R. Sun, B. Yang, Y. Shen, X. Jiang and T. Taleb, "Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks," in IEEE Internet of Things Journal, vol. 10, no. 1, pp. 17-30, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3201021

### Covertness and secrecy study in untrusted relay-assisted D2D networks

Saved in:
Author: Sun, Ranran1; Yang, Bin2; Shen, Yulong1;
Organizations: 1School of Computer Science and Technology, Xidian University, Xi’an, China
2School of Computer and Information Engineering, Chuzhou University, Chuzhou, China
3School of Systems Information Science, Future University Hakodate, Hakodate, Japan
4Center of Wireless Communications, University of Oulu, Oulu, Finland
5Department of Computer and Information Security, Sejong University, Seoul, South Korea
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 1.2 MB)
Language: English
Published: Institute of Electrical and Electronics Engineers, 2022
Publish Date: 2023-03-02
Description:

# Abstract

This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay $$R$$. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdropping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covertness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spectrum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios.

see all

Series: IEEE internet of things journal
ISSN: 2372-2541
ISSN-E: 2327-4662
ISSN-L: 2327-4662
Volume: 10
Issue: 1
Pages: 17 - 30
DOI: 10.1109/JIOT.2022.3201021