• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

有限码长条件下机器类型通信中无线信息监测的性能分析

Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime.

作者信息

Dong Ruonan, Li Baogang, Yan Binyang

机构信息

Department of Electronic and Communication Engineering, North China Electric Power University, No. 619, Yong Hua Street, Baoding 071003, China.

出版信息

Sensors (Basel). 2019 Jul 9;19(13):3031. doi: 10.3390/s19133031.

DOI:10.3390/s19133031
PMID:31324068
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6651699/
Abstract

The Internet of Things (IoT) will feature pervasive sensing and control capabilities via the massive deployment of machine-type communication devices in order to greatly improve daily life. However, machine-type communications can be illegally used (e.g., by criminals or terrorists) which is difficult to monitor, and thus presents new security challenges. The information exchanged in machine-type communications is usually transmitted in short packets. Thus, this paper investigates a legitimate surveillance system via proactive eavesdropping at finite blocklength regime. Under the finite blocklength regime, we analyze the channel coding rate of the eavesdropping link and the suspicious link. We find that the legitimate monitor can still eavesdrop the information sent by the suspicious transmitter as the blocklength decreases, even when the eavesdropping is failed under the Shannon capacity regime. Moreover, we define a metric called the effective eavesdropping rate and study the monotonicity. From the analysis of monotonicity, the existence of a maximum effective eavesdropping rate for a moderate or even high signal-to-noise (SNR) is verified. Finally, numerical results are provided and discussed. In the simulation, we also find that the maximum effective eavesdropping rate slowly increases with the blocklength.

摘要

物联网(IoT)将通过大规模部署机器类型通信设备来实现广泛的传感和控制能力,从而极大地改善日常生活。然而,机器类型通信可能会被非法使用(例如,被犯罪分子或恐怖分子利用),且难以监控,因此带来了新的安全挑战。机器类型通信中交换的信息通常以短数据包的形式传输。因此,本文研究了在有限码长情况下通过主动窃听实现的合法监测系统。在有限码长情况下,我们分析了窃听链路和可疑链路的信道编码率。我们发现,即使在香农容量条件下窃听失败,随着码长的减小,合法监测器仍能窃听可疑发射机发送的信息。此外,我们定义了一个称为有效窃听率的指标并研究其单调性。通过对单调性的分析,验证了在中等甚至高信噪比(SNR)情况下存在最大有效窃听率。最后,给出并讨论了数值结果。在仿真中,我们还发现最大有效窃听率随码长缓慢增加。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/3771d550dd30/sensors-19-03031-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/43850cdf5deb/sensors-19-03031-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/d055ff27b088/sensors-19-03031-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/f37003ae5e20/sensors-19-03031-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/5c70d9e2b509/sensors-19-03031-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/8e3d917f4ee2/sensors-19-03031-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/3771d550dd30/sensors-19-03031-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/43850cdf5deb/sensors-19-03031-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/d055ff27b088/sensors-19-03031-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/f37003ae5e20/sensors-19-03031-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/5c70d9e2b509/sensors-19-03031-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/8e3d917f4ee2/sensors-19-03031-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a137/6651699/3771d550dd30/sensors-19-03031-g005.jpg

相似文献

1
Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime.有限码长条件下机器类型通信中无线信息监测的性能分析
Sensors (Basel). 2019 Jul 9;19(13):3031. doi: 10.3390/s19133031.
2
Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels.基于衰落信道低功耗的可疑无人机窃听和干扰选择策略。
Sensors (Basel). 2019 Mar 5;19(5):1126. doi: 10.3390/s19051126.
3
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments.一种用于减轻物联网环境中干扰和窃听攻击的物理层安全协作框架。
Sensors (Basel). 2024 Aug 10;24(16):5171. doi: 10.3390/s24165171.
4
Optimal Channel Training Design for Secure Short-Packet Communications.最优信道训练设计用于安全短包通信。
Sensors (Basel). 2023 Jan 17;23(3):1068. doi: 10.3390/s23031068.
5
Effective Energy Efficiency under Delay-Outage Probability Constraints and F-Composite Fading.延迟中断概率约束和F-复合衰落条件下的有效能量效率
Sensors (Basel). 2024 Apr 6;24(7):2328. doi: 10.3390/s24072328.
6
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.编码层对物理层安全的影响:一种保密效益方法。
Entropy (Basel). 2019 Aug 1;21(8):755. doi: 10.3390/e21080755.
7
Finite blocklength feedback approach for multi-antenna wireless channels.有限块长反馈方法在多天线无线信道中的应用。
PLoS One. 2024 Feb 15;19(2):e0297810. doi: 10.1371/journal.pone.0297810. eCollection 2024.
8
Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices.物联网设备红外通信中的窃听漏洞与对策
Sensors (Basel). 2021 Dec 8;21(24):8207. doi: 10.3390/s21248207.
9
Optimizing Finite-Blocklength Nested Linear Secrecy Codes: Using the Worst Code to Find the Best Code.优化有限块长嵌套线性保密码:利用最差码寻找最佳码。
Entropy (Basel). 2023 Oct 17;25(10):1456. doi: 10.3390/e25101456.
10
Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers.基于实验体模型的新一代无导线心脏起搏器安全性分析。
Sensors (Basel). 2018 Dec 7;18(12):4327. doi: 10.3390/s18124327.

本文引用的文献

1
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.两用户同时进行无线信息与能量传输传感器网络协作迫零干扰的安全传输
Sensors (Basel). 2018 Jan 24;18(2):331. doi: 10.3390/s18020331.
2
Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper.基于能量收集的窃听者的认知传感器无线网络的保密性能分析
Sensors (Basel). 2017 May 4;17(5):1026. doi: 10.3390/s17051026.
3
The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.
具有不同中继行为的协作通信系统的物理层安全实验
Sensors (Basel). 2017 Apr 6;17(4):781. doi: 10.3390/s17040781.
4
Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks.多用户多中继协作网络中机会调度的物理层安全性能分析
Sensors (Basel). 2017 Feb 15;17(2):377. doi: 10.3390/s17020377.
5
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.基于选择式放大转发与协作干扰的无线传感器网络安全多用户通信
Sensors (Basel). 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908.