• 제목/요약/키워드: secure communications

검색결과 486건 처리시간 0.031초

MDS Coded Caching for Device-to-Device Content Sharing Against Eavesdropping

  • Shi, Xin;Wu, Dan;Wang, Meng;Yang, Lianxin;Wu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4484-4501
    • /
    • 2019
  • In this paper, we put forward a delay-aware secure maximum distance separable (MDS) coded caching scheme to resist the eavesdropping attacks for device-to-device (D2D) content sharing by combining MDS coding with distributed caching. In particular, we define the average system delay to show the potential coupling of delay-content awareness, and learn the secure constraints to ensure that randomly distributed eavesdroppers cannot obtain enough encoded packets to recover their desired contents. Accordingly, we model such a caching problem as an optimization problem to minimize the average system delay with secure constraints and simplify it to its convex relaxation. Then we develop a delay-aware secure MDS coded caching algorithm to obtain the optimal caching policy. Extensive numerical results are provided to demonstrate the excellent performance of our proposed algorithm. Compared with the random coded caching scheme, uniform coded caching scheme and popularity based coded caching scheme, our proposed scheme has 3.7%, 3.3% and 0.7% performance gains, respectively.

Authentication and Key Agreement Protocol for Secure End-to-End Communications on Mobile Networks

  • Park, Jeong-Hyun;Kim, Jin-Suk;Kim, Hae-Kyu;Yang, Jeong-Mo;Yoo, Seung-Jae
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.256-259
    • /
    • 2003
  • This paper presents mutual authentication scheme between user and network on mobile communications using public key scheme based on counter, and simultaneously shows key agreement between user and user using random number for secure communications. This is also a range of possible solutions to authentication and key agreement problem-authentication and key agreement protocol based on nonce and count, and secure end-to-end protocol based on the function Y=f(.)$\^$1/, C$\^$i/ is count of user I, and f(.) is one way function.

  • PDF

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels

  • Huang, Boyang;Kong, Zhengmin;Fang, Yanjun;Jin, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1904-1921
    • /
    • 2019
  • In this paper, we investigate the problem of secure communications in multiple-input-multiple-output interference networks from the perspective of physical layer security. Specifically, the legitimate transmitter-receiver pairs are divided into different categories of active and inactive. To enhance the security performances of active pairs, inactive pairs serve as cooperative jammers and broadcast artificial noises to interfere with the eavesdropper. Besides, active pairs improve their own security by using joint transceivers. The encoding of active pairs and inactive pairs are designed by maximizing the difference of mean-squared errors between active pairs and the eavesdropper. In detail, the transmit precoder matrices of active pairs and inactive pairs are solved according to game theory and linear programming respectively. Experimental results show that the proposed algorithm has fast convergence speed, and the security performances in different scenarios are effectively improved.

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

4세대이동통신 기술개발전략 분석 (An Analysis of the 4G Mobile Communications Technology Development Strategy in Korea)

  • 노일수;엄기용;유영신;이병남
    • 기술경영경제학회:학술대회논문집
    • /
    • 기술경영경제학회 2002년도 제21회 하계학술발표회 논문집
    • /
    • pp.257-268
    • /
    • 2002
  • Korean mobile communications industry has been a main locomotive of the drastic development of Korean IT industry and became one of core industries in national economy. To secure strong competitiveness of mobile communications industry, smooth cooperation should be reconsidered among government, universities, research institutions, and private companies. Future mobile communications technology will be evolved from IMT-2000 to system upgrade, 3.5G and 4G. And the goals of technology development are provision of mobile multimedia services based on better mobility and higher data speed rates. Therefore, Korea's technology development strategies of mobile communications should be focused on intensifying bondage of international cooperation, strengthening standardization activities, and enhancing core technology development capability to secure IPR.

  • PDF

이동성과 보안성 있는 멀티케스트 통신을 위한 군용 그룹 키 관리 (Military Group Key Management for Mobile and Secure Multicast Communications)

  • 정윤찬
    • 한국통신학회논문지
    • /
    • 제35권6B호
    • /
    • pp.977-983
    • /
    • 2010
  • 군용 네트워크에서는 이동성과 보안성을 지원하기 위하여 네트워크의 물리적 구성 형태와 상관없이 IPSec ESP 터널들이 Full mesh 형태로 IPSec 장치들을 연결하고 있으며 이 장치들 간에는 멀티케스트 통신이 필요하다. IPSec 장치들은 변화하는 IPSec 터널들을 지원하기 위하여 멀티케스트 그룹키를 동적으로 갱신시킬 수 있어야 한다. 또 특정한 그룹을 형성하는 전술 단말 측면에서도 그룹 구성원 간에 보안성 있는 멀티케스트 통신을 제공해 주어야 한다. 이러한 단말 그룹 구성원의 이동성을 지원하기 위해서는 멀티케스트 그룹 키가 동적으로 갱신되어야만 한다. 본 논문에서는 기존의 Diffie-Hellman (DH) 키 교환 방식 기술과 키 Tree 기술을 활용하여 동적인 상황변화에 따라 보안성 있게 그룹 키를 관리할 수 있도록 하는 방법을 제시한다. 제시하는 동적인 Tree 기반 키관리의 장점은 변화가 심한 그룹 구성원이 서로 상대방으로부터 주기적으로 상황 정보를 받도록 하여 변화하는 상황에 맞추어 효과적으로 그룹 키를 갱신할 수 있다는 점이다.

해상에서 실시간 TCP 링크관절 보안통신 연구 (A Study of TCP LINK based Real-Time Secure Communication Research in the Ocean)

  • 유재원;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.250-253
    • /
    • 2014
  • 해상에서 이동하는 선박들은 가용 채널의 제한으로 지상과의 통신에 많은 제한이 발생하고 있다. 지상에선 무선 중계 시설, 유선 등 기반통신망을 통해 장거리 통신이 가능하게 된다. 또한, 공중에서 운행하는 항공기도 지상 기반통신망 및 고도에 따라 장거리 직선거리(LOS : Line of Sight) 통신이 가능하다. 반면, 해상에서는 해수면까지 직선거리 통신이 제한되기 때문에 위성을 통하거나, 수중에 설치된 통신 중계기기를 통한 통신방식이 연구되어 왔다. 하지만, 위성 혹은 수중 중계방식은 지상시설과 동일 수준의 보안유지 및 대역폭 확보가 제한된다. 본 논문에서는 TCP 기반 링크관절을 이용한 실시간 해상 보안통신에 대해 연구하였다. 열악한 해상 통신환경에서 실시간 통신 및 보안을 제공할 수 있는 링크관절을 제안한다. 본 연구를 통해 해상에서 보다 안전하고 편리하게 통신을 할 수 있는 방안을 제시하였다.

  • PDF