Yunhao JiangSiqi LiuMinyang LiNan Zhao...
934-947页查看更多>>摘要:With the boom of the communication systems on some independent platforms(such as satellites,space stations,airplanes,and vessels),co-site interference is becoming prominent.The adaptive interference cancellation method has been adopted to solve the co-site interference problem.But the broadband interference cancellation perfor-mance of traditional Adaptive Co-site Interference Cancellation System(ACICS)with large delay mismatching and antenna sway is relatively poor.This study put forward an Adaptive Co-site Broadband Interference Cancellation System With Two Auxiliary Channels(ACBICS-2A).The system model was established,and the steady state weights and Interference Cancellation Ratio(ICR)were deduced by solving a time-varying differential equation.The relationship of ICR,system gain,modulation factor,interference signal bandwidth and delay mismatching degree was acquired through an in-depth analysis.Compared with traditional adaptive interference cancellation system,the proposed ACBICS-2A can improve broadband interference cancellation ability remarkably with large delay mismatching and antenna sway for the effect of auxiliary channel.The maximum improved ICR is more than 25 dB.Finally,the theoretical and simulation results were verified by experiments.
Yezeng WuLixia XiaoYiming XieGuanghua Liu...
948-955页查看更多>>摘要:In this paper,efficient signal detectors are designed for Orthogonal Time Frequency Space(OTFS)modulation with Index Modulation(IM)systems.Firstly,the Minimum Mean Squared Error(MMSE)based linear equalizer and its corresponding soft-aided decision are studied for OTFS-IM.To further improve the performance,a Vector-by-Vector-aided Message Passing(W-MP)detector and its associated soft-decision are proposed,where each IM symbol is considered an entire vector utilized for message calculation and passing.Simulation results are shown that the OTFS-IM system relying on the proposed detectors is capable of providing considerable Bit Error Rate(BER)performance gains over the OTFS and Orthogonal Frequency Division Multiplex(OFDM)with IM systems.
Bohao CaoZheng XiangPeng RenQiao Li...
956-964页查看更多>>摘要:Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.
Yourong ChenHao ChenZhenyu XiongBanteng Liu...
973-988页查看更多>>摘要:The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the de-rivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation re-sults show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
Kumar Sekhar RoySubhrajyoti DebHemanta Kumar Kalita
989-1000页查看更多>>摘要:The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and adminis-trators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-of-service attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
Chi-Bao LeDinh-Thuan DoMiroslav Voznak
1001-1013页查看更多>>摘要:In order to improve the Physical Layer Security(PLS)perspective,this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access(NOMA)system in two practical situations.In the pro-posed schemes,the untrusted user intercepts information transmitted to the far user,or the external eavesdropper overhears confidential information sent to the far user in the context of NOMA technique.Unlike the conventional NOMA systems,this paper emphasizes the actual situations of the existence of actual illegal users and legitimate users,especially the reasonable use of relay selection architecture to improve the confidentiality performance.To evaluate the security properties of the proposed scheme,a comprehensive analysis of the Security Outage Probability(SOP)performance is first performed,and then the corresponding SOP asymptotic expressions are derived for real scenarios related to eavesdroppers and untrusted users.Numerical results are performed to verify the analysis in terms of the secure performance metric.
Xuefei ZhangJunjie LiuYijing LiQimei Cui...
1014-1023页查看更多>>摘要:Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may result in the single point of failure once the controller breaks down or is under attack.To tackle such problems,our goal in this paper is to develop a blockchain-based package delivery ridesharing system,where decentralization is adopted to remove intermediaries and direct transactions between the providers and the requestors are allowed.To complete the matching process under decentralized structure,an Event-Triggered Distributed Deep Rein-forcement Learning(ETDDRL)algorithm is proposed to generate/update the real-time ridesharing orders for the new coming ridesharing requests from a local view.Simulation results reveal the vast potential of the ETDDRL matching algorithm under the blockchain framework for the promotion of the ridesharing profits.Finally,we develop an application for Android-based terminals to verify the ETDDRL matching algorithm.
Xiaodong ZhuangXiangrong Tong
1024-1034页查看更多>>摘要:The development of the Internet of Things(IoT)has brought great convenience to people.However,some in-formation security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Average-based Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.
Yuanni LiuLing PanShanzhi Chen
1035-1047页查看更多>>摘要:In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing security-threat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata asso-ciation model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time.