Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fei Pan is active.

Publication


Featured researches published by Fei Pan.


IEEE Communications Letters | 2017

Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks

Lin Hu; Hong Wen; Bin Wu; Jie Tang; Fei Pan

We investigate the physical layer security in cooperative wireless networks where a source (Alice) transmits a confidential message to a destination (Bob) with the help of a cooperative node (Charlie), in the presence of an eavesdropper (Eve). Cooperative transmission is explored to secure communication between Alice and Bob, while ensuring the desired quality of service (QoS) at Charlie’s receiver. We provide a transmit design for outage constrained secrecy rate maximization, taking both security and QoS constraints into account. Unlike the conventional cooperative security that adopts a fixed transmission scheme, we propose a mechanism for transmit strategy adaptation with security protection. Specifically, the proposed cooperative transmission is replaced by a cooperative jamming scheme if either security or QoS constraint is not satisfied. Numerical results confirm that our design enables dynamic transmission, and thus is flexible and environment-adaptive.


international conference on communications | 2016

Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming

Lin Hu; Bin Wu; Jie Tang; Fei Pan; Hong Wen

In this paper, we consider physical layer security in wireless communication networks in which a source (Alice) intends to send a confidential message to a legitimate destination (Bob) with the help of a cooperative jammer (CJ), in the presence of a passive eavesdropper (Eve). Assuming that only statistical channel state information (CSI) of Eve is available, artificial-noise (AN) assisted beamforming and cooperative jamming are designed. The goal is to maximize the secrecy rate, subject to a constraint on secrecy outage probability. Numerical results validate the effectiveness of our scheme. Moreover, a higher secure energy efficiency (EE) can be achieved as compared with other schemes without a cooperative jammer.


Iet Communications | 2016

Associating MIMO beamforming with security codes to achieve unconditional communication security

Jie Tang; Hong Wen; Lin Hu; Huanhuan Song; Gao Yuan Zhang; Fei Pan; Hongbin Liang

This study investigates the framework of associating multiple-input–multiple-output (MIMO) beamforming with secure code to achieve unconditional secure communications in the wireless passive eavesdropping environment. The schemes are based on a two-step method under Wyners wiretap channel model. First, with MIMO transmit beamforming, one can utilise the spatial degree of freedom to cripple eavesdroppers’ interceptions even when he does not know the eavesdroppers channel state information. Consequently, by taking the threshold characteristics of the secure code, the legitimate receivers will continue to extend an average bit error rate advantage over eavesdroppers when they share similar conditions (background noise power and channel gains). By this way, the proposed system could achieve almost zero information obtained by the eavesdroppers while still keeping rather lower error transmissions for the main channel. A profound theoretical analysis for the MIMO advantage channel and the exact closed-form expressions of secrecy outage probability for the secure code joint system are presented. The authors launch extensive experiments to verify the proposed security systems and demonstrate its feasibility and implement ability.


IEEE Access | 2016

Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks

Lin Hu; Hong Wen; Bin Wu; Jie Tang; Fei Pan

We study physical layer security in two-cell wireless networks in which a base station (Alice) intends to send a confidential message to a legitimate user (Bob) with the help of a cooperative base station (Charlie), in the presence of an eavesdropper (Eve). Adaptive base station cooperation is explored to secure communication between Alice and Bob, and ensure the desired quality of service (QoS) at Charlies user. In particular, we consider two different scenarios where the channel state information of Eve is perfectly and statistically known, respectively. In either scenario, we provide a cooperative transmission scheme for secrecy rate maximization, subject to both security and QoS constraints. Unlike the conventional cooperative security with a fixed transmission scheme, we propose a mechanism for transmit strategy adaptation with security protection. Specifically, the cooperative transmission is replaced by a cooperative jamming scheme if either security or QoS constraint is not satisfied. Our design enables adaptive secure transmission, and thus is flexible and environment-adaptive. Moreover, numerical results confirm that our scheme is efficient in power resource utilization.


communications and networking symposium | 2014

A MIMO Cross-layer Precoding Security Communication System

Jie Tang; Huan Huan Song; Fei Pan; Hong Wen; Bin Wu; Yixin Jiang; Xiaobin Guo; Zhen Chen

This paper proposed a MIMO cross-layer precoding secure communications via pattern controlled by higher layer cryptography. By contrast to physical layer security system, the proposed scheme could enhance the security in adverse situations where the physical layer security hardly to be deal with. Two One typical situation is considered. One is that the attackers have the ideal CSI and another is eavesdroppers channel are highly correlated to legitimate channel. Our scheme integrates the upper layer with physical layer secure together to gaurantee the security in real communication system. Extensive theoretical analysis and simulations are conducted to demonstrate its effectiveness. The proposed method is feasible to spread in many other communicate scenarios.


IEEE Transactions on Vehicular Technology | 2018

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers

Lin Hu; Hong Wen; Bin Wu; Jie Tang; Fei Pan; Run-Fa Liao

This paper investigates cooperative security in wireless networks, where a source (Alice) intends to transmit a confidential message to a legitimate destination (Bob), with the help of a cooperative jammer (Charlie), coexisting with multiple passive eavesdroppers (Eves). In particular, by assuming knowledge of Bobs perfect channel state information (CSI) but only Eves’ statistical CSIs, secrecy beamforming with artificial noise (AN) is utilized for secure transmission, and cooperative jamming (CJ) is explored to further enhance secrecy. We first derive an accurate closed-form expression for the secrecy outage probability (SOP), and establish the condition under which positive secrecy rate is achievable. Then, we provide a secure transmit design for maximizing the SOP constrained secrecy rate. Moreover, based on a strict mathematical analysis, we characterize the impact of the main channel quality and the number of Eves on transmit design and secrecy performance. Specifically, optimal power allocation ratio between the information-bearing signal and the AN signal increases as the main channel quality improves, and decreases with the number of Eves. Numerical results confirm that our design achieves performance improvement in terms of both secrecy rate and secure energy efficiency, as compared to the approach without CJ.


global communications conference | 2014

Secure Interdependent Networks for Peer-to-Peer and Online Social Network

Qiyi Han; Hong Wen; Gang Feng; Longye Wang; Fei Pan

Peer-to-peer (P2P) systems and online social network (OSN) both have achieved tremendous success. Recent studies suggest that the cooperation of P2P and OSN can achieve better efficiency and security. Unfortunately, novel security problems are emerging as the mutual cooperation and dependence contributes to forming the interdependent networks which are more vulnerable for malicious attack as well as rumor propagation. In this paper, we examined the security environment for P2P and OSN, respectively, and analyzed the security problem derived from the cooperation and interdependence of two networks. The spreader-ignorant-recaller-stifler (SICR) is leveraged to model the rumor spreading in the interdependent networks. In order to enhance the security, we proposed two security schemes named authentication intervening and splitting target and their performance summaries indicate to be effective, simple, and potentially transformative way to guarantee the security for interdependent networks of P2P and OSN.


Wireless Communications and Mobile Computing | 2018

The Rayleigh Fading Channel Prediction via Deep Learning

Run-Fa Liao; Hong Wen; Jinsong Wu; Huanhuan Song; Fei Pan; Lian Dong

This paper presents a multi-time channel prediction system based on backpropagation (BP) neural network with multi-hidden layers, which can predict channel information effectively and benefit for massive MIMO performance, power control, and artificial noise physical layer security scheme design. Meanwhile, an early stopping strategy to avoid the overfitting of BP neural network is introduced. By comparing the predicted normalized mean square error (NMSE), the simulation results show that the performances of the proposed scheme are extremely improved. Moreover, a sparse channel sample construction method is proposed, which saves system resources effectively without weakening performances.


international conference on communications | 2015

Novel IGC codes with inter-subset zero-correlation zone for code division multiple access

Longye Wang; Xiaoli Zeng; Fei Pan; Yongfeng Li; Lin Hu

With the aid of interleaving operations, a novel construction of inter-group complementary (IGC) codes is proposed based on perfect complementary (PC) codes and orthogonal matrices. The presented IGC codes which consists of multiple groups with multiple subsets and each subset is a Z-complementary codes. For the novel IGC code, its cross-correlation function (CCF) between any two codes of different subsets in the same groups have a wider zero correlation zone (ZCZ) than that of any two codes in the same subset and its CCF between any two codes of different groups are zeros everywhere. IGC codes based code division multiple access (CDMA) systems may perform better on bit error rates than conventional codes based traditional interference-limited CDMA systems. Moreover, the new IGC codes may work well in both synchronous and asynchronous operational modes.


international conference on communications | 2015

5G security architecture and light weight security authentication

Fei Pan; Hong Wen; Huanhuan Song; Tang Jie; Longye Wang

The concept of future 5G (the 5th generation of mobile networks) widely spreads in industry, but the related standards are still unclear. The definition of 5G is to provide adequate RF coverage, more bits/Hz and to interconnect all wireless heterogeneous networks to provide seamless, consistent telecom experience to the user. In this paper we have surveyed 5G network architecture and proposed a multi-tier security architecture and a lightweight authentication measure for 5G. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements.

Collaboration


Dive into the Fei Pan's collaboration.

Top Co-Authors

Avatar

Hong Wen

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jie Tang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Lin Hu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Huanhuan Song

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Run-Fa Liao

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yixin Jiang

China Southern Power Grid Company

View shared research outputs
Top Co-Authors

Avatar

Aidong Xu

China Southern Power Grid Company

View shared research outputs
Top Co-Authors

Avatar

Longye Wang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Feiyi Xie

University of Electronic Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge