面向多址MIMO的协作干扰策略研究

项目来源

国家自然科学基金(NSFC)

项目主持人

成秀珍

项目受资助机构

曲阜师范大学

项目编号

61771289

立项年度

2017

立项时间

未公开

项目级别

国家级

研究期限

未知 / 未知

受资助金额

65.00万元

学科

信息科学-电子学与信息系统-通信理论与系统

学科代码

F-F01-F0103

基金类别

面上项目

关键词

多址MIMO ; 干扰器选择 ; 连续干扰消除 ; 协作干扰 ; 物理层安全 ; Multiple Access MIMO ; Physical Layer Security ; Cooperative Jamming ; Jammer Selection ; Successive Interference Cancelation

参与者

禹继国;李光顺;黄宝贵;姜洪璐;郑建超;张闪闪;刘嫚嫚;武舒

参与机构

齐鲁工业大学;曲阜师范大学

项目标书摘要:MIMO以其极大提升信道容量的优势,以期在未来无线通信中可得到广泛应用,但由于开放的无线环境以及多天线发射信号,导致无线信号极易被窃听者截取。研究者提出的物理层安全技术,可使得非法接收者无法获知通信内容。但当前基于协作干扰的物理层安全问题的研究,并未考虑干扰器选择的时间成本以及干扰源功率消耗等。基于此,课题组认为有必要优化当前的物理层安全技术,针对广泛应用的MIMO技术,设计协作干扰策略,达到物理层安全的各项性能指标。具体来说:(1)寻找并快速选择能够对窃听者实现有效干扰的单个或多个合作干扰源,解决候选节点选择过程中所引入的复杂计算量与观测时延问题;(2)解决不同时隙、多种传输模式下的干扰信号的合理调度,获得干扰效率和保密性能的提升,实现基于时分或频分的智慧协同干扰;(3)设计基于用户间干扰的物理层安全策略,在确保合法接收者正常解码信号的同时,使得窃听者无法获得网络信息。

Application Abstract: MIMO has been projected to be widely adopted by future wireless communications due to the significantly enhanced channel capacity.However,the wireless signal can be easily intercepted by eavesdroppers because of the open wireless environment and the multi-antenna communications.It is well-known that physical layer security can be employed by physical layer technologies to prevent eavesdroppers from obtaining the legitimate signals.Nevertheless,existing works on physical layer security based on cooperative jamming do not take into account the time cost of jammer selection and the power consumption of jammers.Accordingly,we suggest optimizing the current strategies on physical layer security,and design novel cooperative jamming strategies for MIMO networks,so as to achieve the corresponding secrecy performance.Our proposed research is summarized by the following three thrusts:(1)to search and quickly select cooperative jammer(s)that can effectively interfere with the eavesdroppers to reduce the computational complexity and observation delay introduced during the candidate jammer selection process;(2)to handle the scheduling of various jamming signals to improve the jamming efficiency and secrecy performance for the purpose of achieving the smart cooperative jamming based on different multiplexing modes;and(3)to design novel physical layer security strategies based on the inter-user interference,so as to stop the eavesdroppers from wiretaping information while ensuring the accurate decoding at the legitimate receivers.

项目受资助省

山东省

项目结题报告(全文)

MIMO应用于5G通信以提高网络吞吐量,但是潜在的安全问题严重影响着MIMO技术在大规模无线通信网络中的应用。此外,5G无线网络的广泛应用对网络的性能提出更高的要求,如高吞吐量、低时延、高可靠性等。本项目致力于提高无线网络的物理层安全、网络服务质量以及提高数据安全与隐私保护能力。主要研究结果如下:1.针对干扰源选择问题,提出了基于多窃听信道统计信息的中继与干扰源选择策略。对于固定传输距离模型,引入了干扰源选择方案来提高保密传输能力;2.对保证无线通信安全的物理层干扰策略进行了全面的梳理研究,从三个不同的角度对干扰策略进行了分类,并解释了不同场景下的主要相关设计;3.针对干扰信号的调度问题,分别提出了Rayleigh衰落信道下基于SINR干扰模型的分布式最短链路调度算法和最大链路调度算法,为干扰局部化的分布式算法设计提供了新的设计思路;4.针对频谱资源的分配与调度问题,提出了满足5G网络动态频谱接入的频谱预测方法,并且提出了一种用于上行链路认知无线电网络的动态频谱接入方法;5.针对提高MIMO系统吞吐量问题,提出了一种波束成形优化方法,还提出了一种基于深度学习与信号预编码和后处理的抗干扰方法;6.针对提高MIMO系统安全性问题,提出了一种基于多窃听信道统计信息的中继与协作干扰源选择策略,并且分析了合法节点和窃听者服从泊松点过程分布的无线网络保密传输容量,推导出了连接中断概率和保密中断概率的界。在完成本项目的研究目标的基础上,分别研究网络层拓扑结构和应用层数据安全与隐私保护等问题,并取得了一系列的研究成果。基于本项目共发表论文70篇,其中SCI检索期刊论文50篇,在CCF A类期刊发表论文8篇,在CCF A类会议IEEE INFOCOM上发表论文3篇,CCF B类会议ICDCS上发表论文2篇。获得山东省自然科学二等奖1项、山东省高校科学技术一等奖1项。

