Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

被引:20
|
作者
Sun, Ranran [1 ]
Yang, Bin [2 ]
Shen, Yulong [1 ]
Jiang, Xiaohong [3 ]
Taleb, Tarik [4 ,5 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate 0418655, Japan
[4] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
[5] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Covertness; device-to-device (D2D); performance model and optimization; secrecy; PHYSICAL LAYER SECURITY; UNDERLAYING CELLULAR NETWORKS; TRAJECTORY OPTIMIZATION; COMMUNICATION; RESOURCE; CHALLENGES; SYSTEMS; IOT;
D O I
10.1109/JIOT.2022.3201021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay R. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdrop-ping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covert-ness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spec-trum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 50 条
  • [21] Secrecy performance of D2D assisted cooperative uplink NOMA system with optimal power allocation strategy
    Kavitha, Kankanala
    Vappangi, Suseela
    DIGITAL SIGNAL PROCESSING, 2025, 156
  • [22] Interference-Constrained Pricing for D2D Networks
    Liu, Yuan
    Wang, Rui
    Han, Zhu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (01) : 475 - 486
  • [23] Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted
    Kang Xiaolei
    Ji Xinsheng
    Huang Kaizhi
    Zhong Zhou
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [24] Secrecy Anti-jamming Game Learning in D2D Underlay Cellular Networks with an Active Eavesdropper
    Luo, Yijie
    Yang, Yang
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 446 - 451
  • [25] D2D underlay massive MIMO hybrid networks with improved physical layer secrecy and energy efficiency
    Jia, Xiangdong
    Xie, Mangang
    Zhou, Meng
    Zhu, Hongbo
    Yang, Longxiang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (13)
  • [26] Interference Alignment Assisted by D2D Communication for the Downlink of MIMO Heterogeneous Networks
    Zeng, Sheng
    Wang, Chaowei
    Qin, Cai
    Wang, Weidong
    IEEE ACCESS, 2018, 6 : 24757 - 24766
  • [27] Improving Secrecy Rate and Social Welfare by NOMA Technique in D2D Communications Network
    Alibeigi, Maryam
    Taherpour, Abbas
    Gazor, Saeed
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02): : 907 - 916
  • [28] Relay Selection for Improving Physical Layer Security in D2D Underlay Communications
    Khoshafa, Majid H.
    Ngatched, Telex M. N.
    Ahmed, Mohamed H.
    IEEE ACCESS, 2022, 10 : 95539 - 95552
  • [29] Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
    Zhou, Nanrun
    Chen, Xun
    Li, Chisheng
    Xue, Zhi
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 119 - 129
  • [30] Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
    Nanrun Zhou
    Xun Chen
    Chisheng Li
    Zhi Xue
    Wireless Personal Communications, 2014, 75 : 119 - 129