Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access


    Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio

    Baofeng Ji1,2,3,4,*, Yifan Liu1,2,3,4, Tingpeng Li1, Ling Xing2, Weixing Wang2, Shahid Mumtaz5, Xiaolong Shang6, Wanying Liu2, Congzheng Han4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 679-689, 2024, DOI:10.32604/cmes.2023.028667

    Abstract With the development of information technology, more and more devices are connected to the Internet through wireless communication to complete data interconnection. Due to the broadcast characteristics of wireless channels, wireless networks have suffered more and more malicious attacks. Physical layer security has received extensive attention from industry and academia. MIMO is considered to be one of the most important technologies related to physical layer security. Through beamforming technology, messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users. Combining the… More >

  • Open Access


    Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach

    Yanqiu Chen, Xiaopeng Ji*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 531-553, 2023, DOI:10.32604/cmes.2023.024531

    Abstract Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers from ubiquitous security threats due to the broadcast nature of the wireless medium. In this paper, we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security, respectively. To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper, their interactions are modeled as a two-person zero-sum game. The existence of the Nash equilibrium of the proposed game models is proved, and the pure strategy Nash equilibrium and mixed-strategy Nash… More >

  • Open Access


    Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing

    V. Balaji, P. Selvaraj*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2015-2027, 2023, DOI:10.32604/iasc.2023.029260

    Abstract Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers. It facilitates the benefits of the network edge with the maximized probability of offering interaction with the cloud. However, the fog computing characteristics are susceptible to counteract the challenges of security. The issues present with the Physical Layer Security (PLS) aspect in fog computing which included authentication, integrity, and confidentiality has been considered as a reason for the potential issues leading to the security breaches. In this work, the Octonion Algebra-inspired Non- Commutative Ring-based Fully Homomorphic Encryption Scheme… More >

Displaying 1-10 on page 1 of 3. Per Page