1. Introduction
For future wireless communications, it can be expected that it will be necessary to support massive user connections and exponentially increasing wireless services [1]. With the explosive growth of wireless services, information privacy and security are becoming a major growing concern for users [2]. Traditionally, classical network security techniques [3] are often employed. However, these techniques do not consider the physical nature of the wireless channel. Recently, as a compelling technology for supplementing traditional network security, physical layer security (PLS) has been proposed [4].
The framework of PLS was pioneered by Shannon, who proposed the concept of perfect secrecy over noiseless channels [5]. However, random noise is an intrinsic element of almost all wireless communication channels. Under noisy channels, Wyner established the wiretap channel model and proposed the concept of secrecy capacity [5]. For Wyner’s wiretap model, a passive eavesdropper wiretapped the transmission over the main channel. While attempting to decode the information, no conditions are imposed on the available resources for the eavesdropper. After that, Csiszár introduced the non-degraded channels [5]. It was proved that the secure communication over additive white Gaussian noise (AWGN) channels can be achieved as long as the channel capacity of the main channel is better than that of the eavesdropping channel.
By considering the impacts of channel fadings in wireless communications, recent works extended previous results to many scenarios. Under complex Gaussian fading channels, the secrecy capacity was derived in [6]. For Rayleigh fading channels, the average secrecy capacity and secrecy outage performance for frequency diverse array communications were investigated in [7]. In [8], the average secrecy outage probability (SOP) and the average secrecy outage duration of Nakagami-m fading channel were discussed. Under generalized Gamma fading channels, the theoretical expressions of the probability of strictly positive secrecy capacity (SPSC) and the SOP were derived in [9]. Moreover, for Nakagami-n (i.e., Rice) fading channel, the probability of SPSC was derived [10]. Another commonly used model is called lognormal fading, which was usually employed to characterize the shadow fading in radio frequency wireless communications (RFWC) [11], the atmosphere turbulence effects in optical wireless communications (OWC) [12], or the small-scale fading for indoor ultra wide band (UWB) communications [13]. In [14], the SOP of the correlated lognormal fading channels was discussed. For independent/correlated lognormal fading channels, the ergodic secrecy capacity (ESC) and the SOP were investigated in [15]. Moreover, in [16] and [17], the secrecy capacities were analyzed over generalized-K fading channel and fading channel, respectively. As mentioned above, the PLS for many well-known fading channels have been discussed. However, to the best of our knowledge, the PLS for a newly proposed fading model, M distribution, has not been involved in open literature.
One motivation to consider the M distribution in this paper is its generality. The M distribution is a general fading model since it covers many well-known fading models as special cases, such as lognormal, Gamma, K, Gamma-Gamma, exponential, et al. [18]. In other words, the M-distributed fading model unifies many previously proposed fading models in a single one. Another motivation is that the M-distributed fading can be applied to many communication environments. Specifically, it can be used to characterize the shadow fading in RFWC, the atmosphere turbulence effects in OWC, or the small-scale fading in indoor UWB communications. As a new tractable fading model, it has been widely used to describe the statistical behavior of these wireless channels. Up to now, closed-form expressions of different performance indicators (such as bit error rate [19], outage probability [20] and capacity [21]) over M fading channels had been analyzed. However, the secure performance over M fading channels has not been completely revealed.
In this paper, a wireless communication network with one transmitter (Alice), one legitimate receiver (Bob) and one eavesdropper (Eve) is considered. The main and eavesdropping channels experience independent M-distributed fadings. The PLS over the M fading channel is investigated. The main contributions are listed as follows:
Under the M-distributed fading channel, the exact expression of the SOP is first derived. To reduce computational complexity, a closed-form expression for the lower bound of the SOP is obtained. It is shown that the performance gap between the exact SOP expression and its lower bound is small in the high signal-to-noise ratio (SNR) regime.
The closed-form expression for the probability of the SPSC over the M-distributed fading channel is derived. It is found that when the target secrecy rate is set to be zero, the lower bound of SOP has the same expression as the probability of the SPSC.
Over the M-distributed fading channel, the exact expression of the ESC with a double integral is obtained. To obtain a closed-form expression, the lower bound of ESC is then derived. It is shown that the performance gap between the exact expression and the lower bound of the ESC is small.
As special cases of the M fading channel, the secure performance over the K, exponential, and Gamma-Gamma fading channels is derived, respectively. The accuracy of these performance analysis is verified by simulations.
The remainder of this paper is organized as follows. In Section 2, the system model is introduced. Section 3 focuses on the secure performance analysis. For some special cases, the secrecy performance is further investigated in Section 4. Section 5 presents numerical results before Section 6 concludes the paper.
Notations: denotes the expectation operator, denotes the variance operator. denotes the Gamma function. denotes the modified Bessel function of the second kind with order v. denotes the Meijer’s G function [22]. denotes a Gaussian distribution with mean a and variance b. and denote the probability density function (PDF) and the cumulative distribution function (CDF) of a random variance X. denotes .
2. System Model
In this paper, we consider a wireless communication system with three entities, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an eavesdropper (Eve), as depicted in Figure 1. In the system, Alice transmits data to Bob. Due to the broadcast feature of the wireless channel, both Bob and Eve can receive the signal.
For Bob and Eve, the received signals ( for Alice-Bob link and for Alice-Eve link) are given by
(1)
where X is the transmit signal, and it satisfies , where P is the average power of the transmit signal. stands for the AWGN, where is the noise variance. denotes the M-distributed channel fading, which is a seven-parameter distribution and can be denoted as . The PDF of is given by [19](2)
where(3)
Moreover, is a parameter related to the effective number of large-scale cells of the scattering process. denotes the amount of fading parameter. denotes the average power of the LOS component and the coupled-to-LOS scattering term. and are the deterministic phases of the LOS and the coupled-to-LOS scatter components, respectively. is the average power of the total scatter components, and is a parameter in the range of .From (1), the received SNRs at Bob and Eve are written as
(4)
According to (2) and (4), the PDF of is given by
(5)
Moreover, the CDF of can be derived as(6)
According to (14) in [20], in (6) can be rewritten as Meijer’s G-function, and then using (26) in [20] for (6), the CDF of is given by
(7)
3. Secrecy Performance Analysis
In the following three subsections, the SOP, the probability of SPSC, and the ESC over the M-distributed fading channel will be discussed, respectively.
3.1. SOP Analysis
According to [23], the secrecy capacity for one realization of the SNR pair is given by
(8)
Referring to (8), the SOP is defined as the probability that the instantaneous secrecy capacity falls below a target secrecy rate, which can be written as
(9)
where c denotes the target secrecy rate, and it can be re-expressed using the SNR threshold as . Therefore, Equation (9) can be further written as(10)
According to (5), Equation (10) can be further written as
(11)
By analyzing (11), the double integrals can be simplified to a single one, which is shown in the following theorem.For the M-distributed fading channels (i.e., , the SOP can be derived as a single integral
(12)
According to (11) and using the partial integration, the SOP can be further written as
(13)
Substituting (5) and (7) into (13), Equation (12) can be obtained. □The SOP is a monotonously increasing function with respect to the SNR threshold . Therefore, the minimum and maximum values of the SOP are given by and , respectively.
Theoretically, Equation (12) can be employed to evaluate the SOP over the M-distributed fading channels. However, the expression has a complex integral term. Generally, we are more interested in the SOP performance at high SNR (i.e., ). In this case, a tight lower bound of the SOP will be provided in this paper. When , we have . Therefore, we have
(14)
where can be interpreted as the asymptotic secrecy capacity. Figure 2 shows the instantaneous secrecy capacity C and the asymptotic secrecy capacity for different . As can be seen, when , the performance gap between C and is small. In other words, can be used to evaluate SOP in the high SNR regime.According to (14), the SOP can be written as
(15)
Note that (15) provides a lower bound for the SOP. After some analysis, the following theorem is derived.For the M-distributed fading channels (i.e., , a closed-form expression for the lower bound of SOP can be derived as
(16)
where(17)
By comparing (10) with (15), the lower bound of the SOP can be derived by replacing with in (12), i.e.,
(18)
By letting and then using (14) in [20], Equation (18) can be written as
(19)
By using (21) in [24], Equation (19) can be finally written as (16). □The lower bound of SOP is a monotonously increasing function with respect to the SNR threshold . Therefore, the minimum and maximum values of the lower bound of SOP are given by and , respectively.
The lower bound of the SOP, , is independent of the average transmit power P. Therefore, increasing P can not improve the performance of .
3.2. Probability of SPSC Analysis
In physical layer secure communications, the probability of SPSC is often used as a fundamental benchmark, which is used to emphasize the probability of the existence of the secrecy capacity. In this paper, the probability of SPSC is given by setting in (12). Therefore, the following theorem is obtained.
For the M-distributed fading channels (i.e., , the closed-form expression of the probability of SPSC is given by
(20)
where is given by (17).According to the definition of the probability of SPSC and (10), we have
(21)
In (15), when , the lower bound of SOP is given by
(22)
Equations (21) and (22) imply that . Letting in (16), (20) can be derived. □Similar to Remark 3, the probability of SPSC, , is also independent of the average transmit power P. This indicates that the probability of SPSC can not be improved by increasing P.
3.3. ESC Analysis
Given the instantaneous SNRs at Bob and Eve, the instantaneous secrecy capacity is given by
(23)
Then, the ESC can be written as
(24)
By calculating (24), the following theorem is derived.For the M-distributed fading channels (i.e., , the ESC is given by
(25)
According to (23) and (24), the ESC can be further expressed as
(26)
where the first term can be written as(27)
Similarly, the second term can be expressed as
(28)
Moreover, the third term can be written as
(29)
According to (11) in [24], Equation (29) is further written as(30)
By employing (21) in [24], (30) can be further written as(31)
Then, substituting (27), (28) and (31), (25) can be derived. □It can be seen from Theorem 4 that the exact expression of the ESC (25) is a very complex integral expression. It is very hard to obtain a closed-form expression for the ESC. Alternatively, a lower bound of the ESC is derived in the following theorem.
For the M-distributed fading channels (i.e., , a closed-form expression for the lower bound of the ESC is given by
(32)
According to (31), the ergodic capacity for Alice-Bob link is given by
(33)
Similarly, the ergodic capacity for Alice-Eve link is in (31).Referring to [25], a lower bound of the ESC is given by
(34)
Substituting (33) and (31) into (34), (32) can be derived. □4. Some Special Cases
As it is well known, the M distribution covers many well-known fading models as special cases, which is shown in Table 1. In this section, the derived secrecy analysis results in Section 3 will be extended to these fading channels.
4.1. K Distribution Channel
Letting and , the M distribution in (2) reduces to the K distribution as
(35)
In this case, the lower bound of SOP in (16) becomes
(36)
Moreover, the probability of SPSC in (20) reduces to
(37)
Furthermore, the lower bound of ESC in (32) becomes
(38)
4.2. Exponential Distribution Channel
When , and , the M distribution in (2) reduces to the exponential distribution
(39)
Under this channel, the lower bound of SOP in (16) becomes
(40)
Moreover, the probability of SPSC in (20) reduces to
(41)
Furthermore, the lower bound of ESC in (32) becomes
(42)
4.3. Gamma-Gamma Distribution Channels
The Gamma-Gamma distribution is derived by letting and in the M distribution (2). Therefore, the PDF of the Gamma-Gamma distribution is written as
(43)
With this channel, the lower bound of SOP in (16) becomes
(44)
Moreover, the probability of SPSC in (20) reduces to
(45)
Furthermore, the lower bound of ESC in (32) becomes
(46)
4.4. Other Channels
In a similar manner, the secrecy performance for other fading channels in Table 1 can also be obtained. Due to the space limitation, the detailed derivations are omitted here.
5. Numerical Results
In this section, a wireless communication system with Alice, Bob and Eve are considered. Under the system model, some typical results will be presented. To evaluate the secure performance of the system, the average strengths of Alice-Bob link and Alice-Eve link are used as the performance metrics. The two performance indicators are given as
(47)
In this section, the exact simulation results, the simulation results of the lower bound, and the theoretical results of the lower bound of different performance indicators will be shown. To facilitate the accuracy analysis, the relative error is employed as a useful measure. Here, three relative errors are defined as follows
(48)
where S and T denote the exact simulation value and theoretical value, and denote the simulation value and theoretical value of the lower bound.5.1. SOP Results
Figure 3 shows the SOP versus with different when dB and . It can be observed that the SOP performance improves with the increase of . This indicates that the larger the average strength of the main channel is, the better the system performance becomes. Moreover, the theoretical results of the lower bound of SOP match the simulation results very well. This shows the accuracy of the lower bound of SOP. Furthermore, when dB, which does not satisfy the condition , and thus the performance gap between the lower bound of SOP and the exact result of the SOP is observable. With the increase of , the gap becomes smaller and smaller. This indicates that when , the derived lower bound of SOP can be used to evaluate the system performance, without reliable on time-intensive simulations.
Figure 4 shows the SOP versus with different when dB and . As can be observed, the SOP decreases with the increase of , which coincides with the conclusion in Figure 3. Moreover, for the lower bound of SOP, the gap between theoretical results and simulation results is very small, which verifies the accuracy of the derived lower bound. In this simulation, the lower bound of SOP and the exact result of the SOP almost coincide for larger and , which shows the tightness of the lower bound of the SOP. Furthermore, it can be seen that the value of the SOP increases with the increase of . This indicates that large SNR threshold will degrade the system performance.
Table 2 shows the accuracy of the SOP for different when dB, and dB. As can be seen, all the relative errors and are quite small. This indicates that the derived lower bound of SOP in (16) is very accurate to evaluate the system performance.
In this subsection, the lower bounds of the SOP over different fading channels are also provided, as shown in Figure 5. In this figure, the lower bounds of the SOP over the K, exponential, and Gamma-Gamma fading channels are derived in (36), (40) and (44), respectively. Moreover, the lower bounds of the SOP over the M-distributed fading channel (i.e., (16)) with special parameters are also provided. As can be seen in Table 1, when and , the M-distributed channel reduces to the K channel; when , and , the M-distributed channel reduces to the exponential channel; when and , the M-distributed channel reduces to the Gamma-Gamma channel. As can be observed, the results of (16) with and match with that of (36) very well. The results of (16) with , and and the results of (40) coincide with each other. Similarly, the difference between (16) with and and (44) is so small and it can be ignored. These conclusions indicate that the derived expression of SOP over the M-distributed fading channel is a general expression, which can be accurately extended to other well-known fading channels.
5.2. Probability of SPSC Results
Figure 6 shows the probability of SPSC versus with different when . In this figure, the value of SPSC decreases with the increase of . However, the value of the probability of SPSC increases with the increase of . This shows the impacts of the average strength of the main channel and the average strength of the main channel on system performance. Moreover, it can be seen that the theoretical results match the simulation results very well, and thus the derived exact expression of the probability of the SPSC is very accurate to evaluate the system performance.
Figure 7 shows the probability of SPSC versus with different when . Obviously, with the increase of , the probability of SPSC decreases. The conclusion is the same as that in Figure 6. Once again, it can be observed that small differences appear between the theoretical results and the simulation results. Therefore, the exact expression of the probability of SPSC can be used to evaluate the system performance without time-intensive simulations. Moreover, it can be seen that when is small, the probability of SPSC increases with the increase of . However, the trends of curves changes when is large, i.e., the probability of SPSC decreases with the increase of .
Table 3 shows the accuracy of the SOP for different when and . It can be seen that the discrepancies between the simulation and theoretical results are small enough in most cases. Therefore, the derived closed-form expression of the probability of SPSC is accuracy to evaluate the system performance.
In Figure 8, the probabilities of the SPSC over different fading channels are also provided. Specifically, the probabilities of the SPSC over the K, exponential, and Gamma-Gamma fading channels are obtained by (37), (41) and (45), respectively. Moreover, the probability of the SPSC over the M-distributed fading channel (i.e., (20)) with special parameters are also provided as shown in Table 1. Similar to Figure 5, the results over the M-distributed fading channel with special parameters match the results of the other fading channels very well. Therefore, the derived probability of SPSC over the M-distributed fading channel can be used as a unified expression for many well-known fading channels.
5.3. ESC Results
Figure 9 shows the ESC versus with different when . In Figure 9, when is small, the ESC is almost zero. With the increase of , the ESC increases accordingly. For a fixed , the ESC performance degrades with the increase of . Moreover, for the lower bound of the ESC, the performance gap between theoretical results and simulation results is very mall, and thus the derived lower bound of ESC is accurate. Furthermore, when is small, the difference between the lower bound of ESC and the exact results of ESC is large. However, with the increase of , the gap becomes smaller and smaller. Therefore, at high SNR regime, the derived lower bound of ESC can be employed to evaluate the system performance without time-intensive simulations.
Figure 10 shows the ESC versus with different when . As seen in Figure 9, the ESC also increases with the increase of in Figure 10. Moreover, the gaps among the theoretical results of the lower bound of ESC, the simulation results of the lower bound of ESC and the exact results of ESC are very small for large . This conclusion is the same as that in Figure 9. Furthermore, with the increase of , the ESC performance degrades.
Table 4 shows the relative errors of ESC when and . It can be observed that the error is small for all cases. However, when is small, the error is large. Small represents the main channel is much worse than the eavesdropping channel, which is quite rare in practical scenarios. Moreover, with the increase of , decreases rapidly. Therefore, the derived lower bound of ESC is valid in the high SNR regime.
Furthermore, Figure 11 shows the lower bound of ESC versus for different fading channels. The lower bounds of ESC over the K, exponential, and Gamma-Gamma fading channels are obtained by (38), (42) and (46), respectively. Moreover, the lower bound of ESC over the M-distributed fading channel (i.e., (25)) with special parameters are also provided as shown in Table 1. Once again, it can be seen that the results over the M-distributed fading channel with special parameters show close agreement with that of the other fading channels.
6. Conclusions
By considering the M-distributed fading channels, this paper has investigated the PLS problem. The theoretical expressions of the SOP, the probability of SPSC, and the ESC are derived, respectively. In this paper, a limitation of the theoretical analysis is that both the exact SOP and ESC are with a complex integral, and closed-form expressions for them are not derived. Alternatively, tight lower bounds for SOP and ESC are derived, which are in closed-forms. Numerical results show that the SOP and its lower bound are monotonously increasing functions with respect to . Moreover, when and are large, the gap between the SOP and its lower bound is very small. The exact expression for probability of SPSC has the same form as that for the lower bound of SOP when . With the increase of , the probability of SPSC increases for small and decreases for lagre . Moreover, for large and , the difference between the exact ESC and its lower bound is small enough. Therefore, the derived expressions are accurate and can be used to evaluate the system performance without time-intensive simulations. Moreover, the derived results are extended to many well-known channels, which can provide some insights for practical system design.
After deriving the expressions of the secure performance indicators over the M-distributed fading channel, the natural next step is to consider the secure transmission schemes to further improve the PLS.
Author Contributions
Conceptualization, S.-H.L., J.-Y.W.; methodology, S.-H.L., R.-R.L., X.-T.F.; software, S.-H.L.; validation, R.-R.L. and X.-T.F.; investigation, S.-H.L.; resources, S,-H L., R.-R.L. and X.-T.F.; writing-original draft preparation, S.-H.L.; writing-review and editing, R.-R.L., X.-T.F., A.-L.T. and J.-Y.W.
Funding
This work is supported by National Natural Science Foundation of China (61701254), Natural Science Foundation of Jiangsu Province (BK20170901), the open research fund of Key Laboratory of Intelligent Computing & Signal Processing, Anhui University, and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (AGK2019002).
Acknowledgments
The authors thank the anonymous reviewers and the Editor for their helpful comments and review of this article.
Conflicts of Interest
The authors declare no conflict of interest.
Figures and Tables
Figure 1. A wireless communication system with a transmitter (Alice), a legitimate receiver (Bob), and an eavesdropper (Eve).
Figure 2. The instantaneous secrecy capacity C and the asymptotic secrecy capacity CAsy for different γB.
Figure 3. Secrecy outage probability (SOP) versus E(γB) with different E(γE) when γth=0 dB and (αB,βB)=(αE,βE)=(2,2).
Figure 4. SOP versus E(γB) with different γth when E(γE)=18 dB and (αB,βB)=(αE,βE)=(2,2).
Figure 6. Probability of strictly positive secrecy capacity (SPSC) versus E(γB) with different E(γE) when (αB,βB)=(αE,βE)=(2,2).
Figure 7. Probability of SPSC versus E(γB) with different (αE,βE) when (αB,βB)=(2,2).
Figure 9. Ergodic secrecy capacity (ESC) versus E(γB) with different E(γE) when (αB,βB)=(αE,βE)=(2,2).
Special cases of the M distribution.
Distribution Models | Generation |
---|---|
K distribution | , |
Exponential distribution | , , |
Gamma-Gamma distribution | , |
Lognormal distribution | , , |
Gamma-Rician distribution | |
Gamma distribution | , |
Rice-Nakagami distribution | , |
Relative errors of SOP.
10 dB | 20 dB | 30 dB | 40 dB | 50 dB | |
---|---|---|---|---|---|
3.699% | 3.205% | 1.880% | 1.936% | 0.293% | |
0.436% | 0.041% | 0.795% | 0.651% | 0.156% |
Relative errors of the probability of SPSC.
10 dB | 20 dB | 30 dB | 40 dB | 50 dB | |
---|---|---|---|---|---|
0.780% | 0.125% | 7.777% | 6.753% | 2.283% |
Relative errors of ESC.
25 dB | 30 dB | 35 dB | 40 dB | 45 dB | 50 dB | |
---|---|---|---|---|---|---|
31.911% | 11.668% | 3.879% | 1.845% | 0.713% | 0.195% | |
3.112% | 0.401% | 0.419% | 0.258% | 0.221% | 0.450% |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019 by the authors.
Abstract
In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China; Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai Jiao Tong University, Shanghai 200240, China; Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2 Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
3 General Information Department, North Information Control Research Academy Group Co., Ltd., Nanjing 21153, China