In this paper, we investigate the physical layer security issue in Device-to-Device (D2D) communications underlaying cellular networks. In order to optimize the system secrecy rate of the cellular secure communication...
详细信息
ISBN:
(纸本)9781479966653
In this paper, we investigate the physical layer security issue in Device-to-Device (D2D) communications underlaying cellular networks. In order to optimize the system secrecy rate of the cellular secure communication, we derive the optimal joint power control solutions of both the cellular communication links and D2D pairs in terms of the secrecy capacity. Furthermore, we propose a secrecy-based joint power and access control (JPAC) scheme with optimum D2D pair selection mechanism that can achieve an improved network secrecy performance with very low computational complexity. Simulation results validate the efficiency of the proposed secrecy-based JPAC scheme.
Device-to-device (D2D) communication has been recognized as a promising technique to offload the traffic for the evolved Node B (eNB). However, D2D transmission as an underlay causes severe interference to both the ce...
详细信息
We propose a quasi-static time-slot allocation scheme in hybrid optical packet/circuit switched networks. We study the utilization and latency performance of this scheme. Both the theoretical and simulation results ve...
详细信息
We report a compact optical clock scheme based on caesium (Cs) atomic beam, which extends the application of Cs from microwave frequency standard to optical frequency standard. Considering the 1.2 MHz narrow natural-l...
详细信息
ISBN:
(纸本)9781509020928
We report a compact optical clock scheme based on caesium (Cs) atomic beam, which extends the application of Cs from microwave frequency standard to optical frequency standard. Considering the 1.2 MHz narrow natural-linewidth of the excited state 7P 1/2 and 7P 3/2 , we can lock the laser frequency on the 455 nm or 459 nm transition line with the method of saturated absorption spectroscopy (SAS) to achieve a compact optical clock. Under the condition of 1.4 MHz narrow-linewidth laser spectrum and 100,000 signal to noise ratio (SNR), the limited stability of the compact Cs optical clock is expected to be 2.2×10 -14 at 1 s. The performance of this Cs optical clock is superior to that of hydrogen atomic clock. Compared with the traditional Cs atomic clocks, the compact Cs optical clock has potentially better stability.
Coherent pulse stacking with a 9ns effectively-long burst of equal amplitude chirped pulses into a single pulse using a compact cascade of four Gires-Tournois interferometers is experimentally demonstrated with a fibe...
详细信息
ISBN:
(纸本)9781943580118
Coherent pulse stacking with a 9ns effectively-long burst of equal amplitude chirped pulses into a single pulse using a compact cascade of four Gires-Tournois interferometers is experimentally demonstrated with a fiber chirped pulse amplification system.
Practical security of the continuous-variable quantum key distribution (CVQKD) system with finite sampling bandwidth of analog-to-digital converter (ADC) at the receiver's side is investigated. We find that the fi...
详细信息
Practical security of the continuous-variable quantum key distribution (CVQKD) system with finite sampling bandwidth of analog-to-digital converter (ADC) at the receiver's side is investigated. We find that the finite sampling bandwidth effects may decrease the lower bound of secret key rate without awareness of the legitimate communicators. This leaves security loopholes for Eve to attack the system. In addition, this effect may restrains the linear relationship of secret key bit rate with repetition rate of the system; subsequently, there is a saturation value for the secret key bit rate with the repetition rate. To resist such kind of effects, we propose a dual sampling detection approach in which two ADCs are employed so that the finite sampling bandwidth effects are removed.
We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalen...
详细信息
We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015); Phys. Rev. X 5, 041009 (2015); Phys. Rev. X 5, 041010 (2015)]. In those recent works, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.
We report an experimental terabit coherent optical transmission system with 1.25Tb/s Nyquist PDM 64-QAM signal. This is achieved over 400km standard single-mode fiber with erbium-doped fiber amplifier only amplificati...
详细信息
We investigate the performance of free-space discrete multi-tone (DMT) modulation and direct detection system. 1-to-72 multicasting (8 wavelengths × 9 OAM modes) of 17.875 Gb/s DMT QPSK signal is demonstrated and...
详细信息
In this article, the authors focus on a correlated channel model for secure relay beamforming in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information w...
详细信息
ISBN:
(纸本)9781509013296
In this article, the authors focus on a correlated channel model for secure relay beamforming in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of a amplify-and-forward (AF) relay equipped with multiple antennas. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper. The relay only have the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derived the conditional distribution of the eavesdropping channel. Three beamformers at the relay are studied: the zero-forcing (ZF) beamformer, the generalized match-forward (GMF) beamformer and the general-rank beamformer (GRBF). The authors found that the ZF beamformer is invalid in this system, and the GMF beamformer is the optimal rank-1 beamformer, and the GRBF is the iteratively optimal beamformer. Numerical results are presented to illustrate three beamformers' performance, and the impacts of different parameters, especially the channel correlation, on the system performance are analyzed.
暂无评论