Covertness and secrecy study in untrusted relay-assisted D2D networks |
|
Author: | Sun, Ranran1; Yang, Bin2; Shen, Yulong1; |
Organizations: |
1School of Computer Science and Technology, Xidian University, Xi’an, China 2School of Computer and Information Engineering, Chuzhou University, Chuzhou, China 3School of Systems Information Science, Future University Hakodate, Hakodate, Japan
4Center of Wireless Communications, University of Oulu, Oulu, Finland
5Department of Computer and Information Security, Sejong University, Seoul, South Korea |
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 1.2 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2023030229198 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2022
|
Publish Date: | 2023-03-02 |
Description: |
AbstractThis article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdropping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covertness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spectrum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios. see all
|
Series: |
IEEE internet of things journal |
ISSN: | 2372-2541 |
ISSN-E: | 2327-4662 |
ISSN-L: | 2327-4662 |
Volume: | 10 |
Issue: | 1 |
Pages: | 17 - 30 |
DOI: | 10.1109/JIOT.2022.3201021 |
OADOI: | https://oadoi.org/10.1109/JIOT.2022.3201021 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This work was supported in part by the National Key Research and Development Program of China under Grant No. 2018YFE0207600; in part by the Natural Science Basic Research Program of Shaanxi under Grant No. 2019JC-17; in part by the National Natural Science Foundation of China under Grant No. 61972308 and 61962033; in part by the Academy of Finland Projects: 6Genesis under Grant No. 318927 and IDEA-MILL under Grant No. 335936; in part by the Natural Science Project of Anhui/ChuZhou University under Grant No. KJ2021ZD0128 ,KJ2021ZD0129,and 2022XJZD12. |
Academy of Finland Grant Number: |
318927 |
Detailed Information: |
318927 (Academy of Finland Funding decision) |
Copyright information: |
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |