• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:王慧明

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 22 >
Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks EI SCIE Scopus
期刊论文 | 2022 , 21 (11) , 9818-9833 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
SCOPUS Cited Count: 12
Abstract&Keyword Cite

Abstract :

In this paper, we investigate physical-layer security of the uplink millimeter wave communications for a cellular vehicle-to-everything (C-V2X) network comprised of a large number of base stations (BSs) and different categories of V2X nodes, including vehicles, pedestrians, and road side units. Considering the dynamic change and randomness of the topology of the C-V2X network, we model the roadways, the V2X nodes on each roadway, and the BSs by a Poisson line process, a 1D Poisson point process (PPP), and a 2D PPP, respectively. We propose two uplink association schemes for a typical vehicle, namely, the smallest-distance association (SDA) scheme and the largest-power association (LPA) scheme, and we establish a tractable analytical framework to comprehensively assess the security performance of the uplink transmission, by leveraging the stochastic geometry theory. Specifically, for each association scheme, we first obtain new expressions for the association probability of the typical vehicle, and then derive the overall connection outage probability and secrecy outage probability by calculating the Laplace transform of the aggregate interference power. Numerical results are presented to validate our theoretical analysis, and we also provide interesting insights into how the security performance is influenced by various system parameters, including the densities of V2X nodes and BSs. Moreover, we show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput.

Keyword :

Cellular vehicle-to-everything millimeter wave physical-layer security Poisson line process Poisson point process Probability Roads Security stochastic geometry Stochastic processes Uplink Vehicle-to-everything Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zheng, Tong-Xing , Wen, Yating , Liu, Hao-Wen et al. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2022 , 21 (11) : 9818-9833 .
MLA Zheng, Tong-Xing et al. "Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 21 . 11 (2022) : 9818-9833 .
APA Zheng, Tong-Xing , Wen, Yating , Liu, Hao-Wen , Ju, Ying , Wang, Hui-Ming , Wong, Kai-Kit et al. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2022 , 21 (11) , 9818-9833 .
Export to NoteExpress RIS BibTex
Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels CPCI-S
会议论文 | 2021 | IEEE Wireless Communications and Networking Conference (WCNC)
Abstract&Keyword Cite

Abstract :

This paper studies covert communications between a pair of legitimate transmitter-receiver against a watchful warden over fading channels. There coexist multiple friendly helper nodes who are willing to protect the covert communication from being detected by the warden. An uncoordinated jammer selection scheme is proposed where those helpers whose instantaneous channel gains to the legitimate receiver fall below a pre-established selection threshold will be chosen as jammers radiating jamming signals to defeat the warden. Afterwards, we jointly design the optimal selection threshold and transmission rate for maximizing covert throughput under the premise that the detection error of the warden exceeds a certain level. Numerical results demonstrate that the maximal covert throughput improves significantly as the total number of helpers increases.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen et al. Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels [C] . 2021 .
MLA Zhengy, Tong-Xing et al. "Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels" . (2021) .
APA Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen , Wen, Yating , Mu, Pengcheng , Wang, Hui-Ming . Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels . (2021) .
Export to NoteExpress RIS BibTex
Secure UAV Random Networks With Minimum Safety Distance EI SCIE
期刊论文 | 2021 , 70 (3) , 2856-2861 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

In this correspondence, we study the physical layer security in a stochastic unmanned aerial vehicles (UAVs) network froma network-wide perspective, where the locations of UAVs are modeled as a Mat ' ern hardcore point process (MHCPP) to characterize the minimum safety distance between UAVs, and the locations of users and eavesdroppers are modeled as a Poisson cluster process and a Poisson point process, respectively. UAVs adopt zero-forcing precoding to serve multiple ground users and emit artificial noise to combat eavesdropping. We derive the approximations for the coverage probability and secrecy probability of a typical user, with which we derive the secrecy throughput of the whole network. Numerical results show the analytical results can well approximate the simulation results. Impacts of parameters on the secrecy performance are shown.

Keyword :

Matern hard-core point process Physical layer security UAV networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2856-2861 .
MLA Lyu, Jiawei et al. "Secure UAV Random Networks With Minimum Safety Distance" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2856-2861 .
APA Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2856-2861 .
Export to NoteExpress RIS BibTex
On Covert Communication against Sequential Change-Point Detection EI SCIE
期刊论文 | 2021 , 67 (11) , 7285-7303 | IEEE Transactions on Information Theory
Abstract&Keyword Cite

Abstract :

We investigate covert communication under a sequential change-point detection (SCPD) framework, where a transmitter, Alice, attempts to communicate reliably with a receiver, Bob, over an additive white Gaussian noise channel, while simultaneously ensuring covertness (low probability of detection) with respect to an adversary, Willie. Different from the binary hypothesis test based detection framework considered in prior works where Willie collects all signal samples together and makes a decision in a batch manner, we view Willie's detection process as an SCPD process that works in a real-time manner. We establish a new criterion to evaluate the covertness of the communication between Alice and Bob, and investigate the performance of covert communication accordingly. Subject to the proposed constraint on covertness, we investigate the feasible transmit power and transmission duration under three SCPD algorithms, namely, the Shewhart test, the finite moving average chart (FMAC), and the cumulative sum (CUSUM) test, and characterize how the covert communication throughput scales with the average run length to false alarm (ARL2FA) of Willie's detector as the ARL2FA increases without bound. Our theoretical results can be viewed as upper bounds on the covert communication throughput that can be achieved, and we show that compared with the case where Willie performs the CUSUM test, Alice and Bob achieve a higher covert communication throughput if Willie performs the Shewhart test or the FMAC. © 1963-2012 IEEE.

Keyword :

Decoding Gaussian noise (electronic) Testing White noise

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection [J]. | IEEE Transactions on Information Theory , 2021 , 67 (11) : 7285-7303 .
MLA Huang, Ke-Wen et al. "On Covert Communication against Sequential Change-Point Detection" . | IEEE Transactions on Information Theory 67 . 11 (2021) : 7285-7303 .
APA Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection . | IEEE Transactions on Information Theory , 2021 , 67 (11) , 7285-7303 .
Export to NoteExpress RIS BibTex
Jamming Aided Covert Communication With Multiple Receivers EI SCIE
期刊论文 | 2021 , 20 (7) , 4480-4494 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

We consider that a transmitter covertly communicates with multiple receivers under the help of a friendly jammer. The messages intended for different receivers are transmitted in mutually orthogonal frequency bands. An adversary observes all these frequency bands aiming at detecting whether or not communication occurs, while the friendly jammer broadcasts jamming signals to degrade the detection performance of the adversary. We consider a block Rayleigh fading channel model and evaluate the performance of covert communication in two situations: 1) the wireless channels vary slowly such that the transmission ends within one channel coherent time block, and 2) the wireless channels vary fast such that the wireless channels have changed several times before the whole transmission is finished. In the former case, subject to a covertness constraint, we maximize the sum of the effective rates by optimizing the transmit power allocation and the transmission rate for each receiver. In the latter case, we take the channel training process into consideration, and subject to a covertness constraint, we maximize the sum of the ergodic rates by optimizing the power allocation and the pilot length. Though both of the two optimization problems are non-convex, we presented methods to find their global optimal solutions. Besides, we also present methods to find sub-optimal solutions with lower computational complexities. Numerical results are presented to evaluate the performance under the two situations.

Keyword :

Communication system security Covert communication Fading channels jamming Jamming power control Receivers resource allocation Resource management Transmitters Wireless communication wireless security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) : 4480-4494 .
MLA Huang, Ke-Wen et al. "Jamming Aided Covert Communication With Multiple Receivers" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 20 . 7 (2021) : 4480-4494 .
APA Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) , 4480-4494 .
Export to NoteExpress RIS BibTex
Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure EI SCIE
期刊论文 | 2021 , 20 (1) , 345-359 | IEEE Transactions on Wireless Communications
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in order to wiretap the data transmitted from a transmitter, Alice, to a receiver, Bob. We propose a new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses an intelligent reflecting surface (IRS) to reflect the pilot sent by Bob to Alice. The proposed new PCA scheme, referred to as IRS-PCA, increases the signal leakage from Alice to the IRS during the data transmission phase, which is then reflected by the IRS to Eve in order to improve the wiretapping capability of Eve. The proposed IRS-PCA scheme disables many existing countermeasures on PCA due to the fact that with IRS-PCA, Eve no longer needs to know the pilot sequence of Bob, and therefore, poses severe threat to the security of the legitimate wireless communication system. In view of this, the problems of 1) IRS-PCA detection and 2) secure transmission under IRS-PCA are considered in this paper. For IRS-PCA detection, a generalized cumulative sum (GCUSUM) detection procedure is proposed based on the framework of quickest detection, aiming at detecting the occurrence of IRS-PCA as soon as possible once it occurs. For secure transmission under IRS-PCA, a cooperative channel estimation scheme is proposed to estimate the channel of the IRS, based on which zero-forcing beamforming is designed to reduce signal leakage. © 2002-2012 IEEE.

Keyword :

Data transfer Electrical engineering Mobile telecommunication systems

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure [J]. | IEEE Transactions on Wireless Communications , 2021 , 20 (1) : 345-359 .
MLA Huang, Ke-Wen et al. "Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure" . | IEEE Transactions on Wireless Communications 20 . 1 (2021) : 345-359 .
APA Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure . | IEEE Transactions on Wireless Communications , 2021 , 20 (1) , 345-359 .
Export to NoteExpress RIS BibTex
Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage CPCI-S
会议论文 | 2021 | IEEE 93rd Vehicular Technology Conference (VTC-Spring)
Abstract&Keyword Cite

Abstract :

Millimeter-wave(Mmwave) networks with high directional antennas have enhanced security. However, eavesdroppers can still intercept confidential messages by residing in both signal main-lobe and side-lobe areas. This paper investigates the secrecy performance of artificial-noise (AN)-aided transmission in mmWave systems under the capacity-threshold on-off scheme in the presence of randomly distributed eavesdroppers, which utilizes AN to resist eavesdroppers in the side-lobe area. Considering the effects of mmWave channel characteristics, blockages, and directional antenna arrays, we derive the transmission probability (TP) and closed-form expression of secrecy outage probability (SOP) in the non-colluding eavesdropping scenario. What's more, we derive the analytical expression of SOP in the colluding eavesdropping scenario and its lower bound. Specifically, we characterize the impacts of various system parameters on the secrecy performance and verify the contribution of AN-jamming to inhibiting side-lobe information leakage, meanwhile, the optimal power allocation of AN is analyzed in non-colluding scenarios. Besides, our results reveal that with the narrower main beam and higher antenna gain, the secrecy performance is enhanced significantly. The analytical and numerical results show that the capacity-based transmission scheme with AN-jamming can effectively improve the secrecy performance of mmWave systems.

Keyword :

artificial noise blockage mmWave Physical layer security secrecy outage sector

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Haoyu , Ju, Ying , Pei, Qingqi et al. Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage [C] . 2021 .
MLA Wang, Haoyu et al. "Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage" . (2021) .
APA Wang, Haoyu , Ju, Ying , Pei, Qingqi , Wang, Hui-Ming . Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage . (2021) .
Export to NoteExpress RIS BibTex
Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection EI SCIE
期刊论文 | 2021 , 70 (3) , 2912-2916 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
WoS CC Cited Count: 9
Abstract&Keyword Cite

Abstract :

In this correspondence, we use double intelligent reflecting surface (IRS) assisted design to enhance the secrecy performance of wireless transmission. Different from the existing studies in the literature, the inter-surface signal reflection is considered in this work, which makes the formulated secrecy rate (SR) optimization problem difficult to tackle. In particular, to solve this problem, we propose a product Riemmanian manifold (PRM) based alternating optimization (AO) algorithm to jointly optimize the beamformer at transmitter as well as phase shift coefficients at double IRS, in which the PRM optimization algorithm is applied to optimize the phase shift coefficients at both IRSs simultaneously. Simulation results show that the proposed algorithm greatly enhance the SR compared with the existing benchmark schemes. And compared with conventional semi-definite relaxation based AO algorithm, the proposed PRM based AO algorithm can achieve much lower computational complexity as well as faster speed of convergence.

