面向多址MIMO的协作干扰策略研究

项目来源

国家自然科学基金(NSFC)

项目主持人

成秀珍

项目受资助机构

曲阜师范大学

立项年度

2017

立项时间

未公开

项目编号

61771289

项目级别

国家级

研究期限

未知 / 未知

受资助金额

65.00万元

学科

信息科学-电子学与信息系统-通信理论与系统

学科代码

F-F01-F0103

基金类别

面上项目

关键词

多址MIMO ; 干扰器选择 ; 连续干扰消除 ; 协作干扰 ; 物理层安全 ; Multiple Access MIMO ; Physical Layer Security ; Cooperative Jamming ; Jammer Selection ; Successive Interference Cancelation

参与者

禹继国;李光顺;黄宝贵;姜洪璐;郑建超;张闪闪;刘嫚嫚;武舒

参与机构

齐鲁工业大学;曲阜师范大学

项目标书摘要:MIMO以其极大提升信道容量的优势,以期在未来无线通信中可得到广泛应用,但由于开放的无线环境以及多天线发射信号,导致无线信号极易被窃听者截取。研究者提出的物理层安全技术,可使得非法接收者无法获知通信内容。但当前基于协作干扰的物理层安全问题的研究,并未考虑干扰器选择的时间成本以及干扰源功率消耗等。基于此,课题组认为有必要优化当前的物理层安全技术,针对广泛应用的MIMO技术,设计协作干扰策略,达到物理层安全的各项性能指标。具体来说:(1)寻找并快速选择能够对窃听者实现有效干扰的单个或多个合作干扰源,解决候选节点选择过程中所引入的复杂计算量与观测时延问题;(2)解决不同时隙、多种传输模式下的干扰信号的合理调度,获得干扰效率和保密性能的提升,实现基于时分或频分的智慧协同干扰;(3)设计基于用户间干扰的物理层安全策略,在确保合法接收者正常解码信号的同时,使得窃听者无法获得网络信息。

Application Abstract: MIMO has been projected to be widely adopted by future wireless communications due to the significantly enhanced channel capacity.However,the wireless signal can be easily intercepted by eavesdroppers because of the open wireless environment and the multi-antenna communications.It is well-known that physical layer security can be employed by physical layer technologies to prevent eavesdroppers from obtaining the legitimate signals.Nevertheless,existing works on physical layer security based on cooperative jamming do not take into account the time cost of jammer selection and the power consumption of jammers.Accordingly,we suggest optimizing the current strategies on physical layer security,and design novel cooperative jamming strategies for MIMO networks,so as to achieve the corresponding secrecy performance.Our proposed research is summarized by the following three thrusts:(1)to search and quickly select cooperative jammer(s)that can effectively interfere with the eavesdroppers to reduce the computational complexity and observation delay introduced during the candidate jammer selection process;(2)to handle the scheduling of various jamming signals to improve the jamming efficiency and secrecy performance for the purpose of achieving the smart cooperative jamming based on different multiplexing modes;and(3)to design novel physical layer security strategies based on the inter-user interference,so as to stop the eavesdroppers from wiretaping information while ensuring the accurate decoding at the legitimate receivers.

项目受资助省

山东省

项目结题报告(全文)

MIMO应用于5G通信以提高网络吞吐量,但是潜在的安全问题严重影响着MIMO技术在大规模无线通信网络中的应用。此外,5G无线网络的广泛应用对网络的性能提出更高的要求,如高吞吐量、低时延、高可靠性等。本项目致力于提高无线网络的物理层安全、网络服务质量以及提高数据安全与隐私保护能力。主要研究结果如下:1.针对干扰源选择问题,提出了基于多窃听信道统计信息的中继与干扰源选择策略。对于固定传输距离模型,引入了干扰源选择方案来提高保密传输能力;2.对保证无线通信安全的物理层干扰策略进行了全面的梳理研究,从三个不同的角度对干扰策略进行了分类,并解释了不同场景下的主要相关设计;3.针对干扰信号的调度问题,分别提出了Rayleigh衰落信道下基于SINR干扰模型的分布式最短链路调度算法和最大链路调度算法,为干扰局部化的分布式算法设计提供了新的设计思路;4.针对频谱资源的分配与调度问题,提出了满足5G网络动态频谱接入的频谱预测方法,并且提出了一种用于上行链路认知无线电网络的动态频谱接入方法;5.针对提高MIMO系统吞吐量问题,提出了一种波束成形优化方法,还提出了一种基于深度学习与信号预编码和后处理的抗干扰方法;6.针对提高MIMO系统安全性问题,提出了一种基于多窃听信道统计信息的中继与协作干扰源选择策略,并且分析了合法节点和窃听者服从泊松点过程分布的无线网络保密传输容量,推导出了连接中断概率和保密中断概率的界。在完成本项目的研究目标的基础上,分别研究网络层拓扑结构和应用层数据安全与隐私保护等问题,并取得了一系列的研究成果。基于本项目共发表论文70篇,其中SCI检索期刊论文50篇,在CCF A类期刊发表论文8篇,在CCF A类会议IEEE INFOCOM上发表论文3篇,CCF B类会议ICDCS上发表论文2篇。获得山东省自然科学二等奖1项、山东省高校科学技术一等奖1项。

