15 results on '"Ren, Pinyi"'
Search Results
2. Development of Physical Layer Security Simulation Platform.
- Author
-
Yang, Wenjun, Du, Qinghe, Liu, Zhiwei, Wang, Meng, and Ren, Pinyi
- Subjects
WIRELESS communications ,PROBLEM solving ,TELECOMMUNICATION ,SECURITY management ,COMMUNICATION of technical information - Abstract
With the rapid development of modern communication technology, more and more attention has been paid to the security of communication. In recent years, the physical layer security technology provides a new way to solve the problem of secure transmission in wireless communication. Physical layer security has become a hot research topic, but there is no special physical layer security simulation platform to provide great help for technical research. In view of this situation, this paper develops a physical layer security simulation platform based on the cross platform development framework QT, which provides visual demonstration and performance evaluation functions for specific technologies. The platform is developed with C plus plus language, and different simulation scenarios are customized for different technical schemes to simulate the simulation process. Starting from the architecture of the simulation platform, this paper presents the simulation process and evaluation results of several selected physical layer security directions, and describes the simulation platform in detail. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. Joint Network Coding and ARQ Design Toward Secure Wireless Communications.
- Author
-
He, Hongliang, Ren, Pinyi, and Tang, Xiao
- Subjects
- *
DATA transmission systems , *WIRELESS communications , *LINEAR network coding , *PROBABILITY theory , *ALGORITHMS - Abstract
The broadcast nature of wireless communications makes transmission susceptible to eavesdropping. Recently, physical-layer security has been extensively studied to secure the wireless transmissions, but the security is severely compromised when the eavesdropper has the superiority in the channel quality. Toward this issue, we in this paper propose a joint ARQ and network coding method exploiting the characteristics of both the physical layer and the link layer. Specifically, we relate the message to be transmitted in the current slot with the successfully decoded messages in previous slots, where the ARQ is employed at the legitimate side to guarantee the successful transmission and decoding. Once one or more received messages fail to be decoded at the eavesdropper, it further prevents the eavesdropper from decoding the transmissions in later slots and thus the message transmitted currently and later is secured at the legitimate side. Moreover, for the more disadvantageous case that the eavesdropper is geographically closer to the transmitter, we further propose a destination-aided network coding scheme, which secures private information no matter where the eavesdropper is. The closed-form expressions of intercept probability and loss probability of the private information are analytically presented. The simulation results are provided to confirm our theoretical findings. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
4. Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design.
- Author
-
He, Hongliang and Ren, Pinyi
- Subjects
- *
AUTOMATIC Repeat reQuest (Data transmission system) , *TELECOMMUNICATION protocols , *WIRELESS communications , *SAINT Hilaire method , *LINEAR network coding , *BEAMFORMING , *MIMO systems , *SIGNAL-to-noise ratio - Abstract
In this paper, we consider secure transmission of a private file, which comprises multiple packets. A network-coding assisted automatic-repeat-request (ARQ) scheme is proposed to improve the security at both file level and packet level. Specially, the ARQ protocol degrades the intercept probability of the whole file at the eavesdropper, while the network coding guarantees the per-packet security. The closed-form intercept probability and outage probability of the whole file and each packet are analytically presented, and we then investigate the tradeoff between the security performance and the outage probability. The proposed scheme is further extended to the cooperative ARQ scenario, and simulation results are provided to corroborate our theoretical findings. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
5. Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks.
- Author
-
Tang, Xiao, Ren, Pinyi, and Han, Zhu
- Subjects
INFORMATION technology security ,WIRELESS communications ,NASH equilibrium ,MATHEMATICAL programming ,RESOURCE allocation - Abstract
Information security is a critical yet challenging issue for wireless communications. In this paper, we consider the distributed resource competition in a network that consists of both security-oriented users (SeUs) and regular users (ReUs) which, respectively, intend for secrecy rate and transmission rate maximization. To enhance wireless security, the SeUs are given higher priorities such that they are allowed to take action first in the competition, which gives rise to the multi-leader-follower hierarchical game formulation where the SeUs are the leaders in the upper layer and ReUs are the followers in the lower layer. However, the solution to the lower sub-game among the ReUs, in the form of a Nash equilibrium parameterized by the upper strategy, lacks closed-form expression, which hinders us from solving the hierarchical game effectively. To tackle this issue, we first consider the case with one leader and reformulate the game as a mathematical program with equilibrium constraints (MPEC). Then, the MPEC is transformed as a single-level optimization and solved through successive concave approximation. For the general case that comprises multiple leaders, the equilibrium program with equilibrium constraints (EPEC) is introduced for the game reformulation. Due to the inherent difficulties of EPEC, the relaxed concept of local Nash equilibrium (LNE) is introduced as the solution. Furthermore, the existence and uniqueness of the LNE are investigated with the variational inequality-based analysis. Finally, simulation results are provided to corroborate our theoretical findings. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
6. Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks.
- Author
-
Tang, Xiao, Ren, Pinyi, Du, Qinghe, and Gao, Feifei
- Subjects
- *
WIRELESS communications , *NASH equilibrium , *CELL phone systems , *QUALITY of service , *NETWORK analysis (Communication) - Abstract
Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the uplink transmissions in ultra-dense networks, where the increased interference along with the increased density significantly challenges the efficient utilization of network resources as well as the provisioning of users’ quality of services (QoS). Targeting these issues, we consider the QoS in terms of target signal-to-interference-plus-noise ratio (SINR) and power consumption simultaneously for each user within a multi-objective optimization model. We then investigate the interactions among users by leveraging the non-cooperative game-theoretical framework. By characterizing the properties of Nash equilibrium, we develop the target-SINR oriented resource allocation (TORA) algorithm, which features distributed implementation. Moreover, we obtain the condition to guarantee the convergence of our proposed TORA algorithm and demonstrate that it adapts to different interfering scenarios. Furthermore, considering the heterogeneous service requirements in real practice, we also design the target-SINR constrained resource allocation (TCRA) algorithm, such that TORA and TCRA are able to cope with voice and data services, respectively. Also provided are the simulation results, which demonstrate that, compared with the counterparts, our proposals more effectively guarantee the target-SINR for users with efficient power utilization. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
7. Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework.
- Author
-
Tang, Xiao, Ren, Pinyi, and Han, Zhu
- Subjects
- *
DISTRIBUTED algorithms , *BEAMFORMING , *WIRELESS communications , *NASH equilibrium , *MATHEMATICS theorems - Abstract
In this paper, we consider the physical layer security issue for the multi-channel full-duplex (FD) communications in the presence of eavesdroppers. There co-exist multiple FD pairs, where the two users in each pair perform bi-directional transmissions. The secure communication is then challenged by the users’ self-interference, external interference from other pairs, and threats from the eavesdroppers. We investigate the problem from a distributed perspective and formulate the problem as a non-cooperative game, where each user optimizes their power allocation over the channels to maximize their own secrecy rate. Confirming the existence of the Nash equilibrium, we introduce an equivalent variational inequality (VI) formulation to derive the sufficient condition for the equilibrium to be unique. We then develop the iterative security-aware water-filling (ISWF) algorithm that can be implemented at each individual user in a distributed manner and prove that the condition for the unique equilibrium also claims the convergence of ISWF algorithm. Furthermore, we extend our formulation to the heterogeneous cases that there co-exist FD and half-duplex users with different security requirements in the networks, and demonstrate that they can all be covered as special cases under our formulated VI framework. Finally, we present simulation results to validate our theoretical findings. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
8. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective.
