首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper investigates the physical layer security of an intelligent reflecting surface (IRS) aided non-orthogonal multiple access (NOMA) networks, where a remote user is regarded as an eavesdropper to intercept the information of nearby user. To evaluate the security performance of IRS-aided NOMA networks, a problem of maximizing achievable secrecy rate is formulated via jointly optimizing the beamforming and phase shifting. More specifically, we aim to tackle the non-convex problem by optimizing beamforming vector as well as phase shifting matrix with the assistance of block coordinate descent (BCD) and minorization maximization (MM) algorithms. Numerical results illustrate that: 1) The secrecy rates of IRS-aided NOMA with BCD and MM algorithms are superior to that of orthogonal multiple access schemes; 2) With increasing the number of reflecting elements, the secrecy rates of IRS-aided NOMA networks are achieved carefully; and 3) The IRS-aided NOMA networks are capable of relieving the transmission pressure of base station.  相似文献   

2.
In this paper, we evaluate the secrecy performance of an intelligent reflecting surface (IRS)-assisted device-to-device (D2D) communication in spectrum-shared cellular networks. To this end, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the asymptotic SOP in the presence of multiple eavesdroppers. In the continue, in order to dynamically access the spectrum band of the licensed users, we define the optimization problem of secrecy spectrum resource allocation to minimize the SOP as a mixed-integer linear programming (MILP) problem. Then, the globally optimal solutions to this problem are obtained by using the Hungarian algorithm. Numerical analyses show that increasing the reflective elements of IRS can improve the secrecy performance.  相似文献   

3.
As an important part of the intelligent transportation system (ITS), vehicular networks can provide drivers and passengers with more comfortable and convenient services such as efficient traffic management and infotainment. However, the security threats on data exchanges over vehicular networks have become increasingly severe. Different from conventional cryptographic technologies, the application of physical layer security (PLS) to vehicular networks has been investigated to prevent the security of exchanging data from the eavesdropper and measure precisely the leaked information to the eavesdropper, due to its low complexity and communication overhead. In this work, we are concerned with the PLS of cooperative vehicular networks consisting of a source vehicle, a destination vehicle, an eavesdropping vehicle and a cooperative jamming vehicle. First, to improve the secrecy performance, the cooperative jamming helper emits jamming signals to degrade the eavesdropping channel without harming the legitimate channel. Then, based on the Rayleigh fading channel models and the traffic models, the closed-form expressions of the secrecy outage probability (SOP) and the average secrecy capacity (ASC) of the considered vehicular networks are derived, which deliver more implications of various system parameters on SOP and ASC performances and can be computed without simulations at a lower complexity. Second, a definition of the optimal jamming vehicle is introduced and then the cooperative jamming vehicle selection strategy is presented. The existence of the optimal jamming vehicle is measured in probability, which is explored analytically. Third, the optimal power allocation that maximizes the secrecy capacity is found analytically for the source vehicle and the cooperative jamming helper. Finally, simulations are also presented to demonstrate the validation of these analytical results and confirm the advantages of the cooperative jamming strategy and the optimal power allocation. From the numerical results, more observations on the effects of the main system parameters on secrecy performances are obtained, which provides some useful guides for practice.  相似文献   

4.
In this paper, we focus on the secrecy rate maximization problem in intelligent reflecting surface (IRS)-assisted cognitive radio (CR) networks. In order to improve the security, there is a common scheme to add artificial noise (AN) to the transmitted signal, which is also applied in this paper. Further, in CR networks, the secondary users always cannot obtain accurate channel state information (CSI) about the primary user and eavesdropper. By taking jointly design for the IRS phase shift matrix, the transmitted beamforming of the secondary base station (BS), and the covariance matrix of AN, our objective is to maximize the minimal secrecy rate of all secondary users. Due to the serious coupling among the designed variables, it cannot be solved by conventional methods. We propose an alternating optimization (AO) algorithm. In simulation results, we apply primary users and secondary users randomly distributed in the communication area, which numerically demonstrate the superiority of our proposed scheme.  相似文献   

5.
Li Ding 《Physica A》2008,387(12):3008-3016
A critical issue in wireless sensor networks (WSNs) is represented by limited availability of energy within network nodes. Therefore, making good use of energy is necessary in modeling sensor networks. In this paper we proposed a new model of WSNs on a two-dimensional plane using site percolation model, a kind of random graph in which edges are formed only between neighbouring nodes. Then we investigated WSNs connectivity and energy consumption at percolation threshold when a so-called phase transition phenomena happen. Furthermore, we proposed an algorithm to improve the model; as a result the lifetime of networks is prolonged. We analyzed the energy consumption with Markov process and applied these results to simulation.  相似文献   

6.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy.  相似文献   

7.
The susceptible–infected–susceptible (SIS) model is widely adopted in the studies of epidemic dynamics. When it is applied on contact networks, these networks mostly consist of nodes connected by undirected and unweighted edges following certain statistical properties, whereas in this article we consider the threshold and immunization problem for the SIS model on generalized networks that may contain different kinds of nodes and edges which are very possible in the real situation. We proved that an epidemic will become extinct if and only if the spectral radius of the corresponding parameterized adjacent matrix (PAM) is smaller than 1. Based on this result, we can evaluate the efficiency of immune strategies and take several prevailing ones as examples. In addition, we also develop methods that can precisely find the optimal immune strategies for networks with the given PAM.  相似文献   

8.
Rumor propagation is a typical form of social communication and plays a significant role in social life. In this paper, we studied the process of rumor propagation by accounting for the mechanism of forgetting in Barrat–Barthelemy–Vespignani (BBV) networks. First, we derived mean-field equations for rumor propagation based on the strength of the nodes in the propagation network. We then analyzed the stability of the model to determine whether a propagation threshold existed in the BBV networks. We also conducted numerical simulations of the BBV networks and found that rumors propagate more slowly in BBV networks than in unweighted networks. The numerical simulation results also demonstrated that as the forgetting rate increases, the rumor’s influence decreases in both BBV networks and unweighted networks. Finally, the simulation results confirmed that a threshold exists for rumor propagation in BBV networks, but that it was independent of the value of the stifling rate.  相似文献   

9.
Thresholds for epidemic spreading in networks   总被引:1,自引:0,他引:1  
We study the threshold of epidemic models in quenched networks with degree distribution given by a power-law. For the susceptible-infected-susceptible model the activity threshold λ(c) vanishes in the large size limit on any network whose maximum degree k(max) diverges with the system size, at odds with heterogeneous mean-field (HMF) theory. The vanishing of the threshold has nothing to do with the scale-free nature of the network but stems instead from the largest hub in the system being active for any spreading rate λ>1/√k(max) and playing the role of a self-sustained source that spreads the infection to the rest of the system. The susceptible-infected-removed model displays instead agreement with HMF theory and a finite threshold for scale-rich networks. We conjecture that on quenched scale-rich networks the threshold of generic epidemic models is vanishing or finite depending on the presence or absence of a steady state.  相似文献   

10.
Theory of rumour spreading in complex social networks   总被引:1,自引:0,他引:1  
We introduce a general stochastic model for the spread of rumours, and derive mean-field equations that describe the dynamics of the model on complex social networks (in particular, those mediated by the Internet). We use analytical and numerical solutions of these equations to examine the threshold behaviour and dynamics of the model on several models of such networks: random graphs, uncorrelated scale-free networks and scale-free networks with assortative degree correlations. We show that in both homogeneous networks and random graphs the model exhibits a critical threshold in the rumour spreading rate below which a rumour cannot propagate in the system. In the case of scale-free networks, on the other hand, this threshold becomes vanishingly small in the limit of infinite system size. We find that the initial rate at which a rumour spreads is much higher in scale-free networks than in random graphs, and that the rate at which the spreading proceeds on scale-free networks is further increased when assortative degree correlations are introduced. The impact of degree correlations on the final fraction of nodes that ever hears a rumour, however, depends on the interplay between network topology and the rumour spreading rate. Our results show that scale-free social networks are prone to the spreading of rumours, just as they are to the spreading of infections. They are relevant to the spreading dynamics of chain emails, viral advertising and large-scale information dissemination algorithms on the Internet.  相似文献   

11.
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU’s eavesdropper in the primary network can enhance the SU performance.  相似文献   

12.
In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptible-infectedrecovered (SIR) model on the above networks, but it can reduce the prevalence of the infected individuals remarkably. This result may help us understand epidemic spreading phenomena on real networks and design appropriate strategies to control infections.  相似文献   

13.
We abstract bus transport networks (BTNs) to complex networks using the Space P approach. First, we select three actual BTNs in three major cities in China, namely, Beijing, Shanghai and Hangzhou. Using the SIS model, we simulate and study the epidemic spreading in the three BTNs. We obtain the density of infected vertices varying with time and the stationary density of infected vertices varying with infection rate. Second, we simulate and study the epidemic spreading in a recently introduced BTN evolution model, the network properties of which correspond well with those of actual BTNs. Third, we use mean-field theory to analyze the epidemic dynamics behavior of the BTN evolution model and obtain the theoretical epidemic threshold of this model. The theoretical value agrees well with the simulation results. Based on the work in this paper, we provide the following possible forecasts for epidemic dynamics in actual BTNs. An actual BTN should have a finite positive epidemic threshold. If the effective infection rate is above this threshold, the epidemic spread in the network and the density of infected vertices finally stabilizes in a balanced state. Below this threshold, the number of infected vertices decays exponentially fast and the epidemic cannot spread on a large scale.  相似文献   

14.
Threshold models try to explain the consequences of social influence like the spread of fads and opinions. Along with models of epidemics, they constitute a major theoretical framework of social spreading processes. In threshold models on static networks, an individual changes her state if a certain fraction of her neighbors has done the same. When there are strong correlations in the temporal aspects of contact patterns, it is useful to represent the system as a temporal network. In such a system, not only contacts but also the time of the contacts are represented explicitly. In many cases, bursty temporal patterns slow down disease spreading. However, as we will see, this is not a universal truth for threshold models. In this work we propose an extension of Watts’s classic threshold model to temporal networks. We do this by assuming that an agent is influenced by contacts which lie a certain time into the past. I.e., the individuals are affected by contacts within a time window. In addition to thresholds in the fraction of contacts, we also investigate the number of contacts within the time window as a basis for influence. To elucidate the model’s behavior, we run the model on real and randomized empirical contact datasets.  相似文献   

15.
基于移动社交网络的谣言传播动力学研究   总被引:3,自引:0,他引:3       下载免费PDF全文
王辉  韩江洪  邓林  程克勤 《物理学报》2013,62(11):110505-110505
本文在CSR传播模型的基础上提出基于移动社交网络的CSR的谣言传播模型. 改进了CSR模型的传播规则和传播动力学方程, 使得更符合移动SNS上用户的使用习惯. 在CSR模型中的接受概率数学模型基础上, 考虑个人接受阈值对接受概率的影响, 更符合人类接受谣言的心理学特点. 本文对该传播模型进行了理论分析. 并在仿真实验中, 利用多agent仿真平台对新模型和CSR模型以及SIR模型 在匀质网络和异质网络中的传播效果进行了对比研究, 从实验的结果来看, 新的谣言传播模型在匀质网络中传播范围更广, 传播速度更快. 新模型具有初值敏感性的特点. 关键词: 复杂网络 移动社交网络 谣言传播  相似文献   

16.
Xiao-Long Peng 《中国物理 B》2021,30(5):58901-058901
Over the last few years, the interplay between contagion dynamics of social influences (e.g., human awareness, risk perception, and information dissemination) and biological infections has been extensively investigated within the framework of multiplex networks. The vast majority of existing multiplex network spreading models typically resort to heterogeneous mean-field approximation and microscopic Markov chain approaches. Such approaches usually manifest richer dynamical properties on multiplex networks than those on simplex networks; however, they fall short of a subtle analysis of the variations in connections between nodes of the network and fail to account for the adaptive behavioral changes among individuals in response to epidemic outbreaks. To transcend these limitations, in this paper we develop a highly integrated effective degree approach to modeling epidemic and awareness spreading processes on multiplex networks coupled with awareness-dependent adaptive rewiring. This approach keeps track of the number of nearest neighbors in each state of an individual; consequently, it allows for the integration of changes in local contacts into the multiplex network model. We derive a formula for the threshold condition of contagion outbreak. Also, we provide a lower bound for the threshold parameter to indicate the effect of adaptive rewiring. The threshold analysis is confirmed by extensive simulations. Our results show that awareness-dependent link rewiring plays an important role in enhancing the transmission threshold as well as lowering the epidemic prevalence. Moreover, it is revealed that intensified awareness diffusion in conjunction with enhanced link rewiring makes a greater contribution to disease prevention and control. In addition, the critical phenomenon is observed in the dependence of the epidemic threshold on the awareness diffusion rate, supporting the metacritical point previously reported in literature. This work may shed light on understanding of the interplay between epidemic dynamics and social contagion on adaptive networks.  相似文献   