  • 排序方式:
  • 18
  • /
  • 1.Personalized client-edge-cloud hierarchical federated learning in mobile edge computing

    • 关键词:
    • Mobile edge computing; Federated learning; Client-edge-cloud;Personalized model; Non-independent and identically distributed;NETWORKS
    • Ma, Chunmei;Li, Xiangqian;Huang, Baogui;Li, Guangshun;Li, Fengyin
    • 《JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS》
    • 2024年
    • 13卷
    • 1期
    • 期刊

    Mobile edge computing aims to deploy mobile applications at the edge of wireless networks. Federated learning in mobile edge computing is a forward-looking distributed framework for deploying deep learning algorithms in many application scenarios. One challenge of federated learning in mobile edge computing is data heterogeneity since the unified model of federated learning performs poorly when client data are non-independent and identically distributed. Personalized federated learning can obtain amazing models in scenarios where client data are non-independent and identically distributed. This is because the personalized model captures the features of users' local data more accurately than the unified model. The personalized federated learning problem under two-tier (server-client) federated learning structures has been widely studied and applied. However, a lot of research results exhibit three distinct limitations: 1) suboptimal communication efficiency, 2) slow model convergence, and 3) underutilization of the relationships within user data, resulting in lower accuracy of personalized models. In this paper, we present the first personalized federated learning algorithm based on the client-edge-cloud structure. The edge server is responsible for model personalization and employs a learnable mixing parameter to mix the local model and the global model. We also utilize two learnable normalization parameters trained by clients to improve the performance of personalized models. Furthermore, in order to facilitate the collaboration among edge servers, we propose a similarity aggregation method to assign aggregation weights based on the Tanimoto coefficients between models. The experimental results show that the proposed algorithm not only increases the convergence speed of personalized models but also improves their testing accuracy.

    ...
  • 2.Effective Identity Authentication Based on Multiattribute Centers for Secure Government Data Sharing

    • 关键词:
    • blockchain; identity authentication; distribution; dynamic keygeneration;MANAGEMENT; FRAMEWORK
    • Wang, Meiquan;Wu, Junhua;Zhang, Tongdui;Wu, Junhao;Li, Guangshun
    • 《TSINGHUA SCIENCE AND TECHNOLOGY》
    • 2024年
    • 29卷
    • 3期
    • 期刊

    As one of the essential steps to secure government data sharing, Identity Authentication (IA) plays a vital role in the processing of large data. However, the centralized IA scheme based on a trusted third party presents problems of information leakage and single point of failure, and those related to key escrow. Therefore, herein, an effective IA model based on multiattribute centers is designed. First, a private key of each attribute of a data requester is generated by the attribute authorization center. After obtaining the private key of attribute, the data requester generates a personal private key. Second, a dynamic key generation algorithm is proposed, which combines blockchain and smart contracts to periodically update the key of a data requester to prevent theft by external attackers, ensure the traceability of IA, and reduce the risk of privacy leakage. Third, the combination of blockchain and interplanetary file systems is used to store attribute field information of the data requester to further reduce the cost of blockchain information storage and improve the effectiveness of information storage. Experimental results show that the proposed model ensures the privacy and security of identity information and outperforms similar authentication models in terms of computational and communication costs.

