Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

被引:20
|
作者
Sun, Ranran [1 ]
Yang, Bin [2 ]
Shen, Yulong [1 ]
Jiang, Xiaohong [3 ]
Taleb, Tarik [4 ,5 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate 0418655, Japan
[4] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
[5] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Covertness; device-to-device (D2D); performance model and optimization; secrecy; PHYSICAL LAYER SECURITY; UNDERLAYING CELLULAR NETWORKS; TRAJECTORY OPTIMIZATION; COMMUNICATION; RESOURCE; CHALLENGES; SYSTEMS; IOT;
D O I
10.1109/JIOT.2022.3201021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay R. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdrop-ping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covert-ness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spec-trum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 50 条
  • [31] Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
    Chen, Dechuan
    Li, Jin
    Hu, Jianwei
    Zhang, Xingang
    Zhang, Shuai
    Wang, Dong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2024, 2024
  • [32] Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks
    Moualeu, Jules M.
    Ngatched, Telex M. N.
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 (01): : 413 - 427
  • [33] Achievable secrecy rate analysis of OFDM-based multi-user untrusted relay networks with imperfect CSI
    Ozduran, Volkan
    Nomikos, Nikolaos
    Ansari, Imran Shafique
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (06):
  • [34] Secrecy Outage Probability of Multiuser Untrusted Amplify-and-Forward Relay Networks
    Deng, Dan
    Zhou, Wen
    Fan, Lisheng
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [35] Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks
    Abedi, Mohammad Reza
    Mokari, Nader
    Javan, Mohammad Reza
    Yanikomeroglu, Halim
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) : 2604 - 2618
  • [36] Subcarrier pairing as channel gain tailoring: Joint resource allocation for relay-assisted secure OFDMA with untrusted users
    Saini, Ravikant
    Mishra, Deepak
    De, Swades
    PHYSICAL COMMUNICATION, 2019, 32 : 217 - 230
  • [37] Study on covert rate in the D2D networks with multiple non-colluding wardens
    Jiao, Jingsen
    Sun, Ranran
    Cao, Yizhi
    Miao, Qifeng
    Zuo, Yanchun
    Yang, Weidong
    COMPUTER NETWORKS, 2024, 250
  • [38] Jamming partner selection for maximising the worst D2D secrecy rate based on social trust
    Wang, Li
    Wu, Huaqing
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (02):
  • [39] Joint TAS and power allocation for D2D cooperative networks
    Xu, Lingwei
    Zhang, Hao
    Gulliver, T. Aaron
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 945 - 953
  • [40] Secrecy Transmission for Self-Energy Recycling Untrusted Relay Networks With Imperfect Channel State Information
    Xu, Siyang
    Song, Xin
    Xie, Zhigang
    Cao, Jing
    Wang, Jingpu
    IEEE ACCESS, 2019, 7 : 169724 - 169733