Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

被引:20
|
作者
Sun, Ranran [1 ]
Yang, Bin [2 ]
Shen, Yulong [1 ]
Jiang, Xiaohong [3 ]
Taleb, Tarik [4 ,5 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate 0418655, Japan
[4] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
[5] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Covertness; device-to-device (D2D); performance model and optimization; secrecy; PHYSICAL LAYER SECURITY; UNDERLAYING CELLULAR NETWORKS; TRAJECTORY OPTIMIZATION; COMMUNICATION; RESOURCE; CHALLENGES; SYSTEMS; IOT;
D O I
10.1109/JIOT.2022.3201021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay R. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdrop-ping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covert-ness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spec-trum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 50 条
  • [41] Physical Layer Security in D2D Underlay Cellular Networks With Poisson Cluster Process
    Lyu, Jiawei
    Wang, Hui-Ming
    Huang, Ke-Wen
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (11) : 7123 - 7139
  • [42] Incentive-Based D2D Relaying in Cellular Networks
    Mach, Pavel
    Spyropoulos, Thrasyvoulos
    Becvar, Zdenek
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (03) : 1775 - 1788
  • [43] Performance Analysis of Network-Assisted D2D Discovery in Random Spatial Networks
    Xenakis, Dionysis
    Kountouris, Marios
    Merakos, Lazaros
    Passas, Nikos
    Verikoukis, Christos
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (08) : 5695 - 5707
  • [44] Joint 3D Trajectory and Resource Optimization for A UAV Relay-Assisted Cognitive Radio Network
    Wang, Zhen
    Zhou, Fuhui
    Wang, Yuhao
    Wu, Qihui
    CHINA COMMUNICATIONS, 2021, 18 (06) : 184 - 200
  • [45] Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols
    Parsaeefard, Saeedeh
    Tho Le-Ngoc
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2095 - 2107
  • [46] Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
    Wang, Hui-Ming
    Zhao, Bing-Qing
    Zheng, Tong-Xing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 1254 - 1267
  • [47] Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks
    Kim, Junghoon
    Kim, Taejoon
    Hashemi, Morteza
    Brinton, Christopher G.
    Love, David J.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) : 1454 - 1468
  • [48] Outage performance of relay-assisted primary and secondary transmissions in cognitive relay networks
    Zhao, Feng
    Sun, Xiangqi
    Chen, Hongbin
    Bie, Rongfang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [49] Beamforming strategies for multi-antenna relay-assisted networks
    Mirzaee, Meysam
    Akhlaghi, Soroush
    IET COMMUNICATIONS, 2016, 10 (11) : 1384 - 1393
  • [50] A Novel Relay-Assisted Protocol for Cooperative Multiple Access Networks
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    Krikidis, Ioannis
    Vasilakos, Athanasios V.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,