    ...
  • 3.IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing

    • 关键词:
    • Computer architecture;Data privacy;Digital storage;Edge computing;Efficiency;Network architecture;Block-chain;Chains structure;Data Sharing;Data storage;DPoS;Edge computing;Hybrid architectures;Modeling architecture;Privacy protection;Sharing schemes
    • Zheng, Tiange;Wu, Junhua;Li, Guangshun
    • 《Journal of Cloud Computing》
    • 2023年
    • 12卷
    • 1期
    • 期刊

    Achieving efficient and secure sharing of data in the Internet of Vehicles (IoV) is of great significance for the development of smart transportation. Although blockchain technology has great potential to promote data sharing and privacy protection in the context of IoV, the problem of securing data sharing should be payed more attentions. This paper proposes an IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing. Firstly, to improve protocol’s efficiency, a dual-chain structure empowered by alliance chain is introduced as the model architecture. Secondly, for the space problem characterized by data storage and security, we adopt distributed storage with the help of edge devices. Finally, to both ensure the efficiency of consensus protocol and protect the privacy of vehicles and owners simultaneously, we improve DPoS consensus algorithm to realize the efficient operation of the IoV data sharing model, which is closer to the actual needs of IoV. The comparison with other data sharing models highlights the advantages of this model, in terms of data storage and sharing security. It can be seen that the improved DPoS has high consensus efficiency and security in IoV. © 2023, The Author(s).

    ...
  • 4.Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data

    • 关键词:
    • Ciphertext-policy attribute-based encryption; key management; cloud;blockchain; hyperledger fabric;ATTRIBUTE-BASED ENCRYPTION; THRESHOLD MULTI-AUTHORITY; ACCESS-CONTROL;SCHEME
    • Liu, Suhui;Yu, Jiguo;Chen, Liquan;Chai, Baobao
    • 《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》
    • 2023年
    • 20卷
    • 2期
    • 期刊

    Public clouds have drawn increasing attention from academia and industry due to their high computational and storage performance. Attribute-based encryption (ABE) is the most promising technology to simultaneously achieve confidentiality and fine-grained access control of the cloud-stored data. However, traditional ABE that relies on centralized authority faces several key management issues, such as the key escrow, key distribution, key tracking, key update, and heavy communication and computing overhead for users, which will cause security concerns and impede its widespread application. On the other hand, blockchain technology preserves distributed ledgers to ensure the immutability and transparency of data, which can further solve the security vulnerabilities caused by system centralization. This paper proposes a blockchain-assisted transformation method to solve all the key management problems mentioned above in ciphertext-policy ABE by utilizing technologies such as secret sharing protocols. In addition, our transformation method realizes two additional benefits: outsourced decryption and efficient user revocation, which are extremely valuable for practical implementations. We simulate a demonstration by adopting the most popular permissioned blockchain, Hyperledger Fabric. The security and efficiency analysis reveals that the scheme obtained from our transformation method can achieve replayable chosen-ciphertext security with extremely efficient decryption.

    ...
  • 5.Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis

    • 关键词:
    • Bitcoin;Data mining;Game theory;Block-chain;Consensus algorithms;Decentralized networks;Distributed consensus;Markovian decision process;Optimal reward;Selfish mining;State transitions;Stubborn mining;Transition analysis
    • Zhang, Yiting;Zhao, Minghao;Li, Tao;Wang, Yilei;Liang, Tiancai
    • 《Information Sciences》
    • 2023年
    • 625卷
    • 期刊

    Bitcoin uses a decentralized network of miners and a distributed consensus algorithm to agree on blockchains to process transactions, and designs certain incentive strategy to ensure the system run persistently. However, recent research finds that it is vulnerable to specific game-theoretic attacks, in which a rational attack can gain a disproportionate share of reward by deviating from the honest behaviors. Among these attacks, stubborn mining is generally regarded as the most effective one. This paper propose the optimal stubborn mining strategy, trying to obtain the maximum revenue in stubborn mining. Through careful analysis, we find that the mining strategies in stubborn mining, under different conditions, can be represented as a Markovian Decision Process (MDP), and solving the MDP can result in the optimal strategy. In solving the MDP, we first transform it into a transition-reward Matrices, and then evaluate it to get the largest reward. With the method mentioned above, the attackers can get 46.9% additional than honest miners, and this attack outweighs traditional selfish mining (a compelling and well-studied mining attack) by up to 7.53%. © 2023 Elsevier Inc.

