Covert communications with friendly jamming in Internet of vehicles

被引:3
|
作者
Zhang, Hongruo [1 ]
Zou, Yifei [1 ]
Yu, Dongxiao [1 ]
Yu, Jiguo [2 ,3 ]
Cheng, Xiuzhen [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266200, Peoples R China
[2] Qilu Univ Technol, Big Data Inst, Shandong Acad Sci, Jinan 250353, Peoples R China
[3] Shandong Lab Comp Networks, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Covert communications; Friendly jamming; Internet of vehicles; Distributed algorithm; SINR model; DUAL AUTHENTICATION; ALLOCATION; POWER;
D O I
10.1016/j.vehcom.2022.100472
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Vehicles (IoV) provides an important platform for various applications in diverse vehicular sectors such as the safety, energy-saving, decision-making, routing, and entertainment, which makes vehicular transportation safer, greener, and easier. While providing convenient and efficient communications between vehicles, the wireless channel in IoV also faces an eavesdropping problem in the security area due to its open and shared nature. Different from the previous works under asymmetric assumptions, this paper studies a covert communication problem within symmetrical assumption, to prevent the eavesdropper from sensing the vehicular communications when the vehicles and eavesdropper have the same ability. Firstly, by dividing the network area into the safe area, dangerous area, and gray area, we show that with the help of a friendly jamming, all vehicular communications in the safe area can be covert. Secondly, by presenting a distributed jammer election algorithm with asymptotically optimal running time, we give an approach to obtain a friendly jammer from the vehicles for the covert communications. Finally, a comprehensive framework is presented, to convert the vehicular algorithms without covert communications into the ones only consisting of covert communications with their time complexity constant times increased as the trade-off. Empirical results validate the time efficiency of our covert communication algorithms with jammer election on running time.(C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways
    Tithi, Tasnuva
    Deka, Bhaswati
    Gerdes, Ryan M.
    Winstead, Chris
    Li, Ming
    Heaslip, Kevin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) : 7437 - 7449
  • [22] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences), 2016, 59 (01) : 117 - 127
  • [23] Covert voice over internet protocol communications based on spatial model
    Huang YongFeng
    Tang ShanYu
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2016, 59 (01) : 117 - 127
  • [24] Relay-Assisted Finite Blocklength Covert Communications for Internet of Things
    Wang, Bohang
    Zhang, Yunyang
    Xu, Rui
    Jiang, Siqi
    Liu, Aijun
    Ding, Guoru
    Liang, Xiaohu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39984 - 39993
  • [25] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences) , 2016, (01) : 117 - 127
  • [26] Covert voice over internet protocol communications based on spatial model
    YongFeng Huang
    ShanYu Tang
    Science China Technological Sciences, 2016, 59 : 117 - 127
  • [27] Jamming Strategies in Covert Communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 1 - 15
  • [28] Jamming strategies in covert communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
  • [29] Combined Physical Network Coding and Friendly Jamming for Secure Wireless Cooperative Communications
    Li, Dehuai
    Yan, Shiwei
    Zhang, Xiguang
    Shang, Yong
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [30] Securing SSK-based Communications via Friendly Jamming and Antenna Selection
    Xu, Hui
    Ng, Benjamin K.
    Lam, Chan-Tong
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 385 - 391