As a response to serious transmission security problems in wireless communications, physical layer encryption (PLE) provides an effective security measure which is very different from upper layer cryptography technologies. PLE can take advantage of the effects of channel and noise and the processing objects are complex vector signals, which are essentially different from Boolean algebra based traditional cryptography. This paper establishes mathematical models, design frameworks and cryptographic primitives for PLE. Two design frameworks are proposed: stream PLE and block PLE. For stream PLE, a new 3D security constellation mapping is derived. For block PLE, two types of subtransforms are defined: isometry transformations and stochastic transformations. The proposed PLE framework has a large cipher signal space and key space; it provides more freedom in design and can resist known plaintext attacks and chosen-plaintext attacks.
Security is always an important issue in wireless communications. Physical layer encryption (PLE) is an effective way to enhance wireless communication security and prevent eavesdropping. Rather than replacing cryptography at higher layers, PLE's benefit is to enable using lightweight cryptosystems or provide enhanced security at the signal level. The upper cryptography is faced with a noise-free channel, and the processing object is bit data. In PLE, the effects of channel and noise can be exploited to enhance security and prevent deciphering. In addition, since the processing object is complex vector signals, there are more operational functions to select and design for PLE. The mathematical models, design frameworks, and cryptographic primitives of PLE are established. Two design frameworks are proposed: stream PLE and block PLE. For stream PLE, a new 3D security constellation mapping is derived. For block PLE, two types of sub-transforms are defined: isometry transformations and stochastic transformations. Furthermore, a practical system operation mode PLE-block chaining (PBC) is proposed to enhance the practical system security. The proposed PLE framework can resist known plaintext attacks and chosen-plaintext attacks. The simulation shows that the proposed isometry transformation method has good performances in terms of bit error ratio (BER) penalty and confusion degree.
In order to solve the common needs of shared basic data resources in different industries, different departments and different regions in a city, this paper has designed a Data Resource Sharing and Exchange Platform (DRSEP) to solve the demand for comprehensive data of City Public Management (CPM). Firstly, we analyze the basic functional requirements of the platform. Secondly, we study the characteristics of the DRSEP from three aspects: data type, data volume and data transmission/application methods. Thirdly, we provide the overall technical architecture of the DRSEP, which includes: the data resource layer, the resource site layer, the resource integration layer, the resource service layer and the resource application layer. In particular, we devise a Data Organization System (DOS) based on a Data Resource Directory (DRD), a Public Basic Database (PBcDB) and a Public Business Database (PBuDB). The DRD is the metadata standard and resource directory of the platform. Through this directory, the authority, accuracy and unity of the data resources can be ensured. The PBcDB consists of four types of databases: a population database, a corporation database, a macroeconomic database and a geospatial database. The PBuDB includes a video database, an environmental safety supervision database, a building database, a government affairs and emergency database, a credit database and a comprehensive human resources database. Finally, the DRSEP is deployed, tested, applied and evaluated in a city with a population of 2.19 million in western China. Moreover, the test evaluation results show that the platform exhibits an outstanding performance in the integration technology of multi-source heterogeneous data and the reliable transmission technology of massive data.
With the development and maturity of cloud computing technology, many cloud-based solutions for specific industry applications are also rapidly emerging. This study designed and implemented a Service Outsourcing Cloud for the Insurance Industry (SOC-II) for China's huge market demand, especially for Business Process Outsourcing (BPO) companies serving the insurance industry. Firstly, this research presents the cloud computing ecosystem, conducts SOC-II needs analysis, and then proposes the system architecture and logical architecture of SOC-II. Secondly, this paper introduces an image processing case in a SOC-II production operation system, and gives the operating mode and management mode of SOC-II. Thirdly, we summarize the main features of SOC-II and the new changes that SOC-II brings to the insurance industry. Finally, the article discusses the challenges of cloud computing. CCS Concepts • Applied computing Enterprise computing Business process management Business process management systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.