LIVIVO - The Search Portal for Life Sciences

zur deutschen Oberfläche wechseln
Advanced search

Search results

Result 1 - 5 of total 5

Search options

  1. Article ; Online: A Communication Anti-Jamming Scheme Assisted by RIS with Angular Response

    Jinpeng Wang / Wenyu Jiang / Kaizhi Huang / Xiaoli Sun

    Entropy, Vol 25, Iss 12, p

    2023  Volume 1638

    Abstract: By optimizing the reconfigurable intelligent surface (RIS) reflection coefficients, the channel capacity of legitimate users can be increased, thereby enhancing the anti-jamming performance of communication systems. However, existing studies on RIS- ... ...

    Abstract By optimizing the reconfigurable intelligent surface (RIS) reflection coefficients, the channel capacity of legitimate users can be increased, thereby enhancing the anti-jamming performance of communication systems. However, existing studies on RIS-assisted anti-jamming assume that there is no coupling between the RIS reflection coefficients and the incident angle of electromagnetic (EM) waves, which is quite unreasonable. Therefore, we consider the effect of the incident angle of EM waves on the reflection coefficients of the RIS and propose a communication anti-jamming scheme assisted by an RIS with angular response. Specifically, a problem is formulated to optimize the RIS reflection coefficients so that the legitimate signal is amplified, but the jamming signal is attenuated, thus enhancing the legitimate channel capacity. However, the coupling of the EM incident angle and the RIS reflection coefficients causes the problem to be non-convex. To tackle this problem, we equivalently transform the RIS reflection coefficients optimization problem into a quadratically constrained quadratic programming (QCQP) problem using the complex Taylor expansion and the multidimensional complex quadratic transform (MCQT) and solve it utilizing the alternating direction method of the multipliers (ADMM) algorithm. The simulation results reveal that, compared to other schemes supported by RIS without angular response, the proposed scheme is able to achieve a significant improvement in the anti-jamming performance.
    Keywords channel capacity ; reconfigurable intelligent surface ; anti-jamming ; angular response ; Science ; Q ; Astrophysics ; QB460-466 ; Physics ; QC1-999
    Subject code 535
    Language English
    Publishing date 2023-12-01T00:00:00Z
    Publisher MDPI AG
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  2. Article ; Online: Intelligent Reflecting Surface–Assisted Wireless Secret Key Generation against Multiple Eavesdroppers

    Ya Liu / Kaizhi Huang / Xiaoli Sun / Shaochuan Yang / Liang Wang

    Entropy, Vol 24, Iss 446, p

    2022  Volume 446

    Abstract: In this paper, we propose an improved physical layer key generation scheme that can maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the legitimate user aiming at improving its signal-to-noise ratio (SNR). We ... ...

    Abstract In this paper, we propose an improved physical layer key generation scheme that can maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the legitimate user aiming at improving its signal-to-noise ratio (SNR). We consider the scenario of multiple input single output (MISO) against multiple relevant eavesdroppers. We elaborately design and optimize the reflection coefficient matrix of IRS elements that can improve the legitimate user’s SNR through IRS passive beamforming and deteriorate the channel quality of eavesdroppers at the same time. We first derive the lower bound expression of the achievable key capacity, then solve the optimization problem based on semi-definite relaxation (SDR) and the convex–concave procedure (CCP) to maximize the secret key capacity. Simulation results show that our proposed scheme can significantly improve the secret key capacity and reduce hardware costs compared with other benchmark schemes.
    Keywords Intelligent reflecting surface ; physical layer secret key generation ; semi-definite relaxation ; convex–concave procedure ; Science ; Q ; Astrophysics ; QB460-466 ; Physics ; QC1-999
    Subject code 003
    Language English
    Publishing date 2022-03-01T00:00:00Z
    Publisher MDPI AG
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  3. Article ; Online: Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface

    Jie Yang / Xinsheng Ji / Kaizhi Huang / Xiaoli Sun / Yi Wang

    Security and Communication Networks, Vol

    2021  Volume 2021

    Abstract: In this paper, secure transmission in a simultaneous wireless information and power transfer technology-enabled heterogeneous network with the aid of multiple IRSs is investigated. As a potential technology for 6G, intelligent reflecting surface (IRS) ... ...

    Abstract In this paper, secure transmission in a simultaneous wireless information and power transfer technology-enabled heterogeneous network with the aid of multiple IRSs is investigated. As a potential technology for 6G, intelligent reflecting surface (IRS) brings more spatial degrees of freedom to enhance physical layer security. Our goal is to maximize the secrecy rate by carefully designing the transmit beamforming vector, artificial noise vector, and reflecting coefficients under the constraint of quality-of-service. The formulated problem is hard to solve due to the nonconcave objective function as well as the coupling variables and unit-modulus constraints. Fortunately, by using alternating optimization, successive convex approximation, and sequential Rank-1 constraint relaxation approach, the original problem is transformed into convex form and a suboptimal solution is achieved. Numerical results show that the proposed scheme outperforms other existing benchmark schemes without IRS and can maintain promising security performance as the number of terminals increases with lower energy consumption.
    Keywords Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Subject code 003
    Language English
    Publishing date 2021-01-01T00:00:00Z
    Publisher Hindawi-Wiley
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  4. Article ; Online: Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

    Shaoyu Wang / Kaizhi Huang / Xiaoming Xu / Xiaoyan Hu / Jing Yang / Liang Jin

    Entropy, Vol 24, Iss 488, p

    2022  Volume 488

    Abstract: Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless ... ...

    Abstract Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception <math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>2</mn><mrow><mo>−</mo><mfrac><mn>1</mn><mn>2</mn></mfrac><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></msup></semantics></math> , where <math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></semantics></math> is the ...
    Keywords unconditional authentication ; physical layer key generation ; wireless communication ; Science ; Q ; Astrophysics ; QB460-466 ; Physics ; QC1-999
    Subject code 303
    Language English
    Publishing date 2022-03-01T00:00:00Z
    Publisher MDPI AG
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  5. Article ; Online: A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys

    Xiaoyan Hu / Liang Jin / Kaizhi Huang / Keming Ma / Changcheng Song / Shuaifang Xiao

    Security and Communication Networks, Vol

    2020  Volume 2020

    Abstract: Due to the channel estimation error, most of the physical layer secret key generation schemes need information reconciliation to correct error key bits, resulting in reduced efficiency. To solve the problem, this work proposes a novel secure ... ...

    Abstract Due to the channel estimation error, most of the physical layer secret key generation schemes need information reconciliation to correct error key bits, resulting in reduced efficiency. To solve the problem, this work proposes a novel secure communication scheme based on a equivalent interference channel. Different keys generated from imperfect channel state information are directly applied to signal scrambling and descrambling, which is equivalent to the process of a signal passing through an interference channel. Legitimate communication parties can reduce interference with the help of similar keys and channel coding without sending additional signals, while the eavesdropper channel is deteriorated due to the spatial decorrelation. For this kind of schemes, we first establish a discrete memoryless broadcast channel model to derive the expressions of bit error rate (BER), channel capacity, and security capacity for performance analysis. Simulation results verify the derivations that the proposed scheme achieves secure communication with a correlated eavesdropping channel and has a higher upper bound of transmission rate. Furthermore, we design a new metric to evaluate the efficiency and the result shows that the proposed scheme has superior performance on error reconciliation efficiency, despite its slight increase in BER.
    Keywords Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Subject code 003
    Language English
    Publishing date 2020-01-01T00:00:00Z
    Publisher Hindawi-Wiley
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

To top