Proportional delay, which is different from time-varying delays and distributed delay, is a kind of unbounded delay. The proportional delay system as an important mathematical model often rises in ...some various fields such as control theory, physics and biology systems. This paper is concerned with the finite-time and the fixed-time synchronization problem for a class of inertial neural networks with multi-proportional delays. First, by constructing a proper variable substitution, the original inertial neural networks with multi-proportional delays can be rewritten as a first-order differential system. Second, by constructing Lyapunov functionals and by using analytical techniques, and together with novel control algorithms, some new and effective criteria are established to achieve finite-time and fixed-time synchronization of the master/slave of addressed systems. Finally, several examples and their simulations are given to illustrate the effectiveness of the proposed method. Furthermore, a secure communication synchronization problem is presented to illustrate the effectiveness of the obtained results.
In this paper, we study an intelligent reflecting surface (IRS)-aided wireless secure communication system, where an IRS is deployed to adjust its reflecting elements to secure the communication of ...multiple legitimate users in the presence of multiple eavesdroppers. Aiming to improve the system secrecy rate, a design problem for jointly optimizing the base station (BS)'s beamforming and the IRS's reflecting beamforming is formulated considering different quality of service (QoS) requirements and time-varying channel conditions. As the system is highly dynamic and complex, and it is challenging to address the non-convex optimization problem, a novel deep reinforcement learning (DRL)-based secure beamforming approach is firstly proposed to achieve the optimal beamforming policy against eavesdroppers in dynamic environments. Furthermore, post-decision state (PDS) and prioritized experience replay (PER) schemes are utilized to enhance the learning efficiency and secrecy performance. Specifically, a modified PDS scheme is presented to trace the channel dynamic and adjust the beamforming policy against channel uncertainty accordingly. Simulation results demonstrate that the proposed deep PDS-PER learning based secure beamforming approach can significantly improve the system secrecy rate and QoS satisfaction probability in IRS-aided secure communication systems.
This article considers an artificial noise (AN)-aided secure MIMO wireless communication system. To enhance the system security performance, the advanced intelligent reflecting surface (IRS) is ...invoked, and the base station (BS), legitimate information receiver (IR) and eavesdropper (Eve) are equipped with multiple antennas. With the aim for maximizing the secrecy rate (SR), the transmit precoding (TPC) matrix at the BS, covariance matrix of AN and phase shifts at the IRS are jointly optimized subject to constrains of transmit power limit and unit modulus of IRS phase shifts. Then, the secrecy rate maximization (SRM) problem is formulated, which is a non-convex problem with multiple coupled variables. To tackle it, we propose to utilize the block coordinate descent (BCD) algorithm to alternately update the variables while keeping SR non-decreasing. Specifically, the optimal TPC matrix and AN covariance matrix are derived by Lagrangian multiplier method, and the optimal phase shifts are obtained by Majorization-Minimization (MM) algorithm. Since all variables can be calculated in closed form, the proposed algorithm is very efficient. We also extend the SRM problem to the more general multiple-IRs scenario and propose a BCD algorithm to solve it. Simulation results validate the effectiveness of system security enhancement via an IRS.
With the significant improvement in deployment of Internet of Things (IoT) into the smart grid infrastructure, the demand for cyber security is rapidly growing. The Energy Internet (EI) also known as ...the integrated internet-based smart grid and energy resources inherits all the security vulnerabilities of the existing smart grid. The security structure of the smart grid has become inadequate in meeting the security needs of energy domains in the 21st century. In this paper, we propose a cyber security framework capable of providing adequate security and privacy, and supporting efficient energy management in the EI. The proposed framework uses an identity-based security mechanism (I-ICAAAN), a secure communication protocol and an Intelligent Security System for Energy Management (ISSEM) to certify security and privacy in the EI. Nash Equilibrium solution of game theory is applied for the evaluation of our proposed ISSEM based on security events allocation. The formal verification and theoretical analysis show that our proposed framework provides security and privacy improvement for IoT-based EI.
•The security and privacy of components, data and events in the Energy Internet.•The framework relies on an identity-based security mechanism.•A secure communication protocol that provides secure data exchange.•An Intelligent Security System for Energy Management to handle security metrics.•The framework prevents security attacks and support energy management.
In order to solve the problem of key exposure in the laser chaotic system, an electro-optic coupled mutual injection chaotic system based on classical electro-optic intensity chaotic model is ...proposed in this paper. Firstly, the paper presents the simulation model of the system, and then analyzes the complexity, key hiding, key space size and communication robustness of the chaotic. The results show that the chaotic signal output by the system has a high degree of randomness. The power distribution in the spectrum is uniform; the output chaotic signal is complex, and the waveform is difficult to predict and decipher. In terms of secrecy performance, the key parameters can be effectively hidden under the physically achievable system gain. In addition, the communication system based on this structure maintains high sensitivity to key parameters, and has low sensitivity to the mismatch of common parameters, thus achieving better secrecy and synchronization effects.
•The traditional strength chaotic system has low complexity and cannot realize key hiding.•The introduction of coupled mutual injection system structure improves the system’s nonlinearity, realizes key hiding, and improves the output performance.•Multiple loops introduce multiple delay time parameters which increase the key space of the system.
Continuous memristor has been widely used in chaotic oscillating circuits and neuromorphic computing systems. However, discrete memristor and its coupling discrete map have not been noticed yet. This ...article presents a discrete memristor and constructs a general two-dimensional memristive map model by coupling the discrete memristor with an existing discrete map. The pinched hysteresis loops of the discrete memristor are demonstrated. Four examples of memristive discrete maps are provided and their coupling strength-relied and memristor initial-boosted complex dynamics are investigated using numerical measures. The evaluation results manifest that the discrete memristor can enhance the chaos complexity and its coupling maps can generate hyperchaos. Particularly, the hyperchaotic sequences can nondestructively be controlled by memristor initial state and the initial-controlled hyperchaos is robust, which is applicable to many chaos-based applications. Additionally, we develop a hardware platform to implement the memristive maps and acquire the four-channel hyperchaotic sequences. We also apply the memristive maps to the application of secure communication and the experiments show that the memristive maps display better performance than some existing discrete maps.
The Internet of Things (IoT) technology requires low latency communications. One of the lightweight protocols in the IoT is the MQTT protocol. However, the MQTT protocol is not equipped with the ...appropriate security mechanism. As a consequence, the MQTT messages are easily eavesdropped and modified by the attackers. This research studies the use of AES cryptography-based communication scheme against the TLS-based communication scheme, which can be used to create end-to-end secure communication channels from the MQTT publishers to the MQTT subscribers. Experimental results show that the TLS-based communication scheme possess the highest cost in terms of communication delay and network cost among all schemes in the experiment. Eventually, the AES-based MQTT communication scheme is more appropriate for IoT environments because of its communication delay and network cost, which are considerably equal to the plaintext-based MQTT communications.
This paper investigates a novel unmanned aerial vehicles (UAVs) secure communication system with the assistance of reconfigurable intelligent surfaces (RISs), where a UAV and a ground user ...communicate with each other, while an eavesdropper tends to wiretap their information. Due to the limited capacity of UAVs, an RIS is applied to further improve the quality of the secure communication. The time division multiple access (TDMA) protocol is applied for the communications between the UAV and the ground user, namely, the downlink (DL) and the uplink (UL) communications. In particular, the channel state information (CSI) of the eavesdropping channels is assumed to be imperfect. We aim to maximize the average worst-case secrecy rate by the robust joint design of the UAV's trajectory, RIS's passive beamforming, and transmit power of the legitimate transmitters. However, it is challenging to solve the joint UL/DL optimization problem due to its non-convexity. Therefore, we develop an efficient algorithm based on the alternating optimization (AO) technique. Specifically, the formulated problem is divided into three sub-problems, and the successive convex approximation (SCA), <inline-formula> <tex-math notation="LaTeX">\mathcal {S} </tex-math></inline-formula>-Procedure, and semidefinite relaxation (SDR) are applied to tackle these non-convex sub-problems. Numerical results demonstrate that the proposed algorithm can considerably improve the average secrecy rate compared with the benchmark algorithms, and also confirm the robustness of the proposed algorithm.