Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
313 result(s) for "secure transmission"
Sort by:
Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm
Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor networks subject to many limitations, such as resource limitation, channel openness, malicious attacks, and other problems. To address the above issues, we propose a routing scheme for underwater wireless networks based on a trust model and Void-Avoided algorithm. The proposed scheme establishes a trust model, evaluates the behavior of underwater nodes through direct trust, indirect trust, and environmental trust, and finds malicious nodes while taking into account evaluation of the channel, which provides support for the next data transmission event. The proposed scheme prioritizes the total cabling distance and introduces a two-hop availability checking model for data transmission, checking the nodes for voids and avoiding the void areas, to find the transmission path with the lowest energy consumption and lowest latency as much as possible. In this study, simulation experiments were conducted on the proposed scheme, and the results showed that the target scheme can effectively detect malicious nodes through anomalous behaviors and outperforms existing work in terms of malicious node detection rate, energy consumption, and end-to-end latency, and network performance.
An authorizable and preprocessable data transmission scheme based on elliptic curves
Current data security transmission schemes are based on the idea of signcryption, where the sender performs encryption and generates signatures within a single logical step. However, on one hand, the complexity of signing is relatively low, while the encryption and communication complexities for large amounts of data are high, leading to low overall transmission efficiency. On the other hand, once the receiver obtains the ciphertext, they can decrypt it, reducing the sender’s control over the data. Therefore, this paper proposes a data security transmission scheme that supports authorization and preprocessing. The scheme first preprocesses the computationally expensive data encryption and transmission operations, and then performs the authorization signature to improve efficiency. Specifically, based on the R value from Schnorr’s signature, the sender’s public key, and the receiver’s public key, a one-time public key is computed and used to encrypt the data before sending it to the receiver. The receiver can compute the corresponding one-time private key to decrypt and obtain the plaintext data, but only after receiving the s value from the sender’s Schnorr signature. Additionally, before the authorization signature s is published, the receiver cannot decrypt the data, ensuring both authorization unforgeability and data confidentiality, while also enhancing the sender’s control over the decryption timing. Experimental results show that for a 1KB data transmission, the execution times for the one-time public key generation algorithm, encryption algorithm, authorization algorithm, decryption algorithm, and signature verification algorithm were 3.34/28.37/0.58/3.32/4.58 ms, respectively, indicating high efficiency for each algorithm. Comparison tests show that for data sizes ranging from 50K to 1600K, using the preprocessing method can reduce execution time by about 68%.
Statistical analysis of enhanced SDEx encryption method based on BLAKE3 hash function
This paper presents a statistical analysis of the enhanced SDEx (Secure Data Exchange) encryption method, using a version that incorporates two session keys. This method has not previously been combined with the BLAKE3 hash function. The statistical analysis was conducted using the NIST Statistical Test Suite. Several real-world sample files were encrypted using the proposed method and then subjected to statistical analysis through selected tests from the NIST suite. These tests aimed to determine whether the resulting ciphertexts meet the criteria for pseudorandomness. Additionally, compression tests were performed using WinRAR, which confirmed that the ciphertexts are not compressible.
Underlying Security Transmission Design for Orthogonal Time Frequency Space (OTFS) Modulation
With the aim of ensuring secure transmission in high-mobility wireless scenarios, this paper proposes a 2D permutation-aided Orthogonal Time Frequency Space (OTFS) secure transmission scheme, which uses the Gosudarstvennyi Standard (GOST) algorithm to perform disturbance control on the OTFS modulation domain. Furthermore, we develop an improved SeLective Mapping (SLM) algorithm, which can significantly improve the Peak-to-Average Power Ratio (PAPR) problem with very low complexity. In addition, we carry out the security analysis, investigating the proposed scheme’s resistance performance to a range of effective attacks. Finally, our numerical results show that our proposed transmission scheme can guarantee the underlying security property of OTFS.
Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping
In a cell-free massive multiple-input multiple-output (MIMO) system without cells, it is assumed that there are smart jammers and disrupters (SJDs) that attempt to interfere with and eavesdrop on the downlink communications of legitimate users. A secure transmission scheme based on multiple intelligent reflecting surfaces (IRSs) and artificial noise (AN) is proposed. First, an access point (AP) selection strategy based on user location information is designed, which aims to determine the set of APs serving users. Then, a joint optimization framework based on the block coordinate descent (BCD) algorithm is constructed, and a non-convex optimization solution based on the univariate function optimization and semi-definite relaxation (SDR) is proposed with the aim of maximising the minimum achievable secrecy rate for users. By solving the univariate function maximisation problem, the multi-variable coupled non-convex problem is transformed into a solvable convex problem, obtaining the optimal AP beamforming, AN matrix and IRS phase shift matrix. Specifically, in a single-user scenario, the scheme of multiple intelligent reflecting surfaces combined with artificial noise can improve the user’s achievable secrecy rate by about 11% compared to the existing method (single intelligent reflective surface combined with artificial noise) and about 2% compared to the scheme assisted by multiple intelligent reflecting surfaces without artificial noise assistance.
