Collaborative Interference Strategy for Secure Communication in Power IoT Based on Improved Genetic Algorithm
(1. Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050, China; 2. State Grid Jiangsu Electric Power Company Ltd. Research Institute, Nanjing 211103, China)
MAO Jiahui1, ZHU Xueqiong2, HU Chengbo2, TANG Peiyao1. Collaborative Interference Strategy for Secure Communication in Power IoT Based on Improved Genetic Algorithm[J]. Computer and Modernization, 2025, 0(03): 66-70.
[1] FODOR G, PARKVALL S, SORRENTINO S, et al. Device-to-device communications for national security and public safety[J]. IEEE Access, 2014,2:1510-1520.
[2] 钱胜,王琦,颜云松,等. 计及网络攻击影响的安全稳定控制系统风险评估方法[J]. 电力工程技术, 2022,41(3):14-21.
[3] 李锦煜,刘锐剑,周朝阳,等. 我国能源安全形势技术分析[J]. 电力工程技术, 2023(6):249-255.
[4] WU Y P, KHISTI A, XIAO C S, et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead[J]. IEEE Journal on Selected Areas in Communications, 2018,36(4):679-695.
[5] ZOU Y L, ZHU J, WANG X B, et al. A survey on wireless security: Technical challenges, recent advances, and future trends[J]. Proceedings of the IEEE, 2016,104(9):1727-1765.
[6] WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975,54:1355-1387.
[7] SHABBIR G, AHMAD J, RAZA W, et al. Buffer-aided successive relay selection scheme for energy harvesting IoT networks[J]. IEEE Access, 2019,7:36246-36258.
[8] CAO W F, ZOU Y L, YANG Z, et al. Relay selection for improving physical layer security in hybrid satellite-terrestrial relay networks[J]. IEEE Access, 2018,6:65275-65285.
[9] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008,7(6):2180-2189.
[10] LAI L F, EL GAMAL H. The relay-eavesdropper channel: Cooperation for secrecy[J]. IEEE Transactions on Information Theory, 2008,54(9):4005-4019.
[11] XU D, LI Q. Resource allocation for secure communications in cooperative cognitive wireless powered communication networks[J]. IEEE Systems Journal, 2018,13(3):2431-2442.
[12] MAMAGHANI M T, ABBAS R. Security and reliability performance analysis for two-way wireless energy harvesting based untrusted relaying with cooperative jamming[J]. IET Communications, 2019,13(4):449-459.
[13] SI J B, CHENG Z H, LI Z, et al. Cooperative jamming for secure transmission with both active and passive eavesdroppers[J]. IEEE Transactions on Communications, 2020,68(9):5764-5777.
[14] PRIYANKA D, VEENADHAR D S, SANJEEV R G. Survey on energy efficient clustering and routing protocols of wireless sensor network[J]. International Journal of Scientific Research & Engineering Trends, 2019,5(1):212-218.
[15] YOUNIS O, KRUNZ M, RAMASUBRAMANIAN S. Node clustering in wireless sensor networks: Recent developments and deployment challenges[J]. IEEE Network, 2006,20(3):20-25.
[16] YANG B, WANG W J, FAN J C, et al. Friendly cooperation jamming for secrecy in LOS channel[C]// International Conference on Wireless Communications and Signal Processing (WCSP). WCSP, 2012:1-4.
[17] LI B, ZOU Y L, ZHOU J J, et al. Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks[J]. IEEE Transactions on Communications, 2019,67(5):3482-3495.
[18] HU X Y, MU P C, LI Z M, et al. Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming by single antenna helpers[C]// 2015 IEEE International Conference on Communications and Networking. IEEE, 2015:295-300.
[19] LI G Y, HU A Q. Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security[C]// 2016 IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016:2246-2250.
[20] MO J H, TAO M X, LIU Y, et al. Secure beamforming for MIMO two-way communications with an untrusted relay[J]. IEEE Transactions on Signal Processing, 2014,62(9):2185-2199.
[21] 吴宣利,许智聪,王禹辰,等. 基于信道相关性的物理层安全性能分析[J]. 通信学报, 2021,42(3):65-74.
[22] ZHU T, TONG F. A cluster-based cooperative jamming scheme for secure communication in wireless sensor network[C]// 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall). IEEE, 2020:1-5.
[23] 景小荣,宋振远,高维,等. 智能反射表面辅助的MISO通信系统的物理层安全设计方案[J]. 通信学报, 2022,43(1):117-126.
[24] KEERATIWINTAKORN P, KRISHNAMURTHY P. Energy efficient security services for limited wireless devices[C]// 2006 1st International Symposium on Wireless Pervasive Computing. 2006:1-6.
[25] WANG D, BAI B, CHEN W, et al. Achieving high energy efficiency and physical-layer security in AF relaying[J]. IEEE Transactions on Wireless Communications, 2016,15(1):740-752.
[26] 杨雄,曾飞,袁晓冬,等. 基于区块链的配电物联网数据安全防护方法,装置[J]. 电力工程技术, 2021,40(5):47-53.
[27] 王志伟. 强化学习在无线通信以及物理层安全中的应用研究[D]. 南京:东南大学, 2021.
[28] 景雯,张杰,傅文博,等. 基于改进遗传算法的物联网链路负载均衡控制方法[J]. 吉林大学学报(理学版), 2023,61(4):922-928.