Covert communications with friendly jamming in Internet of vehicles

被引:3
|
作者
Zhang, Hongruo [1 ]
Zou, Yifei [1 ]
Yu, Dongxiao [1 ]
Yu, Jiguo [2 ,3 ]
Cheng, Xiuzhen [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266200, Peoples R China
[2] Qilu Univ Technol, Big Data Inst, Shandong Acad Sci, Jinan 250353, Peoples R China
[3] Shandong Lab Comp Networks, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Covert communications; Friendly jamming; Internet of vehicles; Distributed algorithm; SINR model; DUAL AUTHENTICATION; ALLOCATION; POWER;
D O I
10.1016/j.vehcom.2022.100472
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Vehicles (IoV) provides an important platform for various applications in diverse vehicular sectors such as the safety, energy-saving, decision-making, routing, and entertainment, which makes vehicular transportation safer, greener, and easier. While providing convenient and efficient communications between vehicles, the wireless channel in IoV also faces an eavesdropping problem in the security area due to its open and shared nature. Different from the previous works under asymmetric assumptions, this paper studies a covert communication problem within symmetrical assumption, to prevent the eavesdropper from sensing the vehicular communications when the vehicles and eavesdropper have the same ability. Firstly, by dividing the network area into the safe area, dangerous area, and gray area, we show that with the help of a friendly jamming, all vehicular communications in the safe area can be covert. Secondly, by presenting a distributed jammer election algorithm with asymptotically optimal running time, we give an approach to obtain a friendly jammer from the vehicles for the covert communications. Finally, a comprehensive framework is presented, to convert the vehicular algorithms without covert communications into the ones only consisting of covert communications with their time complexity constant times increased as the trade-off. Empirical results validate the time efficiency of our covert communication algorithms with jammer election on running time.(C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Securing SSK-based Communications via Friendly Jamming and Antenna Selection
    Xu, Hui
    Ng, Benjamin K.
    Lam, Chan-Tong
    2022 IEEE 10th International Conference on Information, Communication and Networks, ICICN 2022, 2022, : 385 - 391
  • [32] Jamming-Assisted Short Packet Covert Communications in Multi-Hop Wireless Networks
    Yuan, Zhengyu
    Yang, Weiwei
    Lu, Xingbo
    2023 IEEE/CIC International Conference on Communications in China, ICCC 2023, 2023,
  • [33] The Internet of Vehicles based on 5G Communications
    Kombate, Damigou
    Wanglina
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 445 - 448
  • [34] Visible light communications as a complementary technology for the internet of vehicles
    Bazzi, Alessandro
    Masini, Barbara M.
    Zanella, Alberto
    Calisti, Alex
    COMPUTER COMMUNICATIONS, 2016, 93 : 39 - 51
  • [35] Ergodic Capacity Analysis on MIMO Communications in Internet of Vehicles
    Zhang, Shangwei
    Liu, Jiajia
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (02): : 923 - 939
  • [36] Ergodic Capacity Analysis on MIMO Communications in Internet of Vehicles
    Shangwei Zhang
    Jiajia Liu
    Mobile Networks and Applications, 2021, 26 : 923 - 939
  • [37] UAV-enabled Friendly Jamming Scheme to Secure Industrial Internet of Things
    Wang, Qubeijian
    Dai, Hong-Ning
    Wang, Hao
    Xu, Guangquan
    Sangaiah, Arun Kumar
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2019, 21 (05) : 481 - 490
  • [38] Cooperative Friendly Jamming in Swarm UAV-assisted Communications with Wireless Energy Harvesting
    Dang-Ngoc, Hanh
    Nguyen, Diep N.
    Hoang, Dinh Thai
    Ho-Van, Khuong
    Dutkiewicz, Eryk
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [39] Covert and Deniable Communications
    Anderson, Ross
    PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, : 1 - 1
  • [40] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (01) : 592 - 606