- Author
-
Tang, Xiao, Ren, Pinyi, Wang, Yichen, and Han, Zhu
- Subjects
- *
EAVESDROPPING , *WIRELESS communications , *MATHEMATICAL programming , *RADIO interference , *MATHEMATICAL models , *BEAMFORMING , *PREVENTION - Abstract
Security is an issue of paramount importance, yet is it a significant challenge for wireless communications, which becomes more intricate when facing a full duplex (FD) active eavesdropper capable of performing eavesdropping and jamming simultaneously. In this paper, we investigate the physical layer security issue in the presence of an FD active eavesdropper, who launches jamming attacks to further improve the eavesdropping. The jamming, however, also results in self-interference at the eavesdropper itself. This security problem is formulated within a hierarchical game framework where the eavesdropper acts as the leader and the legitimate user is the follower. In particular, we first investigate the follower’s secrecy rate maximization problem and derive the optimal legitimate transmission strategy. Then, the leader’s wiretap rate maximization is expressed as a mathematical program with equilibrium constraints (MPEC). Leveraging the concavity of the follower’s problem, we transform the MPEC problem into a single-level optimization and obtain the jamming power allocation strategy by applying the primal-dual interior-point method. Moreover, we analyze the situations where only partial channel state information is available at the legitimate user and the corresponding impacts on the game. Finally, we present extensive simulation results to validate our theoretical analysis. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
9. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation.
- Author
-
Sun, Li, Du, Qinghe, Ren, Pinyi, and Wang, Yichen
- Subjects
WIRELESS communications ,PERFORMANCE evaluation ,RELAYING (Electric power systems) ,FEMTOCELLS ,GAUSSIAN function - Abstract
This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other and simultaneously serve as relays to assist the two-way transmissions between two cellular users. For this scenario, both cellular and D2D links share the same spectrum, thus creating mutual interference. In addition to that, a security problem also exists since the cellular users want to keep their messages secret from the D2D users and vice versa. To address these two issues, a security-embedded interference avoidance scheme is proposed in this paper. By exploiting the constellation rotation technique, the proposed scheme can create interference-free links for both D2D and cellular communications, thereby significantly improving the system error performance. Moreover, our scheme also provides an inherent secrecy protection at the physical layer, which makes the information exchange between cellular users and that between D2D users confidential from each other. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
10. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.
- Author
-
Du, Qinghe, Zhao, Weidong, Li, Weimin, Zhang, Xuelin, Sun, Bo, Song, Houbing, Ren, Pinyi, Sun, Li, and Wang, Yichen
- Subjects
HEALTH care rationing ,INTELLECT ,TELEMEDICINE ,WIRELESS communications ,DATA security ,DATA analytics - Abstract
The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
11. Performance of energy detector in the presence of noise uncertainty in cognitive radio networks.
- Author
-
Yin, Wenshan, Ren, Pinyi, Cai, Jun, and Su, Zhou
- Subjects
- *
RADIO networks , *WIRELESS communications , *GAUSSIAN distribution , *SIGNAL-to-noise ratio , *DETERMINISTIC algorithms , *SIGNALS & signaling - Abstract
Energy detector is simple in structure and easy to implement. Therefore, it is a promising candidate for spectrum sensing in cognitive radio networks. However, its detection performance is typically challenged by the noise uncertainty. Thus, the detection performance of energy detector in the presence of noise uncertainty needs to be evaluated. In this paper, we derive the decision rules for the energy detector in the presence of noise uncertainty by employing a widely used model. Firstly, we derive the decision rule for unknown deterministic signal when the noise power is uncertain. Second, we derive the decision rule for random Gaussian distributed signal when there is noise uncertainty. Then, we analyze the detection performance of the energy detector in the presence of noise uncertainty for both unknown deterministic signal and random Gaussian distributed signal. Both theoretical analyses and simulation results show that in the presence of noise uncertainty, our derived decision rules provide precise sensing thresholds for the energy detector. Furthermore, compared with the conventional decision rule obtained by overestimating the noise power, our decision rules provide performance gains in terms of signal to noise ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
12. Joint packet scheduling and resource allocation with quality fairness for wireless VoD system.
- Author
-
Li, Fan and Ren, Pinyi
- Subjects
RESOURCE allocation ,WIRELESS communications ,QUALITY of service ,VIDEO on demand ,SCHEDULING software ,CROSS layer optimization ,IEEE 802.16 (Standard) - Abstract
This paper investigates the problem of multiuser packet scheduling and resource allocation for video transmission over downlink OFDMA networks. A cross-layer approach is proposed to maximize the received video quality under the video quality fairness constraint. Unlike the previous methods in which the objective index is estimated the video quality in the unit of bit, the proposed algorithm develops the objective index in unit of packet, which is more fit for video transmission. In order to solve the optimization problem, a suboptimal algorithm of joint packet scheduling and resource allocation is proposed. The algorithm is compatible with the emerging wireless standards, such as IEEE 802.16. The simulation results show that the proposed method outperforms the conventional resource allocation schemes in terms of received video qualities and quality fairness. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
13. Recall-Based Dynamic Spectrum Auction with the Protection of Primary Users.
- Author
-
Wu, Guangen, Ren, Pinyi, and Du, Qinghe
- Subjects
HEURISTIC algorithms ,QUALITY of service ,INDEXES ,INTERFERENCE suppression ,WIRELESS communications ,SPECTRUM analysis ,RADIO networks - Abstract
Dynamic spectrum auction is considered as an effective solution to improve spectrum utilization efficiency in dynamic spectrum sharing networks because it can provide an economic incentive to motivate primary users to share their idle spectrum with secondary users. However, the primary users' own quality of services (QoS) cannot be guaranteed in case of demand peak because their spectrum is being used by the winners at auction. To solve this problem, we propose a recall-based dynamic spectrum auction (RBDSA) algorithm with which a primary base station (PBS) can auction its unused channels to some secondary wireless services providers (SWSPs) safely and economically. The PBS' users are granted a higher channel access priority than the SWSPs, then the PBS can recall some channels after auction to satisfy its demand if necessary. To maximize its profit from spectrum auction and self services, the PBS will reduce its excessive or deficient channels reservation, which is enforced with an introduction of punishment item in the PBS' utility. We show analytically that both the PBS and the SWSPs in the RBDSA algorithm are truthful and there is a weakly dominant equilibrium. Moreover, it can be extended to the scenarios with multiple units of channels demand and multiple PBSs. Simulation results show that the RBDSA algorithm can increase the utility of the PBS and improve the channels utilization efficiency while keeping the QoS of the primary users. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
14. Joint Packet Scheduling and Subcarrier Assignment for Video Communications Over Downlink OFDMA Systems.
- Author
-
Li, Fan, Ren, Pinyi, and Du, Qinghe
- Subjects
- *
ORTHOGONAL frequency division multiplexing , *BROADBAND communication systems , *WIRELESS communications , *COMPUTATIONAL complexity , *NUMERICAL analysis - Abstract
This paper investigates the joint optimization of multiuser packet scheduling and wireless resource allocation for video communications over downlink orthogonal frequency-division multiple-access (OFDMA) systems. The objective is to maximize the expected video quality of all mobile users under the wireless resource and delay-bound constraints. We formulate a quality-driven cross-layer problem to jointly optimize the packet scheduling and subcarrier assignment. Using a dual approach, an asymptotically optimal solution is derived to efficiently solve the problem. Furthermore, we propose a suboptimal algorithm to reduce the computational complexity such that the requirements of real-time video applications can be satisfied. Finally, the computational complexity of the algorithms is analyzed, and numerical simulations are carried out to evaluate the performance of the proposed algorithms. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
15. Guest editorial: advances in networking technologies for wireless internet.
- Author
-
Ren, Pinyi and Su, Zhou
- Subjects
EDITORIALS ,WIRELESS Internet ,WIRELESS communications ,MOBILE communication systems ,STANDARDIZATION ,TELECOMMUNICATION ,IEEE 802.11 (Standard) - Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.