  • 排序方式:
  • 5
  • /
  • 1.Communication-Efficient Federated Learning Based on Dynamic Gradient Compression and Client Selection

    • 关键词:
    • Data privacy;Federated learning;Learning systems;Machine learning;Client selection;;Communication cost;Data privacy and securities;Distributed machine learning;Dynamic gradient compression;Federated learning;;Global models;Learning paradigms;ON dynamics;Sparsification
    • Wang, Yuxiang;Ma, Chunmei
    • 《2nd International Conference on Computer, Internet of Things and Smart City, CIoTSC 2024》
    • 2025年
    • December 27, 2024 - December 29, 2024
    • Nanchang, China
    • 会议

    Federated Learning is a distributed machine learning paradigm designed to protect data privacy and security while allowing multiple participants to collaboratively train a shared global model without uploading their data to a central server. Modern machine learning models often consist of millions of parameters, resulting in significant computational complexity and a heavy communication burden during the collection and distribution of training data. This becomes a key bottleneck that limits the effectiveness of federated learning. In order to reduce communication costs, we first propose the CS client selection strategy, which integrates model performance and fairness to construct scheduling priority metrics. Client selection is then carried out based on these metrics. And then, we propose a dynamic gradient sparsification algorithm that adjusts the level of sparsification applied to gradient updates for each client, ensuring that every client uploads a suitably compressed update. Finally, we conduct comprehensive experiments and the experimental results show that the method proposed in this paper can effectively reduce communication costs while ensuring model accuracy. © 2024 Copyright held by the owner/author(s).

    ...
  • 2.Distributed and Personalized Federated Learning inWireless Ad Hoc Networks

    • 关键词:
    • Ad hoc networks;Adversarial machine learning;Data statistics;Decentralised;Dynamic changes;Heterogeneous devices;In networks;Local model;Machine leaning;Model aggregations;Network topology;Wireless ad-hoc networks
    • Huang, Baogui;Wang, Bei;Li, Xiangqian;Ma, Chunmei;Li, Guangshun;Lai, Qingliang
    • 《18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024》
    • 2025年
    • June 21, 2024 - June 23, 2024
    • Qingdao, China
    • 会议

    This paper studies the difficult task of designing federated learning algorithms tailored for wireless ad hoc networks. Federated learning in such networks presents numerous challenges, including signal interference, decentralized infrastructure, dynamic changes in network topology, heterogeneous devices, and diverse data statistics. In response to these challenges, this paper proposes a fully distributed and personalized federated learning algorithm specifically designed for wireless ad hoc networks, named ADDPFed. ADDPFed tackles the issue of wireless interference by leveraging non-orthogonal multiple access technology and successive interference cancellation for enhancing overall communication efficiency. Another key strength of ADDPFed lies in its ability to enable direct local model exchanges among neighboring clients, eliminating the need for central server coordination for model aggregation. For the model aggregation, ADDPFed first calculates the distance between local models using the Tonimoto coefficient, and then assigns suited aggregation weights to these models. This approach emphasizes the contribution of similar models to the global model, effectively tackling the issue of data statistical heterogeneity. Extensive experiments validate the effectiveness of ADDPFed, paving the way for enhanced collaborative and distributed learning paradigms in wireless ad hoc networks. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

    ...
  • 3.Trustworthy andIncentivized Federated Learning Based onBlockchain

    • 关键词:
    • Adversarial machine learning;Differential privacy;Block-chain;Byzantine attacks;Central servers;Communication cost;Incentive mechanism;Local data;Poisoning attacks;Privacy protection;Single point;Train model
    • Ma, Chunmei;Chen, Haonan;Li, Xiangqian;Wang, Yuxiang;Li, Guangshun;Huang, Baogui
    • 《20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024》
    • 2025年
    • December 7, 2024 - December 8, 2024
    • Haikou, China
    • 会议

    Federated learning enables users to train models without transmitting local data to central servers, preserving data privacy and reducing communication costs. However, federated learning also faces various challenges, such as single point of failure issue, byzantine attack, and a lack of incentive mechanism. In this paper, a trustworthy and incentivized federated learning framework is proposed. Firstly, a blockchain network is used as a substitute for the central server in federated learning, addressing the vulnerability of servers to attacks and dishonesty. Secondly, a multi-key homomorphic encryption mechanism is introduced to safeguard the privacy of local models. Furthermore, to address the challenge of detecting malicious models within encrypted models, this paper proposes a verification mechanism based on the cosine similarity of group models. Finally, this paper evaluates the contributions of multiple participants using Shapley Value. This process effectively coordinates and distributes the interests of multiple participants, ultimately incenting more users to engage in federated learning. Experimental results demonstrate that the framework proposed in this paper can still converge and maintain good training accuracy even in the presence of attacks. © IFIP International Federation for Information Processing 2025.

    ...
  • 4.Secure Ultra-reliable and Low Latency Communication in NOMA-UAV Networks

    • 关键词:
    • 5G mobile communication systems;Antennas;Electric power transmission;Network layers;Network security;Unmanned aerial vehicles (UAV);Aerial vehicle;Line-of-sight links;Low-latency communication;Multiple access;Non-orthogonal;Physical layer security;Secrecy rate maximization;Ultra-reliable and low-latency communication;Unmanned aerial vehicle and non-orthogonal multiple access;Wireless channel
    • Zhao, Xiao;Yu, Kan;Li, Dong;Liu, Xiaowu;Luo, Chuanwen
    • 《19th International Conference on Mobility, Sensing and Networking, MSN 2023》
    • 2023年
    • December 14, 2023 - December 16, 2023
    • Jiangsu, China
    • 会议

    Ultra-reliable and low-latency communication (uRLLC) plays an important role in the development of 5G-advanced and 6G wireless networks. Combining unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) offers a promising solution to achieve improved reliability and lower latency. This is made possible by enabling line-of-sight (LoS) links and concurrent transmissions through the use of UAVs and NOMA, respectively. However, because of the inherent openness of wireless channel, uRLLC faces the security challenges against being eavesdropped. Physical Layer Security (PLS) has been proposed as an efficient method to secure uRLLC, since it uses only the properties of wireless channels (such as fading, interference, and noise). Although the potential benefits of NOMA-UAV provide a better coverage for ground users, it remains a significant challenge since it may provide a LoS link to eavesdroppers. Therefore, in this paper, we investigate the security and reliability performance of UAV and NOMA based uRLLC scenario, under which UAV serves two different types of users with different needs, i.e., secret users and public users. By using stochastic geometry tools, we derive the closed-form expression of the secrecy rate, an important metric in the study of PLS. Additionally, the secure performance is enhanced by maximizing the secrecy rate through optimizing the hovering height and power assignment of UAV. It should be noted that the hovering position is optimized via power allocation when there is only one secret user. Evaluations demonstrate the effectiveness and correctness of our theoretical analysis. © 2023 IEEE.

    ...
  • 5.Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process

    • 关键词:
    • Bitcoin;Markov processes;Block-chain;Computing power;Decentralised;Low bound;Markov Decision Processes;Mining problems;Selfish mining;Stubborn mining
    • Zhang, Yiting;Liu, Ming;Guo, Jianan;Wang, Zhaojie;Wang, Yilei;Liang, Tiancai;Singh, Sunil Kumar
    • 《4th International Conference on Machine Learning for Cyber Security, ML4CS 2022》
    • 2023年
    • December 2, 2022 - December 4, 2022
    • Guangzhou, China
    • 会议

