{"title":"Joint active RIS and simultaneous transmission and reflection technology assist the research of secure communication in NOMA","authors":"Jiajia Wang, Fuxiang Lu, Xinyue Zhang","doi":"10.1016/j.phycom.2025.102829","DOIUrl":"10.1016/j.phycom.2025.102829","url":null,"abstract":"<div><div>As a new generation of technological advancement, synchronous transmission and reflection of reconfigurable intelligent surfaces (STAR-RIS) can significantly enhance the service coverage and are currently regarded as an indispensable component in wireless communication. However, due to the presence of “multiplicative fading” issue in passive RIS, ensuring security in RIS-assisted networks remains a challenge. In this paper, we investigate the secrecy performance of a nonorthogonal multiple access (NOMA) system assisted by Active Reconfigurable Intelligent Surfaces with simultaneous transmission and reflection capabilities (STAR-ARIS). We utilizes active reconfigurable intelligent surfaces to transmit information to multiple users while considering eavesdroppers (EVEs) present in both transmission and reflection areas. Specifically, we jointly optimize transmit beamforming, active transmit and reflected beamforming at STAR-ARIS to maximize the secrecy rate while satisfying user quality of service (QoS) requirements and successive interference cancellation (SIC) decoding conditions. To solve the nonconvex problem efficiently, we employ alternating optimization (AO) method to decompose it into two subproblems. Then, the successive convex approximation (SCA) and semidefinite relaxation (SDR) methods are used to solve the transmit beamforming optimization at the base station (BS) and the phase shift vector subproblems of active reconfigurable intelligent surface, respectively. Simulation results show that, compared with the traditional STAR-RIS-NOMA, RIS-NOMA, and STAR-ARIS-OMA methods, STAR-ARIS-NOMA significantly improves the secrecy rate of the system.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102829"},"PeriodicalIF":2.2,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical modeling of an enhanced non-coherent detector for chaos-based on–off keying communication systems","authors":"Moundher Messaadi , Rabah Ouchikh , Nacerredine Lassami","doi":"10.1016/j.phycom.2025.102830","DOIUrl":"10.1016/j.phycom.2025.102830","url":null,"abstract":"<div><div>This paper presents a robust non-coherent demodulation scheme for Chaotic On–Off Keying systems by transforming the demodulation problem into a binary hypothesis test. The proposed approach leverages the statistical properties of the Fisher–Snedecor distribution to derive a novel decision variable, simplifying the demodulation process. An analytical expression for the error probability <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>e</mi></mrow></msub></math></span> is derived for an additive white Gaussian noise channel, incorporating both central and non-central Fisher distributions. Furthermore, a new method for determining the optimal decision threshold is introduced, minimizing <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>e</mi></mrow></msub></math></span> through an explicit analytical derivation. The effectiveness of the proposed demodulation approach and threshold determination method is validated through Monte Carlo simulations, demonstrating significant performance improvements. Additionally, the proposed method is compared with state-of-the-art chaos-based communication systems, highlighting its superior performance and robustness.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102830"},"PeriodicalIF":2.2,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical layer secrecy analysis of hybrid satellite–terrestrial relay networks with a friendly jammer","authors":"Xiaoqi Wang, Xiaohan Han, Ming Li","doi":"10.1016/j.phycom.2025.102828","DOIUrl":"10.1016/j.phycom.2025.102828","url":null,"abstract":"<div><div>This work examines the physical layer secrecy performance of a hybrid satellite–terrestrial relay network with a friendly jammer. The network uses a satellite-based architecture, in which a satellite aims to make communication with a destination user via a relay. The relay node uses decode-and-forward (DF) protocol to process the signal. However, the signal is vulnerable to eavesdropping during transmission. Therefore, a friendly unmanned aerial vehicle (UAV) is employed to emit jamming signals to prevent eavesdropping. The satellite link is assumed to follow the Shadowed-Rician fading, while the terrestrial and eavesdropping links are characterized by the Rayleigh fading model. The analytical formula for the system secrecy outage probability (SOP) and its asymptotic form are derived to assess the secrecy performance. Furthermore, the system throughput and non-zero secrecy capacity are examined. Meanwhile, numerical and simulative results support the theoretical analysis, showing the impact of key channel and system characteristics on physical layer security.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102828"},"PeriodicalIF":2.2,"publicationDate":"2025-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gerryn Jo-Vee Goh, Chee Keong Tan, Joanne Mun-Yee Lim, Ying Loong Lee, Ke Feng, Li-Chun Wang
{"title":"Joint reflection coefficient, time proportion and power allocation for multicarrier backscatter communications","authors":"Gerryn Jo-Vee Goh, Chee Keong Tan, Joanne Mun-Yee Lim, Ying Loong Lee, Ke Feng, Li-Chun Wang","doi":"10.1016/j.phycom.2025.102827","DOIUrl":"10.1016/j.phycom.2025.102827","url":null,"abstract":"<div><div>Massive growth of Internet of Things (IoT) applications is anticipated to result in an inevitable increase in network energy consumption (EC). To address this concern, we tackle the energy efficiency (EE) maximization problem for the multicarrier wireless-powered backscatter communication networks (WPBCNs), by jointly optimizing the resource allocation (RA) of transmit power, reflection coefficient (RC), and time proportion, under the worst-case scenario with interference between multiple backscatter devices in the multicarrier WPBCNs. To solve this problem, we propose an adaptive nonlinear fractional programming (NLFP)-based time-power swarm optimization (ANT-PSO) scheme, which is specifically designed to circumvent the hardness of the NLFP problem (NLFPP), as well as the randomness in the channel gains and interference present in the network. We apply the NLFP transformation method to improve the tractability of the problem. Additionally, we develop a new joint RC, time proportion and transmit power optimization algorithm based on swarm intelligence, with additional functions designed according to energy causality and resource constraints to facilitate solution exploration within the feasible range. Simulation results show that our proposed scheme outperforms several baseline schemes in the average worst-case EE for scenarios with different maximum transmit power levels, numbers of backscatter links and numbers of subcarriers.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102827"},"PeriodicalIF":2.2,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145020650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ABER and outage probability of FSO systems under UAV-assisted symbol-level jamming over turbulent channels with pointing errors","authors":"Jingyu Wang , Dingshan Gao , Xinliang Zhang , Deqiang Ding","doi":"10.1016/j.phycom.2025.102820","DOIUrl":"10.1016/j.phycom.2025.102820","url":null,"abstract":"<div><div>Free-space optical (FSO) communication systems are emerging as a viable technology for 6G, offering a compelling combination of cost-effective installation, high data throughput, extensive reach, and minimal latency. However, these systems are susceptible to potential intrusions, particularly jamming attacks, which pose a significant threat to their reliability and performance. We analyze the average bit error rate (ABER) and outage probability (OP) for phase-shift keying (BPSK)-modulated FSO systems under Unmanned Aerial Vehicle (UAV)-assisted jamming. The proposed system model includes both the legitimate and jamming channels, accounting for atmospheric turbulence (AT) and pointing errors (PE). The probability density functions (PDFs) of the signal-to-noise ratio (SNR), signal-to-jamming ratio (SJR), and signal-to-jamming-and-noise ratio (SJNR) are derived, which serve as the foundation for our ABER analysis. Closed-form expressions for the ABER and OP under BPSK modulation are derived for various jamming conditions, including coherent and non-coherent symbol-level jamming (SLJ), as well as noise jamming scenarios. Numerical analysis and Monte Carlo simulations are conducted to investigate the effects of AT and PE on system performance across various jamming conditions. Results indicate that AT in the legitimate channel significantly impacts system performance, with coherent SLJ yielding higher ABER than non-coherent SLJ. The phase difference between jamming and legitimate signals critically influences jamming effectiveness, where orthogonal phases minimize disruption. Furthermore, jamming signal pointing accuracy directly correlates with ABER degradation—higher precision induces elevated error rates. This study provides valuable insights for designing robust, jamming-resistant FSO systems.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102820"},"PeriodicalIF":2.2,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145020654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A transformer-based framework with complex-valued convolution and enhanced Bi-LSTM for automatic modulation recognition","authors":"Shenping Wu, Chao Wang, Jiakai Liang, Mayue Wang, Keqiang Yue, Wenjun Li","doi":"10.1016/j.phycom.2025.102824","DOIUrl":"10.1016/j.phycom.2025.102824","url":null,"abstract":"<div><div>Automatic Modulation Classification (AMC) is critical for modern wireless communication systems. Despite significant progress in deep learning-based AMC, existing methods still struggle to jointly capture local features, model temporal dependencies, and extract global representations. We propose CBADNN, an end-to-end architecture that combines Transformer self-attention for global context modeling, complex-valued convolutions for local spatial feature extraction, and bidirectional stacked LSTMs (Bi-sLSTMs) for temporal dependency learning. CBADNN achieves state-of-the-art performance, with overall accuracies of 64.02% and 65.50% on the widely used RadioML 2016.10a and RadioML 2016.10b datasets, respectively. On RadioML 2016.10a, it outperforms the best baseline by 0.81% under high SNR (4 dB–18 dB) and 0.33% under medium SNR (−8 dB–2 dB), consistently demonstrating superiority across diverse SNR conditions.Furthermore, a detailed evaluation of classification accuracy across various modulation types under different SNR conditions is conducted, and ablation experiments on the RadioML2016.10a dataset are performed to rigorously validate the effectiveness of each module in the proposed network.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102824"},"PeriodicalIF":2.2,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145020653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-end cross-domain network slicing for LEO satellite Internet of Things using deep reinforcement learning","authors":"Mingjun Liao , Ruyan Wang , Puning Zhang","doi":"10.1016/j.phycom.2025.102821","DOIUrl":"10.1016/j.phycom.2025.102821","url":null,"abstract":"<div><div>Low earth orbit satellite Internet of Things (LEO SIoT) represents a pivotal infrastructure for enabling global, ubiquitous, and low-latency communications. Network slicing has emerged as a promising paradigm to address the core challenges of dynamic resource allocation and service differentiation in LEO SIoT. To ensure end-to-end Quality of Service (QoS) across slices, we propose an end-to-end cross-domain slicing framework. This framework comprises a centralized cross-domain coordinator and multiple domain-specific controllers. An adaptive cross-domain delay-balancing strategy is devised for the coordinator to allocate delay budgets across domains. Based on the allocated delay budgets, a radio access network (RAN) slicing policy is developed for the RAN controller using a Dueling Double Deep Q-Network (D3QN), enabling dynamic wireless resource allocation that guarantees low-latency for ultra-reliable low-latency communication (URLLC) services while optimizing throughput for enhanced mobile broadband (eMBB) users. To cope with the rapidly evolving LEO topology, a rollback mechanism-based authentic boundary Proximal Policy Optimization (RMABPPO) algorithm, enhanced with an integrated Graph Attention Network and Sequence-to-Sequence module (iGATSeq), is introduced for core network (CN) slicing. Simulation results demonstrate that the proposed end-to-end cross-domain slicing solution not only ensures Quality of Experience (QoE) for both eMBB and URLLC users, but also significantly improves resource utilization in LEO SIoT.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102821"},"PeriodicalIF":2.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhichao Sheng , Yujiao Qiu , Ali Arshad Nasir , Syed Ali Hassan , Xue-Xia Yang
{"title":"Near-field multiuser secure communication via dynamic metasurface antenna","authors":"Zhichao Sheng , Yujiao Qiu , Ali Arshad Nasir , Syed Ali Hassan , Xue-Xia Yang","doi":"10.1016/j.phycom.2025.102817","DOIUrl":"10.1016/j.phycom.2025.102817","url":null,"abstract":"<div><div>The near-field multiuser secure communication system is investigated in this paper, where dynamic metasurface antennas (DMAs) are deployed at the base station to communicate with multiple users under the threats of multiple eavesdroppers. To ensure the safety performance of the system, the minimum secrecy rate is maximized by jointly optimizing the DMA weight matrix and digital precoder under the constraints of transmit power and the Lorentzian phase of DMA. A two-stage algorithm is proposed to address the nonconvex optimization problem. In the first stage, the fully digital (FD) beamformer is designed using successive convex approximation technique. In the second stage, the Euclidean distance between the FD beamformer and the DMA-based beamformer is minimized. To this end, the DMA weight matrix and the digital precoder are alternatively optimized by the block coordinate descent approach. In numerical simulations, the DMA-based beamforming design achieves better performance than the conventional partially connected phase-shift-based hybrid analog/digital beamforming design.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"72 ","pages":"Article 102817"},"PeriodicalIF":2.2,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144917794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tian Chen , Wanming Hao , Wencong Yang , Shouyi Yang , Xuandi Sun , Zhiqing Tang
{"title":"A joint privacy protection algorithm for edge computing task offloading based on Dempster–Shafer evidence theory","authors":"Tian Chen , Wanming Hao , Wencong Yang , Shouyi Yang , Xuandi Sun , Zhiqing Tang","doi":"10.1016/j.phycom.2025.102813","DOIUrl":"10.1016/j.phycom.2025.102813","url":null,"abstract":"<div><div>Edge computing reduces system latency by offloading tasks from cloud servers to Internet of Things (IoT) devices. This architecture decreases network congestion, improves system efficiency, and enables real-time processing. However, in consideration of resource efficiency, user devices tend to select the nearest cloud servers, which may enable potential malicious eavesdropping devices to infer user location through intercepted communication information. Existing research has used privacy entropy to measure user location privacy, and assigned different privacy entropy values to various types of cloud servers. However, user privacy protection in real-world scenarios depends on multiple factors, not just the classification of edge cloud servers. To solve this problem, we propose a joint privacy protection algorithm (JPPA), which introduces a novel metric for user location privacy guarantee called belief, this metric combines two key factors: task caching status and the geographical location of edge cloud servers. We formulate the problem as a constrained Markov decision process (CMDP), aiming to minimize the average network traffic subject to constraints on belief levels and energy outage probability. By transforming the CMDP into a linear programming problem, computational feasibility is ensured. Simulation results demonstrate that compared to traditional privacy entropy-constrained methods, JPPA reduces average network traffic overhead more effectively while ensuring user location privacy.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"72 ","pages":"Article 102813"},"PeriodicalIF":2.2,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144922620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CBAM-VAE based CSI feedback for NR 5G compliant system","authors":"Anusaya Swain , Shrishail M. Hiremath , Sarat Kumar Patra , Shivashankar Hiremath","doi":"10.1016/j.phycom.2025.102816","DOIUrl":"10.1016/j.phycom.2025.102816","url":null,"abstract":"<div><div>The promising performance gains of massive multiple-input and multiple-output (M-MIMO) rely on the accurate downlink channel state information (CSI) at the base station (BS). In the case of frequency division duplex (FDD) systems, the user equipment (UE) has to feed the estimated downlink CSI matrix to the BS precisely due to the absence of the principle of reciprocity. However, M-MIMO systems have a large number of antennas which leads to a significant amount of CSI data. Sending all this data back to the BS creates a bottleneck, consuming a large portion of the limited bandwidth resources available. In this paper, CBAM-VAE, a novel deep learning (DL) framework that complies with the 3GPP specifications is proposed to effectively analyze the objective of CSI feedback. The model is designed to incorporate the key features of the convolutional block attention module (CBAM) integrated with the variational autoencoder (VAE) hence, termed CBAM-VAE. The experimental outcomes show the superior performance of the designed architecture in comparison to the baseline networks using cosine similarity (<span><math><mi>ρ</mi></math></span>) and normalized mean square error (NMSE) as the key performance indicators for four distinct lengths of codeword <span><math><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>s</mi></mrow></msub><mo>)</mo></mrow></math></span>. In addition, CBAM-VAE also has less computational overhead making it acceptable for real-time scenarios.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"72 ","pages":"Article 102816"},"PeriodicalIF":2.2,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144911949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}