    ...
  • 6.Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training

    • 关键词:
    • Vertical federated learning; Label inference attack; Secret sharing;Dispersed training;LINEAR-REGRESSION; PRIVACY
    • Wang, Yilei;Lv, Qingzhe;Zhang, Huang;Zhao, Minghao;Sun, Yuhong;Ran, Lingkai;Li, Tao
    • 《WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS》
    • 2023年
    • 26卷
    • 5期
    • 期刊

    Federated learning is an emerging paradigm that enables multiple organizations to jointly train a model without revealing their private data. As an important variant, vertical federated learning (VFL) deals with cases in which collaborating organizations own data of the same set of users but with disjoint features. It is generally regarded that VFL is more secure than horizontal federated learning. However, recent research (USENIX Security'22) reveals that it is still possible to conduct label inference attacks in VFL, in which attacker can acquire privately owned labels of other participants; even VFL constructed with model splitting (the kind of VFL architecture with higher security guarantee) cannot escape it. To solve this issue, in this paper, we propose the dispersed training framework. It utilizes secret sharing to break the correlations between the bottom model and the training data. Accordingly, even if the attacker receives the gradients in the training phase, he is incapable to deduce the feature representation of labels from the bottom model. Besides, we design a customized model aggregation method such that the shared model can be privately combined, and the linearity of secret sharing schemes ensures the training accuracy to be preserved. Theoretical and experimental analyses indicate the satisfactory performance and effectiveness of our framework.

    ...
  • 7.Packet Scheduling in Rechargeable Wireless Sensor Networks under SINR Model

    • 关键词:
    • packet scheduling; physical interference model; rechargeable sensornetworks; SINR model;ENERGY-EFFICIENT; DELAY; POWER
    • Huang, Baogui;Yu, Jiguo;Ma, Chunmei;Li, Guangshun;Dong, Anming
    • 《CHINA COMMUNICATIONS》
    • 2023年
    • 20卷
    • 3期
    • 期刊

    Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio model. They allocate different transmission slots to conflict-ing packets and overcome the challenges caused by the fact that the channel state changes quickly and is un-controllable. The first algorithm proposes a priority -based framework for packet scheduling in recharge-able sensor networks. Every packet is assigned a pri-ority related to the transmission delay and the remain-ing energy of rechargeable batteries, and the packets with higher priority are scheduled first. The second algorithm mainly focuses on the energy efficiency of batteries. The priorities are related to the transmis-sion distance of packets, and the packets with short transmission distance are scheduled first. The sensors are equipped with low-capacity rechargeable batteries, and the harvest-store-use model is used. We consider imperfect batteries. That is, the battery capacity is lim-ited, and battery energy leaks over time. The energy harvesting rate, energy retention rate and transmission power are known. Extensive simulation results indi-cate that the battery capacity has little effect on the packet scheduling delay. Therefore, the algorithms proposed in this paper are very suitable for wireless sensor networks with low-capacity batteries.

    ...
  • 8.基于SINR的动态无线网络分布式链路调度

    • 关键词:
    • 无线动态网络;信号与干扰加噪声比SINR;链路调度;分布式算法;领导者选举
    • 黄宝贵;禹继国;马春梅
    • 《软件学报》
    • 2023年
    • 期刊

    无线信号之间的干扰阻碍了信号的并发传输,降低了无线网络的吞吐量.链路调度是提高无线网络吞吐量、减少信号传输延迟的一种有效方法.因为SINR (signal to interference plus noise ratio)模型准确地描述了无线信号传播的固有特性,能够真实反映无线信号之间的干扰,提出了一种在动态无线网络中基于SINR模型的常数近似因子的在线分布式链路调度算法(OLD_LS).在线的意思是指,在算法执行的过程中任意节点可以随时加入网络,也可以随时离开网络.节点任意加入网络或者从网络中离开体现了无线网络的动态变化的特性. OLD_LS算法把网络区域划分为多个正六边形,局部化SINR模型的全局干扰.设计了动态网络下的领导者选举算法(LE),只要网络节点的动态变化速率小于1/ε, LE就可以在O (logn+logR)时间复杂度内以高概率选举出领导者.其中,常数ε满足ε≤5(1-21-α/2)/6,α表示路径损耗指数, n是网络节点的规模, R是最长链路的长度.根据文献调研,所提算法是第1个用于动态无线网络的在线分布式链路调度算法.

    ...
  • 9.基于Rayleigh衰落模型的无线网络中链路调度算法设计

    • 关键词:
    • 链路调度 Rayleigh衰落模型 干扰局部化 分布式算法 调度性能 基金资助:国家自然科学基金项目(61373027); 国家自然科学基金项目(61672321); 国家自然科学基金项目(61771289); 国家自然科学基金项目(61832012); 专辑:信息科技 专题:电信技术 计算机软件及计算机应用 DOI:10.27275/d.cnki.gsdku.2019.001677 分类号:TP391.44TN929.5 导师:禹继国 耿玉水 手机阅读
    • 期刊

    物联网(Internet of Things,IoT)中有效的链路调度可以提高节点能量负载均衡、降低信息传输时延,其包含两个子问题:(1)最大化链路调度(Maximization Link Scheduling,MLS),即最大化单时隙内并发链路的数量;(2)最短链路调度(Shortest Link Scheduling,SLS),即最小化每条链路至少成功传输一次的时隙数量。Signal-Interference-Noise Ratio(SINR)模型是研究链路调度问题常见的干扰模型,Rayleigh衰落模型比SINR模型更加真实,但由于接收信号强度的不确定性,理论上,Rayleigh衰落模型下链路成功传输的概率达不到1,因此允许链路以很小的概率传输失败。于是当链路成功传输的概率大于或等于1-ε时,则认为该链路被成功调度,其中ε记作可接受的传输失败概率。针对Rayleigh衰落模型下无线网络中链路调度问题,论文的主要工作和创新点如下:(1)首先分析流行的链路调度算法GHW,得到任意两条成功链路之间的最短距离,使用该距离实现全局干扰局部化。然后利用干扰局部化思想设计集中式Distance-based Link Scheduling(DLS)算法和分布式 DLS(Distributed DLS,DDLS)算法解决 MLS 问题,重复执行DDLS解决SLS问题,并给出O(nlnn)近似因子,其中n是链路数量。最后,与当前流行的链路调度算法比较,仿真验证所设计算法提高了其调度性能。(2)协议干扰模型(protocol interference model,PIM)是一种常见的干扰局部化模型,但由于其简单性,该模型通常得不到准确结论。通过建立PIM的干扰半径与Rayleigh衰落模型下链路成功传输概率1-ε之间的关系,得到Rayleigh衰落模型下应用PIM获得1-ε成功传输概率的充分条件,于是在保证其准确性的同时实现干扰局部化。利用该思想设计集中式和分布式算法解决MLS问题,仿真结果表明所设计算法提高了 GHW的调度性能。(3)利用节点传输范围与链路长度之间的关系实现干扰局部化,并证明传输范围之外的累加干扰有上界且不会对链路成功传输与否产生影响,在此基础上应用PIM分别设计分布式的异步和同步算法解决链路调度问题,从而实现高传输可靠性和低传输时延。然后,使用局部信息为每条链路的发送端设置发起传输的概率来设计分布式算法解决SLS问题。最后,仿真验证所设计算法可以从不同程度上提高传输可靠性与延迟性能。(4)分析传统链路多样性划分算法LDP,得到任意两条成功链路之间的最短距离,并实现干扰局部化,然后结合相继干扰消除技术(successive interference cancellation,SIC)和载波侦听机制,分别提出了改进的LDP算法和分布式Carrier Sensing based Distributed Recursive Link Elimination(CSDRLE)算法解决链路调度问题。最后,仿真结果表明CSDRLE算法的调度性能明显优于GHW和LDP算法的调度性能,并在某些场景下优于(3)中同步分布式链路调度算法的调度性能。

    ...
  • 10.用于大规模MIMO可见光通信的空间调制技术

    • 关键词:
    • 可见光通信 多输入多输出 空间调制 基金资助:国家自然科学基金(61771289,61672321); 专辑:基础科学 信息科技 专题:电信技术 分类号:TN929.1 手机阅读
    • 孙坤;韩璐;武舒;闫碧薇
    • 期刊

    可见光(Visible Light Communication,VLC)通信作为无线通信的一个全新手段,引起了国内外研究者的广泛关注,是今后研究光无线通信的一个重要方向.基于发光二极管(LED)的可见光通信将照明和数据通信融合到应用中,能够实现高能效,高频谱效率以及相对较好的安全性和可靠性.而大规模多输入多输出(MIMO)更是具有提高可见光通信(VLC)系统传输速率的巨大潜力.然而,高通道间干扰(ICI)是严重影响传输性能的主要因素.在本文中,利用发射机处已知的信道状态信息(CSI),通过分析MIMO-VLC的特殊特征,提出了可见光链路容忍集调度算法(LTS-MIMO),并且对它们进行最优调度,以提高网络的吞吐量从而达到最大化网络性能的目的.

    ...
  • 排序方式:
  • 18
  • /