Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yajun Chen is active.

Publication


Featured researches published by Yajun Chen.


Science in China Series F: Information Sciences | 2018

Opportunistic access control for enhancing security in D2D-enabled cellular networks

Yajun Chen; Xinsheng Ji; Kaizhi Huang; Bin Li; Xiaolei Kang

In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.


transactions on emerging telecommunications technologies | 2018

Minimizing secrecy outage probability in D2D‐enabled cellular networks: Access control with power optimization

Yajun Chen; Xinsheng Ji; Kaizhi Huang; Bin Li; Xiaolei Kang

In this paper, we investigate the uplink secure communication for underlay device-to-device (D2D) communication sharing the uplink resources in cellular networks. We first develop a secrecy outage probability (SOP) minimization model while considering the secrecy requirements for both the cellular users and the D2D pairs. Then, we propose a transmission power optimization scheme for D2D pairs subject to the secrecy requirements of the cellular users, whereas the SOPs of all potential D2D pairs could achieve the minimum. To further support the security performance of this hybrid network, an access control strategy with optimal power strategy is considered in that the D2D pair with the minimum SOP is allowed to reuse the cellular resource. Finally, simulation results are provided to validate the effectiveness of the proposed scheme.


Iet Communications | 2018

Unified and Fast Handover Authentication Based on Link Signatures in 5G SDN-based HetNet

Jing Yang; Xinsheng Ji; Kaizhi Huang; Yajun Chen; Xiao Xu; Ming Yi

Existing handover authentication schemes are implemented in the upper layer through cryptographic techniques with different protocols and parameters involved under different handover scenarios, introducing high latency and complexity especially in the next generation (5G) highly heterogeneous network (HetNet). The authors propose to introduce wireless link signatures decided by users locations as handover authentication data to achieve unified and fast handover authentication at the physical layer in 5G software defined networking-based HetNet. Specifically, the unique wireless channel characteristics between a user and the serving access point (AP) are extracted as the secure context information (SCI) and transferred to the target AP. The latter determines whether the user is the legitimate one who has already been authenticated according to the received SCI. They then analyse the authentication performance relating to multiple attributes and results demonstrate that the authentication strength can be adaptively adjusted. Furthermore, they find that optimum performance can be achieved by setting a proper decision threshold and derive the sub-optimal performance by iterative search. Lastly, analysis and simulations on latency and overhead compared with existing ones are conducted and results prove the effectiveness of the proposed scheme.


vehicular technology conference | 2017

Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks

Yajun Chen; Xinsheng Ji; Kaizhi Huang; Xiaolei Kang

The mutual interference induced by the hybrid links can bring the secrecy gain for device-to-device (D2D) communication underlaying cellular networks, where there have been few works on studying its impact on the secrecy performance of the accessed D2D pairs. In this paper, our aim is to mainly analyze the secrecy performance gain of the accessed D2D pair brought by the mutual interference.Firstly,an opportunistic D2D pairs selection scheme based on the wireless channel direction information (CDI) is proposed. The proposed scheme determines a set of candidate D2D pairs with the required interference limitation for the cellular user. Then, the D2D pair with best channel condition is scheduled to share the same channel with cellular users for its own transmission. Further, the analytical expressions of the secrecy outage probability are derived with presence of multiple D2D pairs and multiple eavesdroppers. Finally, the secrecy performance of the proposed scheme is demonstrated by simulations.


international conference on wireless communications and signal processing | 2017

Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers

Xin Hu; Kaizhi Huang; Yajun Chen; Xiaoming Xu; Xiaohu Liang

This paper studies the physical layer security of uplink (UL) transmission in simultaneous wireless information and power transfer (SWIPT) deployed in wireless sensor networks (WSNs). Firstly, we model the random network as Poisson cluster process (PCP) to focus on the case where eavesdroppers hide around certain targets to intercept the confidential information successfully. Then, the communication model of time division multiple access (TDMA) is established to avoid inter-node interferences and extend the time for energy harvesting (EH). After that, aiming at the sensor nodes that work in “harvesting-transmitting” (H-T) mode with time switching (TS) receiver, we derive the energy outage probabilities (EOP), connection outage probabilities (COP) and secrecy outage probabilities (SOP) through comprehensive analysis on downlink (DL) and UL transmissions, based on which the uplink secrecy throughput (STP) is obtained to characterize the overall performance. Finally, our theoretical derivations are verified and the influences of various parameters on uplink STP are revealed by the simulation results, which indicate the existence of an optimal energy threshold and a partition coefficient of DL and UL period that can achieve the best secrecy performance.


international conference on communications | 2015

A physical-layer authentication scheme based on hash method

Jing Yang; Xinsheng Ji; Kaizhi Huang; Yajun Chen; Xiaohui Qi

Existing physical-layer challenge-response authentication schemes are under the threat of identity key leakages. To solve this problem, this paper proposes a physical-layer authentication scheme based on hash method. The frequency response curve of the received signal in physical layer is used as the authentication challenge and bound with the identity key stored in upper layer to generate an authentication response by a signal-level hash function referred from 3D curve matching. Binary hypothesis test is employed to verify the identity and the corresponding wireless channel to achieve an enhanced authentication. The proposed scheme can achieve a detection rate of 100% with the false alarm rate below 10−3 under the SNR of 12dB.


Ksii Transactions on Internet and Information Systems | 2017

AKA-PLA: Enhanced AKA Based on Physical Layer Authentication

Jing Yang; Xinsheng Ji; Kaizhi Huang; Ming Yi; Yajun Chen


Eurasip Journal on Wireless Communications and Networking | 2017

Artificial noise-assisted physical layer security in D2D-enabled cellular networks

Yajun Chen; Xinsheng Ji; Kaizhi Huang; Jing Yang; Xin Hu; Yunjia Xu


vehicular technology conference | 2018

Secrecy Spectral Efficiency Fairness among Multi-Cells in SWIPT-Enabled Cooperative NOMA Transmissions

Xin Hu; Kaizhi Huang; Jun Li; Yajun Chen; Yunjia Xu


vehicular technology conference | 2017

Secure Transmission Scheme in K-Tier Dense Heterogeneous Cellular Networks with Imperfect Channel State Information

Yunjia Xu; Kaizhi Huang; Dazhao Ding; Xiaohui Qi; Yajun Chen

Collaboration


Dive into the Yajun Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bin Li

Beijing Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaohu Liang

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge