Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks

被引:17
作者
Wu, Huihui [1 ]
Zhang, Yuanyu [2 ]
Shen, Yulong [2 ]
Jiang, Xiaohong [3 ]
Taleb, Tarik [4 ]
机构
[1] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol, Dept Automat, Beijing 100084, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate 0418655, Japan
[4] Univ Oulu, Informat Technol & Elect Engn, Oulu 90570, Finland
基金
日本学术振兴会;
关键词
Covertness; Internet of Things (IoT); physical layer security (PLS); secrecy; wireless communication; PHYSICAL LAYER SECURITY; WIRELESS COMMUNICATION; RESOURCE-ALLOCATION; RELAY; NETWORKS; CHANNEL; TRANSMISSION; INFORMATION; SELECTION; NOISE;
D O I
10.1109/JIOT.2023.3296368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article explores a new secure wireless communication scenario for the data collection in the Internet of Things (IoT) where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical covertness and secrecy properties of the communication are jointly guaranteed. We first provide theoretical modeling for covertness outage probability (COP), secrecy outage probability (SOP), and transmission probability (TP) to depict the covertness, secrecy, and transmission performances of the wireless communication system. To understand the fundamental security performance under the wireless communication system, we then define a new metric-covert secrecy rate (CSR), which characterizes the maximum transmission rate subject to the constraints of COP, SOP, and TP. We further conduct a detailed theoretical analysis to identify the CSR under various scenarios determined by the detector-eavesdropper relationships and the secure transmission schemes adopted by transmitters. Finally, numerical results are provided to illustrate the achievable performances under the secure wireless communication system.
引用
收藏
页码:3233 / 3249
页数:17
相关论文
共 64 条
[1]   Analysis of Interference Management in Heterogeneous Cellular Networks in the Presence of Wideband Jammers [J].
Abbas, Ziaul Haq ;
Abbas, Ghulam ;
Haroon, Muhammad Sajid ;
Muhammad, Fazal .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (05) :1138-1141
[2]  
Azmi P., 2018, arXiv
[3]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[4]   Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don ;
Guha, Saikat .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :26-+
[5]  
Browder A., 2012, Mathematical Analysis: An Introduction
[6]   Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden With Uncertain Locations [J].
Chen, Xinying ;
Sun, Wen ;
Xing, Chengwen ;
Zhao, Nan ;
Chen, Yunfei ;
Yu, F. Richard ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (08) :5467-5480
[7]  
Cover TM., 2006, ELEMENTS INFORM THEO, DOI [DOI 10.1002/047174882X, DOI 10.1002/0471200611.CH2]
[8]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper [J].
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Sharif, Bayan ;
Tian, Gui Yun ;
Leung, Kin K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (04) :1678-1690
[9]   Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service [J].
Du, Jun ;
Jiang, Chunxiao ;
Wang, Jian ;
Ren, Yong ;
Debbah, Merouane .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (04) :122-134
[10]   Mean-Field Artificial Noise Assistance and Uplink Power Control in Covert IoT Systems [J].
Feng, Shaohan ;
Lu, Xiao ;
Sun, Sumei ;
Niyato, Dusit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (09) :7358-7373