A Lossless-Recovery Secret Distribution Scheme Based on QR Codes
The visual cryptography scheme (VCS) distributes a secret to several images that can enhance the secure transmission of that secret. Quick response (QR) codes are widespread. VCS can be used to improve their secure transmission. Some schemes recover QR codes with many errors. This paper uses a distribution mechanism to achieve the error-free recovery of QR codes. An error-correction codeword (ECC) is used to divide the QR code into different areas. Every area is a key, and they are distributed to n shares. The loss of any share will make the reconstructed QR code impossible to decode normally. Stacking all shares can recover the secret QR code losslessly. Based on some experiments, the proposed scheme is relatively safe. The proposed scheme can restore a secret QR code without errors, and it is effective and feasible.
Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission
The authors propose a secure intelligent reflecting surface (IRS) assisted transmission system in the presence of a ground eavesdropper, where the source in the ground transmits confidential information to unmanned aerial vehicle (UAV), IRS is deployed to promote the transmission rate of the source to UAV. Closed‐form expression for secure transmission non‐outage probability is derived, and secure transmission performance is analyzed. Simulation validates the correctness of the derivation. Compared with benchmarks, results show that the IRS can improve the secure transmission of ground to UAV.
Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things
The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent security transmission strategy with sensor-transmission-computing linkage is proposed in this paper. The primary objective of this strategy is to maximize the confidentiality capacity of the system. To tackle this, an optimization problem is formulated, taking into consideration interruption probability and interception probability as constraints. To efficiently solve this optimization problem, a low-complexity algorithm rooted in deep reinforcement learning is designed, which aims to derive a suboptimal solution for the problem at hand. Ultimately, through simulation results, the validity of the proposed strategy in guaranteed communication security, stability, and timeliness is substantiated. The results confirm that the proposed intelligent security transmission strategy significantly contributes to the safeguarding of communication integrity, system stability, and timely data delivery.
Secure transmission of simultaneous wireless information and power transfer system for Internet of things
Due to the excellent broadcasting characteristics of radio signals, simultaneous wireless information and power transfer (SWIPT) can transmit both information and energy, and provide users with stable power supply. Wireless channel has the characteristics of openness, which will lead to the leakage of information in the SWIPT system. It is one of the research hotspots in the industry to ensure the secure transmission of information in SWIPT system where there are differences in the transmission of energy and information. This paper proposes an ‘information-energy’ dynamic switching opportunistic secure transmission scheme. First, a model considering three factors of multi-cell, multi-user and multiple eavesdropper is established which assumes that the user adopts a time-domain switching receiver that collects energy in a nonlinear model. Then, combined with the time-varying wireless channel, a dynamic information energy switching transmission scheme based on signal-to-interference noise ratio threshold is proposed. Finally, the energy and information transmission performance of the scheme are comprehensively analysed.
Secure transmission performance analysis of multi-hop cognitive relay radio networks with energy harvesting and artificial noise aided
According to the current challenges of spectrum scarcity, poor wireless communication quality, insufficient energy supply and physical layer security, this paper proposes a secure transmission scheme for multi-hop cognitive relay radio networks based on the underlay mode. When a passive eavesdropper E exists in the transmission environment, secondary source S needs to transmit secrecy information to the legitimate destination D. For the underlay spectrum sharing strategy, S and cognitive relays access the licensed spectrum concurrently with primary transmission by controlling the interference to the primary networks under the interference threshold. In order to achieve better communication between S and D, this paper adds some secondary relays to assist cognitive communication, and these secondary relays are equipped with energy harvesting (EH) devices that will collect energy from the surrounding radio frequency (RF) environment based on the time switching strategy. Then, this energy will supply consumption of decoding and forwarding (DF) the received signal. In the process of forwarding the signal through the secondary relays to D, artificial noise is added to the last relay so that D can successfully receive the message while preventing E from eavesdropping on the secret message. This paper analyzes the influence of target data rates, energy harvesting times, interference thresholds, and other factors on secrecy outage probability (SOP), secrecy capacity (SC), and energy efficiency (EE).