied to optimize the phase shift coefficients at both IRSs simultaneously. Simulation results show that the proposed algorithm greatly enhance the SR compared with the existing benchmark schemes. And compared with conventional semi-definite relaxation based AO algorithm, the proposed PRM based AO algorithm can achieve much lower computational complexity as well as faster speed of convergence.
Keyword :
Alternating optimization Convergence intelligent reflecting surface inter-surface signal reflection Linear programming Manifolds MISO communication Optimization product Riemmanian manifold secrecy rate Transmitters Wireless communication
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Dong, Limeng , Wang, Hui-Ming , Bai, Jiale et al. Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2912-2916 . |
MLA | Dong, Limeng et al. "Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2912-2916 . |
APA | Dong, Limeng , Wang, Hui-Ming , Bai, Jiale , Xiao, Haitao . Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2912-2916 . |
Export to | NoteExpress RIS BibTex |
Abstract :
YYY In this paper, an intelligent reflecting surface (IRS) assisted spectrum sharing underlay cognitive radio (CR) wiretap channel (WTC) is studied, and we aim at enhancing the secrecy rate of secondary user in this channel subject to total power constraint at secondary transmitter (ST), interference power constraint (IPC) at primary receiver (PR) as well as unit modulus constraint at IRS. Due to extra IPC and eavesdropper (Eve) are considered, all the existing solutions for enhancing secrecy rate of IRS-assisted non-CR WTC as well as enhancing transmission rate in IRS-assisted CR channel without eavesdropper fail in this work. Therefore, we propose new numerical solutions to optimize the secrecy rate of this channel under full primary, secondary users' channel state information (CSI) and three different cases of Eve's CSI: full CSI, imperfect CSI with bounded estimation error, and no CSI. To solve the difficult non-convex optimization problem, an efficient alternating optimization (AO) algorithm is proposed to jointly optimize the beamformer at ST and phase shift coefficients at IRS. In particular, when optimizing the phase shift coefficients during each iteration of AO, a Dinkelbach based solution in combination with successive approximation and penalty based solution is proposed under full CSI and a penalty convex-concave procedure solution is proposed under imperfect Eve's CSI. For no Eve's CSI case, artificial noise (AN) aided approach is adopted to help enhancing the secrecy rate. Simulation results show that our proposed solutions for the IRS-assisted design greatly enhance the secrecy performance compared with the existing numerical solutions with and without IRS under full and imperfect Eve's CSI. And positive secrecy rate can be achieved by our proposed AN aided approach given most channel realizations under no Eve's CSI case so that secure communication also can be guaranteed. All of the proposed AO algorithms are guaranteed to monotonic convergence.
Keyword :
Cognitive radio CSI intelligent reflecting surface MISO secrecy rate
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) : 4678-4690 . |
MLA | Dong, Limeng et al. "Secure Cognitive Radio Communication via Intelligent Reflecting Surface" . | IEEE TRANSACTIONS ON COMMUNICATIONS 69 . 7 (2021) : 4678-4690 . |
APA | Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) , 4678-4690 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Massive machine type communication (mMTC) network contains massive access devices, which increases the risk of distributed denial of service (DDoS) attacks. Especially, the DDoS attack launched by hijacked devices cannot be detected through traditional cryptography-based authentication because that the hijacked devices have legitimate identities. In this letter, we propose to exploit the characteristics of access traffic at the air interface to detect this kind of DDoS attack, and then identify the suspicious devices. We analyze both the characteristics of access traffic based on MTC traffic arrival model and the random access mechanism proposed by 3GPP to construct test statistics, and propose a sequential change point detection (SCPD) scheme to test whether there are anomalies as quickly as possible. After that, we identify the hijacked devices based on the abnormal traffic. Simulation experiments confirm the effectiveness of our detection scheme.
Keyword :
3GPP access traffic Authentication DDoS attack Delays Denial-of-service attack Device hijacking massive MTC network Object recognition Real-time systems sequential change point detection Uplink
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic [J]. | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) : 2225-2229 . |
MLA | Fu, Qing-Yi et al. "Detection of Hijacking DDoS Attack Based on Air Interface Traffic" . | IEEE WIRELESS COMMUNICATIONS LETTERS 10 . 10 (2021) : 2225-2229 . |
APA | Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic . | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) , 2225-2229 . |
Export to | NoteExpress RIS BibTex |
Export
Results: |
Selected to |
Format: |