Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

被引:29
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Kuhestani, Ali [2 ]
Yeoh, Phee Lep [3 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115111, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Commun & Elect Dept, Qom 3716146611, Iran
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
美国国家科学基金会;
关键词
Transmitters; Optimization; Receivers; Internet of Things; Indexes; Jamming; Gold; Covert communication; imperfect channel state information (CSI); information theoretic secrecy (ITS); power allocation; PHYSICAL LAYER SECURITY; RELAY; TRANSMISSION; NETWORKS; SYSTEMS; OPTIMIZATION; ALLOCATION; POWER;
D O I
10.1109/JIOT.2020.3038682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden. To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously. We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint. Since the proposed optimization problem is nonconvex, we utilize successive convex approximation to obtain a tractable solution. Moreover, we extend our proposed system model to multiple antenna Alice scenario and find beamforming vectors so that the average sum rate is maximized. Furthermore, we consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol. Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
引用
收藏
页码:7170 / 7181
页数:12
相关论文
共 40 条