17.
This paper investigates the secure transmission for simultaneous wireless information and power transfer (SWIPT) in the cell-free massive multiple-input multiple-output (MIMO) system. To develop green communication, legitimate users harvest energy by the hybrid time switching (TS) and power splitting (PS) strategy in the downlink phase, and the harvested energy can provide power to send uplink pilot sequences for the next time slot. By in-built batteries, the active eavesdropper can send the same pilots with the wiretapped user, which results in undesirable correlations between the channel estimates. Under these scenarios, we derive the closed-form expressions of average harvested energy and achievable rates, and propose an iterative power control (PC) scheme based on max–min fairness algorithm with energy and secrecy constraints (MMF-ESC). This scheme can ensure the uniform good services for all users preserving the distributed architecture advantage of cell-free networks, while meeting the requirements of energy harvested by legitimate users and network security against active eavesdroppers. Besides, continuous approximation, bisection and path tracking are jointly applied to cope with the high-complexity and non-convex optimization. Numerical results demonstrate that MMF-ESC PC scheme can effectively increase the achievable rate and the average harvested energy of each user, and decrease the eavesdropping rate below the threshold. Moreover, the results also reveal that PS strategy is superior in harvesting energy in terms of more stringent network requirements for average achievable rates or security.  相似文献   

18.
The main goal of our work is to show how ideas change in social networks. Our analysis is based on three concepts: (i) temporal networks, (ii) the Axelrod model of culture dissemination, (iii) the garbage can model of organizational choice. The use of the concept of temporal networks allows us to show the dynamics of ideas spreading processes in networks, thanks to the analysis of contacts between agents in networks. The Axelrod culture dissemination model allows us to use the importance of cooperative behavior for the dynamics of ideas disseminated in networks. In the third model decisions on solutions of problems are made as an outcome of sequences of pseudorandom numbers. The origin of this model is the Herbert Simon’s view on bounded rationality. In the Axelrod model, ideas are conveyed by strings of symbols. The outcome of the model should be the diversity of evolving ideas as dependent on the chain length, on the number of possible values of symbols and on the threshold value of Hamming distance which enables the combination.  相似文献   

19.
Inspired by the promising potential of re-configurable intelligent surface (RIS)-aided transmission in achieving the vision of 6th Generation (6G) network, we analyze the security model for a vehicular-to-infrastructure (V2I) network by considering multiple RISs (M-RIS) on buildings to act as passive relays at fixed distances from a source. In addition, multiple eavesdroppers are presented in the vicinity of the intended destination. Our aim is to enhance the secrecy capacity (SC) and to minimize secrecy outage probability (SOP) in presence of multiple eavesdroppers with the help of M-RIS in V2I communications. We propose a key-less physical layer security using beam-forming by exploiting M-RIS. The proposed approach assumes the concept of detecting eavesdroppers before the information can be transmitted via beam-forming by utilizing M-RIS. The results reveal that with consideration of M-RIS and beam-forming, the achievable SC and SOP performance is significantly improved while imposing minimum power consumption and fewer RIS reflectors.  相似文献   

20.
Secure transmission in wireless networks is a big critical issue due to the broadcast nature of the wireless propagation environment. In this paper, the physical layer security performance in a mixed radio frequency (RF)/free space optical (FSO) system under multiple eavesdroppers is investigated. The RF links and FSO link within the system are assumed to respectively undergo Nakagami-m and Gamma–Gamma fading distributions. The two practical eavesdroppers scenarios considered includes: Colluding and Non-colluding in which their channel state information is unavailable at the source. The closed-form expressions for the lower bound security outage probability and the strictly positive secrecy capacity under both scenarios are derived by utilizing the system end-to-end cumulative distribution function and eavesdroppers’ probability density function. The results show that the increase in the number of eavesdroppers under both scenarios profoundly degrades the system secrecy performance. Moreover, it is demonstrated that both the atmospheric turbulence and pointing errors affect the concerned system secrecy and the impact of RF fading parameters is also presented. The accuracy of the numerical results obtained is validated by Montel-Carol simulations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号