17 results on '"Kunrui Cao"'
Search Results
2. Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission
- Author
-
Kunrui Cao, Haiyang Ding, Buhong Wang, Lu Lv, Jiwei Tian, Qingmei Wei, and Fengkui Gong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Signal Processing ,Computer Science Applications ,Information Systems - Published
- 2022
3. Securing Transmission for UAV Swarm-Enabled Communication Network
- Author
-
Buhong Wang, Tianhao Cheng, Kunrui Cao, and Runze Dong
- Subjects
Beamforming ,Optimization problem ,Computer Networks and Communications ,Computer science ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Transmitter power output ,Telecommunications network ,Computer Science Applications ,Base station ,Transmission (telecommunications) ,Control and Systems Engineering ,Benchmark (computing) ,Artificial noise ,Electrical and Electronic Engineering ,Information Systems - Abstract
Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communication network in this article, where a fixed-wing UAV acts as a legitimate user and a neighboring UAV eavesdropper attempts to eavesdrop the confidential information forwarded by rotary-wing UAV relays. In particular, we jointly optimize transmit power on the base station and UAV relays, power allocation coefficient and beamforming on UAV relays, and trajectory of the fixed-wing UAV to maximize the average secrecy rate. Due to the nonconvexity of the optimization problem, the block coordinate descent method is utilized to solve it. Specifically, the overall optimizing problem is divided into four subproblems in which the transmit power, power allocation coefficient, beamforming vector, and the trajectory of user are optimized, respectively. By employing the successive convex approximate method, subproblems are transformed to convex problems which are numerically tractable. Numerical simulations validate the effectiveness of the proposed algorithm and show that compared with benchmark schemes, the considered transmission scheme with artificial noise and optimized network parameters can improve secrecy rate by about 13.8%.
- Published
- 2022
4. Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles
- Author
-
Xiaodong Wang, Buhong Wang, Zhen Wang, Kunrui Cao, Rongxiao Guo, and Jiwei Tian
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Deep learning ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Computer Science Applications ,Adversarial system ,Hardware and Architecture ,Robustness (computer science) ,Signal Processing ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Artificial intelligence ,business ,computer ,Information Systems - Abstract
The introduction of deep learning technology can improve the performance of cyber-physical systems (CPSs) in many ways. However, this also brings new security issues. To tackle these challenges, this paper explores the vulnerabilities of deep learning-based unmanned aerial vehicles (UAVs), which are typical CPSs. Although many research works have been reported previously on adversarial attacks of deep learning models, only few of them are concerned about safety-critical CPSs, especially regression models in such systems. In this paper, we analyze the problem of adversarial attacks against deep learning-based UAVs and propose two adversarial attack methods against regression models in UAVs. Experiments demonstrate that the proposed non-targeted and targeted attack methods both can craft imperceptible adversarial images and pose a considerable threat to the navigation and control of UAVs. To address this problem, adversarial training and defensive distillation methods are further investigated and evaluated, increasing the robustness of deep learning models in UAVs. To our knowledge, this is the first study on adversarial attacks and defenses against deep learning-based UAVs, which calls for more attention to the security and safety of such safety-critical applications.
- Published
- 2022
5. Secure Transmission of mmWave NOMA UAV-Assisted Relay System against Randomly Located Eavesdroppers
- Author
-
Danyu Diao, Buhong Wang, Kunrui Cao, Runze Dong, and Tianhao Cheng
- Subjects
Article Subject ,Computer Networks and Communications ,Information Systems - Abstract
UAV wireless communication has been regarded as a promising technology in the fifth-generation (5G) networks. In this paper, we consider the security of the mmWave NOMA UAV-assisted relay system, where a ground source transmits messages to two types of authorized users assisted by a UAV relay in the presence of multiple eavesdroppers. A practical probabilistic line-of-sight (LoS) channel model with Nakagami- m small-scale fading and three-dimensional (3D) antenna gain is established to describe the mmWave air-to-ground channel. In addition, to improve the security of the system, cooperative jamming and protected zone strategies are introduced. The analytical expressions of connection outage probability (COP), secrecy outage probability (SOP), and effective secrecy throughput (EST) under the NOMA scheme and cooperative jamming NOMA scheme are derived. Also, the asymptotic SOP and EST are analyzed to gain further insights. The theoretic analysis and simulation results show the effectiveness of the proposed schemes. As the transmitting power of the source and UAV relay increases, the SOP depends only on the location distribution and density of eavesdroppers and the ESTs under different schemes converge to the same floor.