    As one of the most popular cryptocurrencies, Bitcoin is essentially a decentralized ledger. Each node maintains the security of the blockchain through the workload proof mechanism, and the block that obtains the accounting right will receive a block reward in the form of Bitcoin. Because the Bitcoin system follows the "longest legal chain" principle, when a fork occurs, orphan blocks will inevitably be generated, and some miners’ computing power will be a waste. In recent years, researchers have discovered that miners can obtain profits disproportionate to their own computing power by deviating from Bitcoin’s honest mining. Selfish Mining (SM1) is a case in dishonest mining strategy, and dishonest miners (attackers) can obtain higher returns by retaining the blocks they create and selectively delaying their release. The stubborn mining strategy is a generalized form of selfish mining. It increases the revenue of the stubborn miner by adopting a wider range of parameters. Its three mining strategies are: Lead-Stubborn, Equal Fork stubborn and Trail stubborn. The mining problem can be formulated as a Markov Decision Process (MDP), which can be resolved to give the optimal mining strategy. This work describes the three mining strategies of stubborn mining as a Markov decision process, solves it and gives the lower bound of the highest return under the optimal stubborn mining strategy. Our experimental results demonstrate that the revenue of the optimal stubborn mining strategy is higher than SM1 under certain circumstances, and this strategy allows dishonest miners (stubborn miners) to obtain revenue that does not match the actual computing power paid. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

    ...
  • 6.PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency

    • 关键词:
    • Atoms;Channel capacity;Efficiency;Network routing;Atomic multi-path payment;Block-chain;Channel network;Channel's capacity;Multipath;Network techniques;Payment channel network;Payment methods;Routing efficiency;Transaction throughput
    • Guo, Jianan;Shang, Lei;Wang, Yilei;Liang, Tiancai;Wang, Zhaojie;An, Hui
    • 《4th International Conference on Machine Learning for Cyber Security, ML4CS 2022》
    • 2023年
    • December 2, 2022 - December 4, 2022
    • Guangzhou, China
    • 会议

    The payment channel networks (PCN) technique effectively improves the transaction efficiency of a blockchain system, further promotes its practical application. Atomic Multi-Path Payments (AMP) are usually used, in payment channel networks, to divide transactions to improve routing efficiency, thereby improving the transaction throughput. Improper transaction division, however, may increase the occurrence of routing failure. Therefore, how to perform efficient transaction partitioning is an urgent problem to be solved. In this work, we propose an improved transaction partition method, named Proportional Atomic Multi-Path Payments (PAMP), which can enhance the efficiency of transaction routing. The key insight of PAMP is that, when a transaction is executed, the trade share can be well divided by the remaining capacity in multiple channels, which can greatly improve the routing efficiency and maintain the balance of channel capacity in the network. Simulation results show that, in contrast to traditional routing algorithms, the transaction success rate is increased by 2.3%, and the average execution time is reduced by 75.09 ms. PAMP improves the transaction routing efficiency, and also promotes the balance of network channel capacity. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

    ...
  • 7.Communication-Efficient Personalized Federated Learning on Non-IID Data

    • 关键词:
    • Cloud computing;Cost reduction;Learning systems;Cloud servers;Communication cost;Communication resources;Distributed machine learning;Federated learning;IID data;Learning paradigms;Non-IID;Personalized;Personalized model
    • Li, Xiangqian;Ma, Chunmei;Huang, Baogui;Li, Guangshun
    • 《19th International Conference on Mobility, Sensing and Networking, MSN 2023》
    • 2023年
    • December 14, 2023 - December 16, 2023
    • Jiangsu, China
    • 会议

    In this paper, we explore the challenges associated with federated learning, a distributed machine learning paradigm that promotes collaborative model training while preserving the privacy of local client data. One significant hurdle is the non-IID nature of clients' data, alongside limited communication resources between clients and the cloud server. These statistical heterogeneity and communication resource limitations pose practical obstacles to the implementation of federated learning. To address these challenges, we propose a communication-efficient framework called GCPFL for personalized federated learning. Our framework empowers individual clients to train personalized models while substantially reducing communication costs. Specifically, each client compresses the gradient before uploading it and handles the effects of gradient compression through an error correction process. By uploading only the compressed gradients, the communication costs are significantly diminished. On the cloud server side, the received gradients are recovered into models, and similarity aggregation is performed on these models to facilitate collaboration among clients. Once the aggregated models are received, clients conduct local updates to acquire personalized models. Extensive experimental results illustrate that the GCPFL algorithm not only achieves high model accuracy but also substantially reduces communication costs compared to existing methods. © 2023 IEEE.

    ...
  • 8.Equitable Consensus: A PoS Mechanism based on Group Polynomial Election

    • 关键词:
    • Blockchain;% reductions;A-stable;Block-chain;Calculation results;Fairness;Generation right;Gini coefficients;High probability;Mechanism-based;Selection methods
    • Zhang, Mingyue;Li, Chunmei;Zhang, Yiting;Liu, Ming;Wang, Yilei
    • 《2023 International Conference on Data Security and Privacy Protection, DSPP 2023》
    • 2023年
    • October 16, 2023 - October 18, 2023
    • Xi'an, China
    • 会议

    PoS is a consensus mechanism where the probability of generating a block is directly proportional to a participant's stake, but block generation rights concentrated in rich participants can lead to unfairness. Existing solutions mainly use linear consensus mechanisms where block generation rights are linked to the stake, but since these solutions fail to extend block generation rights to the majority of participants, compounding may occur. To address the problem, we propose a block producer selection method that extends block generation rights, called Grouped Polynomial Elections-based PoS (GPE-PoS). Specifically, GPE-PoS groups participants with similar stakes into independent groups, and performs polynomial calculations on the nodes in each group. Then GPE-PoS calculates the probability of block generation for each participant based on the polynomial calculations results and selects the participant with the highest probability as the block producer. At the same time, the Gini coefficient is used to measure the fairness of the blockchain system, where a Gini coefficient closer to 0 indicates higher fairness. Simulation results show that compared to linear consensus mechanisms based on stake, GPE-PoS has a stable Gini coefficient of around 0.1, which is an 83.33% reduction compared to traditional PoS. © 2023 IEEE.

    ...
  • 10.Speech Enhancement Generative Adversarial Network Architecture with Gated Linear Units and Dual-Path Transformers

    • 关键词:
    • Benchmarking;Convolution;Convolutional neural networks;Decoding;Deep learning;Discrete cosine transforms;Frequency domain analysis;Learning systems;Network architecture;Signal encoding ;Speech enhancement;De-noising;Deep learning;Dual path;Due-path transformer;Gated linear unit;Generative adversarial network;Linear units;Phase denoising;Real part;Time frequency domain
    • Zhang, Dehui;Dong, Anming;Yu, Jiguo;Cao, Yi;Zhang, Chuanting;Zhou, You
    • 《2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022》
    • 2022年
    • October 9, 2022 - October 12, 2022
    • Prague, Czech republic
    • 会议

    Generative Adversarial Networks (GANs) have been used in the field of speech enhancement due to their huge potentials in reducing the noise mixed in the signals. Most of existing GAN-based speech enhancement approaches either operate on time domain or exploit the magnitude spectra in time-frequency domain, but lack consideration of direct optimization of the phase. In this paper, we propose a GAN architecture for speech enhancement based on gated linear units (GLUs) and Dual-Path Transformers (DPTs), which simultaneously deals with the amplitude and phase information on the time-frequency domain. The generator of the proposed GAN architecture is designed following an autoencoder structure fed by the real and imaginary parts of the time-frequency frames. The encoder of the generator is constructed by multiple cascaded convolutional GLUs (ConvGLUs), while the decoder consists of two groups of cascaded deconvolutional GLUs (DeconvGLUs), one for the real part of the spectrogram and the other for the imaginary part. The GLUs are adopted since they are potential in avoiding the gradient vanishing issue dwelling in deep architectures by providing a linear path for the gradients while retaining non-linear capabilities. Aiming at capturing the long-range dependent features in speech, we place DPTs between the encoder and the decoder of the generator, which contains multi-head attention modules and Bi-directional Gated Recurrent Units (BiGRUs). Moreover, the DPT structure is also merged with multiple one-dimensional convolutional layers in the discriminator of the GAN. Such a design not only improves the speech enhancement performance of GAN by focusing on multiple features of speech, but also reducing the volume of model parameters of GAN. Experimental results suggest that the proposed GAN architecture outperforms the existing benchmark GANs in terms of both objective speech intelligibility and quality with less computational complexity. © 2022 IEEE.

    ...
  • 排序方式:
  • 5
  • /