Xinsheng Ji
Southeast University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xinsheng Ji.
Science in China Series F: Information Sciences | 2018
Yajun Chen; Xinsheng Ji; Kaizhi Huang; Bin Li; Xiaolei Kang
In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.
Science in China Series F: Information Sciences | 2018
Xiaohui Qi; Kaizhi Huang; Bin Li; Liang Jin; Xinsheng Ji
Cognitive heterogeneous cellular networks (CHCNs) are emerging as a promising approach to next-generation wireless communications owing to their seamless coverage and high network throughput. In this paper, we describe our reliance on multi-antenna technology and a secrecy transmission protocol to ensure the reliability and security of downlink underlay CHCNs. First, we introduce a two-tier CHCN model using a stochastic geometry framework, and derive the probability distribution of the indicator function for a secrecy transmission scheme. We then investigate the connection outage probability, secrecy outage probability (SOP), and transmission SOP of both primary and cognitive users under a secrecy guard scheme and a threshold-based scheme. Furthermore, we reveal some insights into the secrecy performance by properly setting the predetermined access threshold and the radius of detection region for the secrecy transmission scheme. Finally, simulation results are provided to show the influence of the antenna system, eavesdropper density, predetermined access threshold, and radius of the detection region on the reliability and security performance of a CHCN.
transactions on emerging telecommunications technologies | 2018
Yajun Chen; Xinsheng Ji; Kaizhi Huang; Bin Li; Xiaolei Kang
In this paper, we investigate the uplink secure communication for underlay device-to-device (D2D) communication sharing the uplink resources in cellular networks. We first develop a secrecy outage probability (SOP) minimization model while considering the secrecy requirements for both the cellular users and the D2D pairs. Then, we propose a transmission power optimization scheme for D2D pairs subject to the secrecy requirements of the cellular users, whereas the SOPs of all potential D2D pairs could achieve the minimum. To further support the security performance of this hybrid network, an access control strategy with optimal power strategy is considered in that the D2D pair with the minimum SOP is allowed to reuse the cellular resource. Finally, simulation results are provided to validate the effectiveness of the proposed scheme.
Science in China Series F: Information Sciences | 2018
Xinsheng Ji; Kaizhi Huang; Liang Jin; Hongbo Tang; Caixia Liu; Zhou Zhong; Wei You; Xiaoming Xu; Hua Zhao; Jiangxing Wu; Ming Yi
The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.
international conference on communications | 2015
Jing Yang; Xinsheng Ji; Kaizhi Huang; Yajun Chen; Xiaohui Qi
Existing physical-layer challenge-response authentication schemes are under the threat of identity key leakages. To solve this problem, this paper proposes a physical-layer authentication scheme based on hash method. The frequency response curve of the received signal in physical layer is used as the authentication challenge and bound with the identity key stored in upper layer to generate an authentication response by a signal-level hash function referred from 3D curve matching. Binary hypothesis test is employed to verify the identity and the corresponding wireless channel to achieve an enhanced authentication. The proposed scheme can achieve a detection rate of 100% with the false alarm rate below 10−3 under the SNR of 12dB.
international conference on information science and technology | 2013
Xinsheng Ji; Xiaolei Kang; KaiZhi Huang; KeMing Ma
The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the sender. To solve this problem, this paper proposes a second-order spatial hopping transmission scheme. The sender, by the antenna switching and the hopping spatial pattern (HSP), forms equivalent spatial channel of the first-order; Acting as a virtual multi-antenna receivers, relays use time-varying coefficient of beam-forming to weighted-and-forward, form equivalent spatial channel of the second-order. Simulation results show that the scheme proposed achieves low probability of intercept (LPI) in eavesdropper and the power consumption is lower than the method of cooperative jamming.
Ksii Transactions on Internet and Information Systems | 2017
Jing Yang; Xinsheng Ji; Kaizhi Huang; Ming Yi; Yajun Chen
Eurasip Journal on Wireless Communications and Networking | 2017
Yajun Chen; Xinsheng Ji; Kaizhi Huang; Jing Yang; Xin Hu; Yunjia Xu
personal, indoor and mobile radio communications | 2017
Yajun Chen; Xinsheng Ji; Jing Yang; Kaizhi Huang; Ming Yi
Eurasip Journal on Wireless Communications and Networking | 2017
Yajun Chen; Xinsheng Ji; Kaizhi Huang; Jing Yang; Xin Hu; Yunjia Xu