scholarly journals Machine Learning Based Attack Against Artificial Noise-Aided Secure Communication

Author(s):  
Yun Wen ◽  
Makoto Yoshida ◽  
Junqing Zhang ◽  
Zheng Chu ◽  
Pei Xiao ◽  
...  
2021 ◽  
pp. 1-13 ◽  
Author(s):  
Bhabendu Kumar Mohanta ◽  
Debasish Jena ◽  
Niva Mohapatra ◽  
Somula Ramasubbareddy ◽  
Bharat S. Rawal

Smart city has come a long way since the development of emerging technology like Information and communications technology (ICT), Internet of Things (IoT), Machine Learning (ML), Block chain and Artificial Intelligence. The Intelligent Transportation System (ITS) is an important application in a rapidly growing smart city. Prediction of the automotive accident severity plays a very crucial role in the smart transportation system. The main motive behind this research is to determine the specific features which could affect vehicle accident severity. In this paper, some of the classification models, specifically Logistic Regression, Artificial Neural network, Decision Tree, K-Nearest Neighbors, and Random Forest have been implemented for predicting the accident severity. All the models have been verified, and the experimental results prove that these classification models have attained considerable accuracy. The paper also explained a secure communication architecture model for secure information exchange among all the components associated with the ITS. Finally paper implemented web base Message alert system which will be used for alert the users through smart IoT devices.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Quanzhong Li ◽  
Sai Zhao

By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary transmitter under the quality-of-service at the primary user and the transmit power constraint at the secondary transmitter. We consider the practical case that the channel state information (CSI) of the eavesdropper is imperfect, and we model the imperfect CSI by the worst-case model. We show that the robust secrecy rate maximization problem can be transformed to a series of semidefinite programmings based on S-procedure and rank-one relaxation. We also propose an effective method to recover the optimal rank-one solution. Simulations are provided to show the effectiveness of our proposed robust secure algorithm with comparison to the nonrobust secure design and traditional orthogonal multiple access schemes.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Tao Hong ◽  
Geng-xin Zhang

The research of improving the secrecy capacity (SC) of wireless communication system using artificial noise (AN) is one of the classic models in the field of physical layer security communication. In this paper, we consider the peak-to-average power ratio (PAPR) problem in this AN-aided model. A power allocation algorithm for AN subspaces is proposed to solve the nonconvex optimization problem of PAPR. This algorithm utilizes a series of convex optimization problems to relax the nonconvex optimization problem in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation. Furthermore, we also derive the SC of the proposed signal under the condition of the AN-aided model with a finite alphabet and the nonlinear high-power amplifiers (HPAs). Simulation results show that the proposed algorithm reduces the PAPR value of transmit signal to improve the efficiency of HPA compared with benchmark AN-aided secure communication signals in the multiple-input single-output (MISO) model.


Author(s):  
Jonathan M. Gumley ◽  
Hayden Marcollo ◽  
Stuart Wales ◽  
Andrew E. Potts ◽  
Christopher J. Carra

Abstract There is growing importance in the offshore floating production sector to develop reliable and robust means of continuously monitoring the integrity of mooring systems for FPSOs and FPUs, particularly in light of the upcoming introduction of API-RP-2MIM. Here, the limitations of the current range of monitoring techniques are discussed, including well established technologies such as load cells, sonar, or visual inspection, within the context of the growing mainstream acceptance of data science and machine learning. Due to the large fleet of floating production platforms currently in service, there is a need for a readily deployable solution that can be retrofitted to existing platforms to passively monitor the performance of floating assets on their moorings, for which machine learning based systems have particular advantages. An earlier investigation conducted in 2016 on a shallow water, single point moored FPSO employed host facility data from in-service field measurements before and after a single mooring line failure event. This paper presents how the same machine learning techniques were applied to a deep water, semi taut, spread moored system where there was no host facility data available, therefore requiring a calibrated hydrodynamic numerical model to be used as the basis for the training data set. The machine learning techniques applied to both real and synthetically generated data were successful in replicating the response of the original system, even with the latter subjected to different variations of artificial noise. Furthermore, utilizing a probability-based approach, it was demonstrated that replicating the response of the underlying system was a powerful technique for predicting changes in the mooring system.


Sign in / Sign up

Export Citation Format

Share Document