Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yongkai Zhou is active.

Publication


Featured researches published by Yongkai Zhou.


IEEE Signal Processing Letters | 2014

Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization

Yongkai Zhou; Zheng Zheng Xiang; Yan Zhu; Zhi Xue

This letter considers the secure MIMO transmission in a wireless environment, in which one transmitter (Alice), one receiver (Bob) and one eavesdropper (Eve) are involved. Apart from the artificial noise (AN) generated by Alice, Bob can also exploit his remaining antenna resources to emit AN to further impair Eves channel. Such kind of AN can be cancelled by Bob himself by applying the Full-Duplex wireless communication technique. A computable secrecy rate is obtained for this model over a Rayleigh-fading eavesdropping channel. In order to maximize the secrecy rate, a joint optimization scheme is proposed to assign the TX/RX antennas for Bob and to design the beamforming and power allocation for Alices information and AN signal. Simulation is carried out to illustrate the process of the proposed optimization scheme.


IEEE Signal Processing Letters | 2013

Artificial Noise Generated in MIMO Scenario: Optimal Power Design

Yan Zhu; Yongkai Zhou; Shivani Patel; Xiao Chen; Liang Pang; Zhi Xue

In wireless communication, the transmitter (Alice) can send artificial noise (AN) to interfere with the eavesdropper (Eve). This letter considers the AN MIMO scenario, i.e., both Alice and the legitimate receiver (Bob) are equipped with multiple antennas. A closed-form expression for the lower bound of secrecy capacity is obtained. It is proved that water-filling is the optimal power allocation scheme. An efficient iterative algorithm is proposed to find the optimal power distribution ratio between information and AN so that maximum secrecy capacity can be achieved. Simulation results show that the proposed algorithm converges fast, and multiple antennas can improve the secrecy capacity to some extent compared to the AN MISO case.


global communications conference | 2014

Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios

Yongkai Zhou; Yan Zhu; Zhi Xue

In this paper, secure communication over a multi-input multi-output multi-eavesdropper (MIMÓME) wiretap channel is considered. We propose an enhanced MIMÓME artificial noise (AN) model in which the receiver (Bob) adopts the latest Full-Duplex MIMO Radio technique to emit AN jointly with the transmitter (Alice). An achievable secrecy rate is obtained for this model over an unfavorable noiseless eavesdropping channel. Optimization problem is formulated to solve the beamforming and power allocation for Alice and Bobs transmitting signals and to determine the dimension allocation between the information and AN signals. Simulations are carried out to illustrate the optimization process, and the results show that the enhanced MIMÓME model outperforms existing AN models for low self-interference regime.


Mathematical Problems in Engineering | 2013

Securing Communication via Transmission of Artificial Noise by Both Sides: Bipolar-Beamforming Optimization

Yongkai Zhou; Yan Zhu; Fangbiao Li; Zachary Imm; Xinxing Yin; Zhi Xue

The paper considers the secure transmission in a wireless environment in which both the transmitter (Alice) and the legitimate receiver (Bob) send artificial noise (AN) to interfere with the eavesdropper (Eve). Optimal design is analyzed in detail for this AN-by-both-side model to deal with Eve’s stochastic channel condition and random spatial distribution. Bipolar-beamforming is first proposed to jointly design Alice and Bob’s transmitting signals. By optimally assigning the transmitting antenna for Bob and allocating the power ratio between Alice’s information and the AN signal, maximum secrecy capacity can be achieved. Simulation is done to illustrate the process of bipolar-beamforming optimization. Results show that the AN-by-both-side model has good secrecy performance on both average and extreme conditions as Eve approaches Alice or Bob.


international conference on communications | 2014

Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver

Yongkai Zhou; Fangbiao Li; Pengze Guo; Zhi Xue

This paper is concerned with the secure MIMO transmission in a classic three-node network, in which both the transmitter (Alice) and the receiver (Bob) simultaneously send artificial noise (AN) to impact the channel of the eavesdropper (Eve). Only statistical information about the eavesdropper channel is available. Compared to previous works, this paper studies the scenario in which the main channel are also time-varying and goes through Rayleigh fading. Expected secrecy rate is adopted to evaluate the performance of this model. Robust beamforming and power allocation are proposed to maximize the lower bound of the expected secrecy rate. Numerical results show that with the increase of Bobs AN power, the best practice is to allocate more dimensions for emitting AN and at the same time distribute a greater proportion of Alices power to information symbols.