- Published
- 2022
6. Enhancing Reliability and Security of UAV-Enabled NOMA Communications With Power Allocation and Aerial Jamming
- Author
-
Danyu Diao, Buhong Wang, Kunrui Cao, Runze Dong, and Tianhao Cheng
- Subjects
Computer Networks and Communications ,Automotive Engineering ,Aerospace Engineering ,Electrical and Electronic Engineering - Published
- 2022
7. Secure SWIPT-powered UAV communication against full-duplex active eavesdropper
- Author
-
Danyu Diao, Buhong Wang, and Kunrui Cao
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Published
- 2023
8. IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping
- Author
-
Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, and Danyu Diao
- Subjects
Control and Systems Engineering ,Computer Networks and Communications ,Electrical and Electronic Engineering ,Computer Science Applications ,Information Systems - Published
- 2022
9. Security enhancement of UAV swarm enabled relaying systems with joint beamforming and resource allocation
- Author
-
Buhong Wang, Kunrui Cao, and Runze Dong
- Subjects
Beamforming ,Optimization problem ,Computer Networks and Communications ,Computer science ,Real-time computing ,Swarm behaviour ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Communications system ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Bandwidth allocation ,Convex optimization ,Resource allocation ,Electrical and Electronic Engineering ,Secure transmission - Abstract
The high mobility of unmanned aerial vehicles (UAVs) could bring abundant degrees of freedom for the design of wireless communication systems, which results in that UAVs, especially UAV swarm, have attracted considerable attention. This paper considers a UAV Swarm enabled relaying communication system, where multiple UAV relays are organized via coordinated multiple points (CoMP) as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper. In order to maximize achievable secrecy rate of downlink, we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding, and both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered on the UAV swarm. Due to the non-convexity of the joint optimization problem, we propose an alternating optimization (AO) algorithm to decompose it into two subproblems utilizing block coordinate descent technique, then each subproblem is solved by successive convex optimization method. Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies.
- Published
- 2021
10. Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems
- Author
-
Buhong Wang, Hang Hu, Kunrui Cao, Haiyang Ding, Fengkui Gong, Jiwei Tian, and Lu Lv
- Subjects
Correctness ,Computer Networks and Communications ,Computer science ,business.industry ,Reliability (computer networking) ,Aerospace Engineering ,Throughput ,medicine.disease ,Noma ,Automotive Engineering ,Secrecy ,Benchmark (computing) ,medicine ,Wireless ,Artificial noise ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
This article studies the reliable and secure communications for a wireless-powered non-orthogonal multiple access (NOMA) system in the presence of multiple eavesdroppers. A joint artificial noise and power allocation (JAP) scheme is proposed to ensure the reliability and security for the system. Based on the JAP scheme, analytical closed-form expressions for connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) are derived, respectively, to evaluate the performance of the security-required user. Also, the asymptotic SOP and EST are analyzed to gain further insights. The numerical results demonstrate the correctness of the theoretic analysis and indicate that the proposed JAP scheme can achieve a better performance than the benchmark schemes.
- Published
- 2021
11. TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber–Physical Systems
- Author
-
Tengyao Li, Buhong Wang, Rongxiao Guo, Kunrui Cao, Jiwei Tian, and Fute Shang
- Subjects
Mathematical optimization ,Computer Networks and Communications ,Computer science ,020209 energy ,020208 electrical & electronic engineering ,Cyber-physical system ,Phasor ,02 engineering and technology ,Network topology ,Computer Science Applications ,Variable (computer science) ,Electric power system ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Integer programming ,Information Systems - Abstract
This article explores the problem of protection against false data injection attacks (FDIAs) on the power system state estimation. Although many research works have been reported previously to solve the same problem, yet most of them are only for perfect FDIAs. To address the problem reasonably, all related factors influencing the success probability and corresponding attack impact of imperfect FDIAs should also be considered. Based on such considerations, a topology, parameter, accuracy, level (TOTAL) protection strategy considering all corresponding factors is proposed. The TOTAL protection strategy minimizes the attack impact of typical imperfect FDIAs (single measurement attacks) while defending against typical perfect FDIAs (single-state variable attacks). Depending on whether the protection scheme contains phasor measurement units (PMUs), we formulate the meter selection as a linear binary programming or integer programming problem, which can be solved by suitable solvers. The proposed strategy is compared with the existing methods in the literature and evaluated using the standard IEEE test cases.
- Published
- 2021
12. Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers
- Author
-
Haiyang Ding, Fengkui Gong, Lu Lv, Kunrui Cao, Tianhao Cheng, Runze Dong, and Buhong Wang
- Subjects
021110 strategic, defence & security studies ,Computer Networks and Communications ,business.industry ,Computer science ,0211 other engineering and technologies ,Throughput ,Jamming ,02 engineering and technology ,Base station ,Transmission (telecommunications) ,Channel state information ,Telecommunications link ,Wireless ,Artificial noise ,Safety, Risk, Reliability and Quality ,business ,Computer network - Abstract
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with the aid of energy harvesting (EH) jammers. During each time frame, communication is divided into two phases. At the first phase, the base station (BS) transfers wireless power to EH receivers (EHRs). At the second phase, users perform uplink NOMA transmission to BS, while one of EHRs is selected as a friendly jammer that uses the energy harvested from the previous phase to emit the artificial noise for confusing the eavesdropper. In terms of the requirement of channel state information (CSI), we propose three friendly EH jammer selection schemes, namely random EH jammer selection (REJS) scheme without the requirement of any CSI, maximal EH jammer selection (MEJS) scheme with the CSI between BS and each EHR, and optimal EH jammer selection (OEJS) scheme where both the CSIs from BS to EHRs and from EHRs to the eavesdropper need to be known. Analytical closed-form expressions for the connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) are derived to evaluate the system performance achieved by the proposed schemes, respectively. Also, the asymptotic analysis is provided to gain further insights. The analytical and numerical results indicate that the proposed schemes can realize better secrecy performance than conventional scheme without an EH jammer. Both the secrecy diversity orders of the REJS and MEJS schemes are one while the OEJS scheme can achieve a full secrecy diversity order. Furthermore, owing to the impact of connection outage, the three schemes converge to the same EST floor with the increase of signal-to-noise ratio (SNR).
- Published
- 2021
13. Threat model and construction strategy on ADS‐B attack data
- Author
-
Fute Shang, Jiwei Tian, Kunrui Cao, Tengyao Li, and Buhong Wang
- Subjects
Computer Networks and Communications ,Computer science ,Aviation ,media_common.quotation_subject ,Data security ,Fidelity ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,0202 electrical engineering, electronic engineering, information engineering ,Attack patterns ,media_common ,Plain text ,business.industry ,020206 networking & telecommunications ,computer.file_format ,Air traffic control ,010201 computation theory & mathematics ,Threat model ,Key (cryptography) ,Data mining ,business ,computer ,Software ,Information Systems - Abstract
With the fast increase in airspace density and high-safety requirements on aviation, automatic dependent surveillance-broadcast (ADS-B) is regarded as the primary method in the next generation air traffic surveillance. The ADS-B data is broadcast with the plain text without sufficient security measures, which results in various attack patterns emerging. However, in terms of constrictions with laws and regulations, ADS-B attack data is difficult to collect and obtain, which is essential for data security research studies. To deal with the absence of ADS-B attack data in real environments, the construction strategy on ADS-B attack data is proposed. For construction fidelity, ADS-B data features are analysed and modelled at first. Then the popular and classical attack patterns on ADS-B data are analysed to establish threat models. Based on the original ADS-B data sets, the construction strategy is designed to focus on attack target selection, key parameter determination, and mixture strategy, reproducing the attack intentions. The constructed ADS-B attack data sets are hybrid data sets including the normal and attack data. By simulation analyses, the feasibility and availability of the construction strategy were validated with real ADS-B data.
- Published
- 2020
14. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users
- Author
-
Tengyao Li, Haiyang Ding, Kunrui Cao, Fengkui Gong, and Buhong Wang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Frequency band ,Aerospace Engineering ,Spectral efficiency ,medicine.disease ,law.invention ,Noma ,Relay ,law ,Automotive Engineering ,medicine ,Key (cryptography) ,Benchmark (computing) ,Electrical and Electronic Engineering ,business ,Selection (genetic algorithm) ,Computer network - Abstract
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the same frequency band to improve the spectral efficiency. Whereas a security flaw emerges in the presence of untrusted users or low security clearance users who can access the messages of trusted users due to the spectrum sharing and may work as eavesdroppers. To achieve reliable and secure communications of NOMA systems under untrusted users, we in this paper propose two relay selection (RS) schemes termed decode-and-forward (DF) and amplify-and-forward (AF) protocols based optimal relay selection (i.e., DORS and AORS) schemes, respectively. To explicitly reveal the benefits of the DORS and AORS schemes, we derive the exact and asymptotic closed-form expressions of the secrecy outage probability (SOP) and positive secrecy capacity probability (PSCP) achieved by the two schemes, and analyze the optimality of the two schemes. Analysis and simulation results indicate that both the DORS and AORS schemes significantly outperform the benchmark schemes, in addition to achieving the same SOP and desirable PSCP at high SNR.
- Published
- 2020
15. Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping
- Author
-
Tengyao Li, Fengkui Gong, Kunrui Cao, Jiwei Tian, Haiyang Ding, and Buhong Wang
- Subjects
Beamforming ,Base station ,Computer Networks and Communications ,Computer science ,business.industry ,Reliability (computer networking) ,Key (cryptography) ,Eavesdropping ,Spectral efficiency ,Safety, Risk, Reliability and Quality ,business ,Secure transmission ,Computer network - Abstract
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the same resource block to improve the spectral efficiency. Whereas due to the resource sharing, a security flaw of NOMA emerges in the presence of internal untrusted users, especially untrusted near users who are closer to the base station and can easily access the confidential information for paired far users. To mitigate the flaw, in this paper, we investigate the reliable and secure transmission of NOMA systems with untrusted near users, and propose joint beamforming and power allocation (JBP) scheme for the scenario. Meanwhile, from security point of view, we extend to a worse-case scenario where both untrusted near users and external eavesdroppers exist, and propose joint artificial noise aided beamforming and power allocation (JANBP) scheme to achieve a reliable and secure transmission for the scenario. The exact and asymptotic closed-form expressions of secrecy outage probability (SOP) for the two scenarios are derived to evaluate the secrecy performance achieved by the proposed schemes, respectively. The analysis and simulation results show the superiority of the proposed JBP and JANBP schemes in terms of combating internal and external eavesdropping, and also indicate the two schemes can achieve the same SOP at high SNR.
- Published
- 2020
16. Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication
- Author
-
Qingmei Wei, Buhong Wang, and Kunrui Cao
- Subjects
Article Subject ,Computer Networks and Communications ,Computer Science Applications - Abstract
NOMA (nonorthogonal multiple access) technology is an effective technical means to improve spectral efficiency and system capacity. At present, due to the proliferation of access devices and other reasons, the network security communication is facing very serious challenges. This research combines TAS (antenna selection) technology and AN (artificial noise) technology, applies them to NOMA system, and proposes a physical layer optimized security transmission scheme in which AN signals are superimposed at the base station. In this scheme, a part of the total power is divided into the AN signal, and the AN signal and the useful information are superimposed and encoded for transmission. The exact solution of SOP and the asymptotic solution under high signal-to-noise ratio are obtained by mathematical derivation. Moreover, the influence of the power allocation coefficient and target rate of legitimate users on the security performance of the physical layer is explored. The study found that when the solution proposed in this study is adopted, when the fixed SOP size is 10−2, taking the ideal SOP curve as the benchmark, it can be observed that the RHI only occurs when the user node is eavesdropped, and performance improvement of about 2 dB can be obtained. This is because only the system eavesdropping user performance is degraded at this time, so the security performance is improved. In addition, under the same SOP performance, the user is closer to the legal node and can obtain a better channel to resist fading and eavesdropping. The scheme proposed in this study effectively improves the security performance of the NOMA scenario and provides some theoretical guidance for the design process of the secure communication system.
- Published
- 2022
- Full Text
- View/download PDF
17. Physical Layer Security for Intelligent Reflecting Surface aided Wireless Powered Communication Systems
- Author
-
Kunrui Cao, Haiyang Ding, Lu Lv, Zhou Su, Jing Tao, Fengkui Gong, and Buhong Wang
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Signal Processing ,Computer Science Applications ,Information Systems - Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.