Keyword :

Alternating optimization Convergence intelligent reflecting surface inter-surface signal reflection Linear programming Manifolds MISO communication Optimization product Riemmanian manifold secrecy rate Transmitters Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Dong, Limeng , Wang, Hui-Ming , Bai, Jiale et al. Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2912-2916 .
MLA Dong, Limeng et al. "Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2912-2916 .
APA Dong, Limeng , Wang, Hui-Ming , Bai, Jiale , Xiao, Haitao . Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2912-2916 .
Export to NoteExpress RIS BibTex
Secure Cognitive Radio Communication via Intelligent Reflecting Surface EI SCIE
期刊论文 | 2021 , 69 (7) , 4678-4690 | IEEE TRANSACTIONS ON COMMUNICATIONS
WoS CC Cited Count: 16
Abstract&Keyword Cite

Abstract :

YYY In this paper, an intelligent reflecting surface (IRS) assisted spectrum sharing underlay cognitive radio (CR) wiretap channel (WTC) is studied, and we aim at enhancing the secrecy rate of secondary user in this channel subject to total power constraint at secondary transmitter (ST), interference power constraint (IPC) at primary receiver (PR) as well as unit modulus constraint at IRS. Due to extra IPC and eavesdropper (Eve) are considered, all the existing solutions for enhancing secrecy rate of IRS-assisted non-CR WTC as well as enhancing transmission rate in IRS-assisted CR channel without eavesdropper fail in this work. Therefore, we propose new numerical solutions to optimize the secrecy rate of this channel under full primary, secondary users' channel state information (CSI) and three different cases of Eve's CSI: full CSI, imperfect CSI with bounded estimation error, and no CSI. To solve the difficult non-convex optimization problem, an efficient alternating optimization (AO) algorithm is proposed to jointly optimize the beamformer at ST and phase shift coefficients at IRS. In particular, when optimizing the phase shift coefficients during each iteration of AO, a Dinkelbach based solution in combination with successive approximation and penalty based solution is proposed under full CSI and a penalty convex-concave procedure solution is proposed under imperfect Eve's CSI. For no Eve's CSI case, artificial noise (AN) aided approach is adopted to help enhancing the secrecy rate. Simulation results show that our proposed solutions for the IRS-assisted design greatly enhance the secrecy performance compared with the existing numerical solutions with and without IRS under full and imperfect Eve's CSI. And positive secrecy rate can be achieved by our proposed AN aided approach given most channel realizations under no Eve's CSI case so that secure communication also can be guaranteed. All of the proposed AO algorithms are guaranteed to monotonic convergence.

Keyword :

Cognitive radio CSI intelligent reflecting surface MISO secrecy rate

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) : 4678-4690 .
MLA Dong, Limeng et al. "Secure Cognitive Radio Communication via Intelligent Reflecting Surface" . | IEEE TRANSACTIONS ON COMMUNICATIONS 69 . 7 (2021) : 4678-4690 .
APA Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) , 4678-4690 .
Export to NoteExpress RIS BibTex
Detection of Hijacking DDoS Attack Based on Air Interface Traffic EI SCIE
期刊论文 | 2021 , 10 (10) , 2225-2229 | IEEE WIRELESS COMMUNICATIONS LETTERS
Abstract&Keyword Cite

Abstract :

Massive machine type communication (mMTC) network contains massive access devices, which increases the risk of distributed denial of service (DDoS) attacks. Especially, the DDoS attack launched by hijacked devices cannot be detected through traditional cryptography-based authentication because that the hijacked devices have legitimate identities. In this letter, we propose to exploit the characteristics of access traffic at the air interface to detect this kind of DDoS attack, and then identify the suspicious devices. We analyze both the characteristics of access traffic based on MTC traffic arrival model and the random access mechanism proposed by 3GPP to construct test statistics, and propose a sequential change point detection (SCPD) scheme to test whether there are anomalies as quickly as possible. After that, we identify the hijacked devices based on the abnormal traffic. Simulation experiments confirm the effectiveness of our detection scheme.

Keyword :

3GPP access traffic Authentication DDoS attack Delays Denial-of-service attack Device hijacking massive MTC network Object recognition Real-time systems sequential change point detection Uplink

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic [J]. | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) : 2225-2229 .
MLA Fu, Qing-Yi et al. "Detection of Hijacking DDoS Attack Based on Air Interface Traffic" . | IEEE WIRELESS COMMUNICATIONS LETTERS 10 . 10 (2021) : 2225-2229 .
APA Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic . | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) , 2225-2229 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 22 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:1441/188896282
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.