Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming

被引:11
|
作者
Feng, Shaohan [1 ]
Lu, Xiao [2 ]
Sun, Sumei [3 ]
Niyato, Dusit [4 ]
Hossain, Ekram [5 ]
机构
[1] Zhejiang Gongshang Univ, Sussex Artificial Intelligence Inst, Sch Informat & Elect Engn, Hangzhou 310018, Peoples R China
[2] Ericsson Canada Inc, Kanata, ON K2K 2V6, Canada
[3] ASTAR, Inst Infocomm Res I2R, Singapore 138632, Singapore
[4] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[5] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB R3T 5V6, Canada
关键词
Large-scale D2D network; covert communication; physical-layer security; friendly jamming; Stackelberg game; successive convex approximation; CELLULAR NETWORKS; ENERGY;
D O I
10.1109/TWC.2023.3280464
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, and 2) leveraging friendly jamming to ensure information secrecy even if the D2D transmissions are detected. We model the combat between the wardens and the D2D network (the transmitters and the friendly jammers) as a two-stage Stackelberg game. Therein, the wardens are the followers at the lower stage aiming to minimize their detection errors, and the D2D network is the leader at the upper stage aiming to maximize its utility (in terms of link reliability and communication security) subject to the constraint on communication covertness. We apply stochastic geometry to model the network spatial configuration so as to conduct a system-level study. We develop a bi-level optimization algorithm to search for the equilibrium of the proposed Stackelberg game based on the successive convex approximation (SCA) method and Rosenbrock method. Numerical results reveal interesting insights. We observe that without the assistance from the jammers, it is difficult to achieve covert communication on D2D transmission. Moreover, we illustrate the advantages of the proposed friendly jamming-assisted covert communication by comparing it with the information-theoretical secrecy approach in terms of the secure communication probability and network utility.
引用
收藏
页码:592 / 606
页数:15
相关论文
共 50 条
  • [1] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    arXiv, 2022,
  • [2] Doubly Securing Large-Scale D2D Networks
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3884 - 3889
  • [3] Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
    Feng, Shaohan
    Lu, Xiao
    Niyato, Dusit
    Hossain, Ekram
    Sun, Sumei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (05) : 5272 - 5286
  • [4] Mode Selection and Cooperative Jamming for Covert Communication in D2D Underlaid UAV Networks
    Yang, Bin
    Taleb, Tarik
    Fan, Yuanyuan
    Shen, Shikai
    IEEE NETWORK, 2021, 35 (02): : 104 - 111
  • [5] Caching in Large-Scale Cellular Networks with D2D Assistance
    Demarchou, Eleni
    Psomas, Constantinos
    Krikidis, Ioannis
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [6] Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer
    Liu, Yuanwei
    Wang, Lifeng
    Zaidi, Syed Ali Raza
    Elkashlan, Maged
    Duong, Trung Q.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4309 - 4314
  • [7] Hidden Terminal Aware Clustering for Large-scale D2D Networks
    Seung Hyong Rhee
    Xiaoying Lei
    Wireless Personal Communications, 2019, 107 : 1367 - 1381
  • [8] Hidden Terminal Aware Clustering for Large-scale D2D Networks
    Rhee, Seung Hyong
    Lei, Xiaoying
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (03) : 1367 - 1381
  • [9] Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
    Liu, Yuanwei
    Wang, Lifeng
    Zaidi, Syed Ali Raza
    Elkashlan, Maged
    Duong, Trung Q.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (01) : 329 - 342
  • [10] Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks
    Shi, Zheng
    Ma, Shaodan
    ElSawy, Hesham
    Yang, Guanghua
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (09) : 4286 - 4302