international conference on computational and information sciences | 2013

A New Model for Reliable and Secure Multicast

Yongkai Zhou; Yi Yuan; Yan Zhu; Fangbiao Li; Xiao Che; Zhi Xue

In computer network, multicast is an efficient scheme for one-to-many and many-to-many communication. Although research on multicast has begun as early as the rise of Internet, multicast is still not widely deployed in the current backbone Internet. With the coming of Cloud Computing and Internet of Things, the distribution of huge amounts of data relies heavily on communication among multiple parties, and multicast has its inherent advantage dealing with these scenarios. This paper analyses the vulnerabilities and deficiencies of the current multicast implementation and proposes a new model to support reliable transmission and security in multicast. Network service and the pricing model are integrated into the model to best exploit the value of multicast.


international congress on image and signal processing | 2013

An achievable rate region of a three-receiver BC with degraded message sets and side information

Fangbiao Li; Zhi Xue; Yongkai Zhou

In this paper, a three-receiver (named as one-receiver two-eavesdropper) discrete memoryless broadcast channel (DM-BC) with three degraded message sets and side information is studied. The main objective of this paper is to present a theorem so as to give an achievable secrecy region for this one-receiver two-eavesdropper DM-BC with the side information available at the transmitter. In the achievability proof scheme, we use the superposition coding scheme to divide the available randomness into different levels for misleading the eavesdroppers. We establish the achievable secrecy region by using a combination of Gelfand-Pinsker binning scheme and rate splitting technique. Achievability in this case also follows from the new idea of Nair-El Gamal indirect decoding. The achievable secrecy region of this paper subsumes the steinberg rate region for two-receiver degraded BC with the side information as well as the secrecy capacity region for one-receiver two-eavesdropper DM-BC with no side information as its special cases.


international conference on computational and information sciences | 2013

Improving the Secrecy Rate via Combining the Artificial Noise with the Masked Beamforming Scheme

Fangbiao Li; Zhi Xue; Yongkai Zhou; Liang Pang

This paper considers the secure communication via combining the artificial noise with the masked beamforming scheme. In this scenario, the transmitter is equipped with multi-antenna while each of the eavesdroppers is equipped with only one antenna, and the legitimate receiver has a receiving antenna and a transmitting antenna, respectively. The transmitter simultaneously transmits a beamformed secret information-bearing signal to a legitimate receiver and artificial noise (AN) to the eavesdroppers. The legitimate receiver sends the AN to confuse the eavesdropper while receiving the desired signal from the transmitter. We compare the proposed scheme that combining the AN with masked beamforming with no beamforming vector scheme, and derive that the combined strategy obviously improved the secrecy rate.


international conference on computational and information sciences | 2013

Research on Secrecy Communication via Bilateral Artificial Noise Transmitting

Yan Zhu; Xiao Chen; Fangbiao Li; Yongkai Zhou; Xinxing Yin; Liang Pang; Zhi Xue

The problem that we consider is the secrecy communication in bilateral transmitting scenario. The model is connected via wireless signal between two points: the transmitter and the receiver. We assume that the transmitter has a single transmit antenna while the receiver has two (one transmit, one receive). In recent papers, it is shown that artificial noise could be used to increase the secrecy capacity. However, for one transmitter antenna case, helper nodes can only be used. In this paper we propose a new 2-Stage artificial noise sending method to substitute helper nodes. So the cost of helper nodes can be saved. The comparison of artificial noise transmitting with Beamforming is given in this paper. It can be proved to increase the secrecy capacity via our approach.


ieee international conference on dependable autonomic and secure computing | 2013

Integrated Network Service to Enhance Multicast Communication

Yongkai Zhou; Pengze Guo; Yan Zhu; Zhi Xue; Jianhua Li; Yi Yuan

One of the features of the Software Defined Network (SDN) is to integrate network service into the network layer to better support the application and alleviate the burden of client-server end. Multicast as an efficient communication method, it can be exploited to provide more meaningful network services to applications which involve one-to-many and many-to-many communication. Traditional multicast implementation mainly emphasizes on low network overhead and its function is kept as simple as possible. This makes multicast vulnerable to misuse. However, when network service is integrated into multicast based on the architecture of SDN, the robustness and security of multicast can be enhanced. This paper proposed a detailed implementation of secure network services to enhance the whole process of the multicast communication. Furthermore, the pricing policy is also discussed for different kinds of multicast application scenarios.

Collaboration


Dive into the Yongkai Zhou's collaboration.

Top Co-Authors

Avatar

Zhi Xue

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Yan Zhu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Fangbiao Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Liang Pang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xiao Chen

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xinxing Yin

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Yi Yuan

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jianhua Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Pengze Guo

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xiao Che

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge