Security analysis and secured access design for networks of image remote sensing

IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Digital Communications and Networks Pub Date : 2025-02-01 DOI:10.1016/j.dcan.2023.05.004
Juan Zhao , Haibo Dai , Xiaolong Xu , Hao Yan , Zheng Zhang , Chunguo Li
{"title":"Security analysis and secured access design for networks of image remote sensing","authors":"Juan Zhao ,&nbsp;Haibo Dai ,&nbsp;Xiaolong Xu ,&nbsp;Hao Yan ,&nbsp;Zheng Zhang ,&nbsp;Chunguo Li","doi":"10.1016/j.dcan.2023.05.004","DOIUrl":null,"url":null,"abstract":"<div><div>The secured access is studied in this paper for the network of the image remote sensing. Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point. In order to enhance the sensing quality for the remote uploading, the passive reflection surface technique is employed. If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks, he may receive the same image from this sensor. Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images. In order to achieve this goal, the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients. Based on this theoretical result, the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor. Finally, the analytical expression is theoretically derived for the optimum uploading power. Numerical simulations verify the design approach.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 136-144"},"PeriodicalIF":7.5000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S235286482300086X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The secured access is studied in this paper for the network of the image remote sensing. Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point. In order to enhance the sensing quality for the remote uploading, the passive reflection surface technique is employed. If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks, he may receive the same image from this sensor. Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images. In order to achieve this goal, the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients. Based on this theoretical result, the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor. Finally, the analytical expression is theoretically derived for the optimum uploading power. Numerical simulations verify the design approach.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
图像遥感网络的安全分析与安全访问设计
本文研究了图像遥感网络的安全访问问题。该网络中的每个传感器在将图像信息从传感器无线上传至中央采集点时都会遇到信息安全问题。为了提高远程上传的传感质量,采用了被动反射面技术。如果存在于该传感器附近的一个窃听者一直在访问相同的网络,他可能会从该传感器接收到相同的图像。本文的目标是通过自适应调整该传感器的上传功率,在提高合法采集单元信噪比的同时,尽可能降低窃听者的信噪比,以增强遥感图像的安全性。为了实现这一目标,通过计算信道衰落系数上的瞬时性能,从理论上分析了相对于被动反射元件数量的安全能效性能。基于这一理论结果,将安全访问问题表述为一个数学优化问题,将传感器上传功率作为未知变量进行调整,目标是在满足窃听传感器所要求的任何最大数据速率的情况下,实现能效最大化。最后,从理论上推导了最优上传功率的解析表达式。数值模拟验证了设计方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Digital Communications and Networks
Digital Communications and Networks Computer Science-Hardware and Architecture
CiteScore
12.80
自引率
5.10%
发文量
915
审稿时长
30 weeks
期刊介绍: Digital Communications and Networks is a prestigious journal that emphasizes on communication systems and networks. We publish only top-notch original articles and authoritative reviews, which undergo rigorous peer-review. We are proud to announce that all our articles are fully Open Access and can be accessed on ScienceDirect. Our journal is recognized and indexed by eminent databases such as the Science Citation Index Expanded (SCIE) and Scopus. In addition to regular articles, we may also consider exceptional conference papers that have been significantly expanded. Furthermore, we periodically release special issues that focus on specific aspects of the field. In conclusion, Digital Communications and Networks is a leading journal that guarantees exceptional quality and accessibility for researchers and scholars in the field of communication systems and networks.
期刊最新文献
A blockchain-based user-centric identity management toward 6G networks Editorial Board Cross-domain resources optimization for hybrid edge computing networks: Federated DRL approach Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication Autonomous network management for 6G communication: A comprehensive survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1