Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (8)

Search Parameters:
Keywords = colluding eavesdroppers

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 723 KiB  
Article
Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers
by Jiaxin Xu, Yuyang Peng, Runlong Ye, Wei Gan, Fawaz AL-Hazemi and Mohammad Meraj Mirza
Mathematics 2024, 12(10), 1597; https://doi.org/10.3390/math12101597 - 20 May 2024
Viewed by 1174
Abstract
An active intelligent reflecting surface (IRS)-assisted, secure, multiple-input–single-output communication method is proposed in this paper. In this proposed scheme, a practical and unfavorable propagation environment is considered by assuming that multiple colluding eavesdroppers (Eves) coexist. In this case, we jointly optimize the beamformers [...] Read more.
An active intelligent reflecting surface (IRS)-assisted, secure, multiple-input–single-output communication method is proposed in this paper. In this proposed scheme, a practical and unfavorable propagation environment is considered by assuming that multiple colluding eavesdroppers (Eves) coexist. In this case, we jointly optimize the beamformers of the base station (BS) and the active IRS for the formulated sum secrecy rate (SSR) maximization problem. Because the formulated problem is not convex, we apply the alternating optimization method to optimize the beamformers for maximizing the SSR. Specifically, we use the semi-definite relaxation method to solve the sub-problem of the beamforming vector of the BS, and we use the successive convex approximation method to solve the sub-problem of the power amplification matrix of the active IRS. Based on the solutions obtained using these stated methods, numerical results show that deploying an active IRS is superior compared to the cases of a passive IRS and a non-IRS for improving the physical layer security of wireless communication with multiple colluding Eves under different settings, such as the numbers of users, Eves, reflecting elements, and BS antennas as well as the maximum transmit power budget at the BS. Full article
Show Figures

Figure 1

19 pages, 2438 KiB  
Article
Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers
by Fan Wang, Cuiran Li, Jianli Xie, Lin Su, Yadan Liu and Shaoyi Du
Electronics 2024, 13(4), 777; https://doi.org/10.3390/electronics13040777 - 16 Feb 2024
Cited by 2 | Viewed by 1240
Abstract
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the [...] Read more.
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link. Full article
(This article belongs to the Special Issue Recent Advancements in Signal and Vision Analysis)
Show Figures

Figure 1

16 pages, 2836 KiB  
Article
On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach
by Kehinde Oluwasesan Odeyemi, Pius Adewale Owolawi and Oladayo Olufemi Olakanmi
Electronics 2022, 11(20), 3302; https://doi.org/10.3390/electronics11203302 - 13 Oct 2022
Cited by 2 | Viewed by 1820
Abstract
Unmanned aerial vehicle (UAV)-based relaying has been considered to offer an excellent performance due to its flexible mobility, on-demand deployment, and cost effectiveness compared to conventional ground-relaying methods. This paper studies the secrecy performance of a dual-hop UAV-assisted relay network, where the base [...] Read more.
Unmanned aerial vehicle (UAV)-based relaying has been considered to offer an excellent performance due to its flexible mobility, on-demand deployment, and cost effectiveness compared to conventional ground-relaying methods. This paper studies the secrecy performance of a dual-hop UAV-assisted relay network, where the base station communicates with the ground user via a low altitude UAV in the presence of randomly distributed eavesdroppers. A stochastic geometric approach is employed to model the spatial locations of the ground user and the eavesdroppers which follows a Homogeneous Poisson Point Process (HPPP). Based on this theory, cumulative distribution functions (CDF) of the ground user and the eavesdroppers are obtained. Considering the decode-and-forward (DF) relay protocol, the CDF equivalent end-to-end instantaneous signal-to-noise ratio (SNR) of the network is derived. To characterize the network secrecy performance, the exact analytical expressions for the network security outage probability (SOP), the strictly positive secrecy capacity (SPSC), and the average secrecy capacity (ASC) are derived. Moreover, a Monte-Carlo simulation is provided to show the accuracy of the derived analytical expressions. The results depict that both the network and channel parameters that include the fading parameter, the density of the eavesdroppers, the average SNR of the B-to-U link, the average SNR of the U-to-E link, the UAV altitude, and the coverage radius have a significant influence on the network secrecy performance. Full article
Show Figures

Figure 1

15 pages, 15121 KiB  
Article
Secure Transmission of Terahertz Signals with Multiple Eavesdroppers
by Yuqian He, Lu Zhang, Shanyun Liu, Hongqi Zhang and Xianbin Yu
Micromachines 2022, 13(8), 1300; https://doi.org/10.3390/mi13081300 - 12 Aug 2022
Cited by 11 | Viewed by 1960
Abstract
The terahertz (THz) band is expected to become a key technology to meet the ever-increasing traffic demand for future 6G wireless communications, and a lot of efforts have been paid to develop its capacity. However, few studies have been concerned with the transmission [...] Read more.
The terahertz (THz) band is expected to become a key technology to meet the ever-increasing traffic demand for future 6G wireless communications, and a lot of efforts have been paid to develop its capacity. However, few studies have been concerned with the transmission security of such ultra-high-speed THz wireless links. In this paper, we comprehensively investigate the physical layer security (PLS) of a THz communication system in the presence of multiple eavesdroppers and beam scattering. The method of moments (MoM) was adopted so that the eavesdroppers’ channel influenced by the PEC can be characterized. To establish a secure link, the traditional beamforming and artificial noise (AN) beamforming were considered as transmission schemes for comparison. For both schemes, we analyzed their secrecy transmission probability (STP) and ergodic secrecy capacity (ESC) in non-colluding and colluding cases, respectively. Numerical results show that eavesdroppers can indeed degrade the secrecy performance by changing the size or the location of the PEC, while the AN beamforming technique can be an effective candidate to counterbalance this adverse effect. Full article
(This article belongs to the Special Issue Broadband Terahertz Devices and Communication Technologies)
Show Figures

Figure 1

16 pages, 791 KiB  
Article
Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis
by Deemah Tashman and Walaa Hamouda
Future Internet 2021, 13(8), 205; https://doi.org/10.3390/fi13080205 - 4 Aug 2021
Cited by 11 | Viewed by 3055
Abstract
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ [...] Read more.
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping. Full article
Show Figures

Figure 1

11 pages, 559 KiB  
Article
Cooperative Secure Transmission in MISO-NOMA Networks
by Yang Chen, Zhongpei Zhang and Bingrui Li
Electronics 2020, 9(2), 352; https://doi.org/10.3390/electronics9020352 - 19 Feb 2020
Cited by 3 | Viewed by 3037
Abstract
In this paper, we investigate cooperative secure transmission in non-orthogonal multiple access (NOMA) networks where a source (Alice) intends to transmit confidential messages to one legitimate user with high-level security requirement (LU1), and serve another normal one (LU2) simultaneously. In order to enhance [...] Read more.
In this paper, we investigate cooperative secure transmission in non-orthogonal multiple access (NOMA) networks where a source (Alice) intends to transmit confidential messages to one legitimate user with high-level security requirement (LU1), and serve another normal one (LU2) simultaneously. In order to enhance the transmission security, a cooperative jammer (Charlie) is employed to confuse multiple non-colluding eavesdroppers (Eves). Taking both secrecy outage restriction of LU1 and the desired quality of service (QoS) requirement of LU2 into consideration, we propose an adaptive power allocation strategy for maximizing secrecy rate. Numerical results are provided to validate that our proposed scheme significantly outperforms the conventional NOMA secure transmission scheme. Full article
(This article belongs to the Special Issue Cooperative Communications for Future Wireless Systems)
Show Figures

Figure 1

19 pages, 805 KiB  
Article
Secure Transmission for Buffer-Aided Relay Networks in the Internet of Things
by Chen Wei, Wendong Yang and Yueming Cai
Appl. Sci. 2019, 9(21), 4506; https://doi.org/10.3390/app9214506 - 24 Oct 2019
Viewed by 2023
Abstract
This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) [...] Read more.
This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

21 pages, 334 KiB  
Article
Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes
by Yonglei Yao, Jingfa Liu and Neal N. Xiong
Sensors 2014, 14(11), 21174-21194; https://doi.org/10.3390/s141121174 - 10 Nov 2014
Cited by 12 | Viewed by 4824
Abstract
Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In [...] Read more.
Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor’s raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Back to TopTop