University of Oulu

R. Sun, B. Yang, Y. Shen, X. Jiang and T. Taleb, "Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks," in IEEE Internet of Things Journal, vol. 10, no. 1, pp. 17-30, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3201021

Covertness and secrecy study in untrusted relay-assisted D2D networks

Saved in:
Author: Sun, Ranran1; Yang, Bin2; Shen, Yulong1;
Organizations: 1School of Computer Science and Technology, Xidian University, Xi’an, China
2School of Computer and Information Engineering, Chuzhou University, Chuzhou, China
3School of Systems Information Science, Future University Hakodate, Hakodate, Japan
4Center of Wireless Communications, University of Oulu, Oulu, Finland
5Department of Computer and Information Security, Sejong University, Seoul, South Korea
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 1.2 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe2023030229198
Language: English
Published: Institute of Electrical and Electronics Engineers, 2022
Publish Date: 2023-03-02
Description:

Abstract

This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications via a D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdropping the UE message. To explore the fundamental covertness and secrecy in such a network, we first provide theoretical modelings for the average minimum detection error rate of Willie, and the average covert/secrecy rate from UE to BS under the underlay and overlay modes, respectively. Based on these models, th we further explore the optimal power control at UE, R, and BS to achieve the average covert rate maximization (MCR) for UE with the constraints of covertness and security requirements under the underlay mode. We also identify the optimal transmit powers and the optimal spectrum partition factor for MCR under the overlay mode. Finally, the exhaust searching method is adopted to solve the MCR problems, and extensive numerical and simulation results are presented to validate our theoretical analysis and to illustrate the average covert rate and secrecy rate of UE under various scenarios.

see all

Series: IEEE internet of things journal
ISSN: 2372-2541
ISSN-E: 2327-4662
ISSN-L: 2327-4662
Volume: 10
Issue: 1
Pages: 17 - 30
DOI: 10.1109/JIOT.2022.3201021
OADOI: https://oadoi.org/10.1109/JIOT.2022.3201021
Type of Publication: A1 Journal article – refereed
Field of Science: 213 Electronic, automation and communications engineering, electronics
Subjects:
Funding: This work was supported in part by the National Key Research and Development Program of China under Grant No. 2018YFE0207600; in part by the Natural Science Basic Research Program of Shaanxi under Grant No. 2019JC-17; in part by the National Natural Science Foundation of China under Grant No. 61972308 and 61962033; in part by the Academy of Finland Projects: 6Genesis under Grant No. 318927 and IDEA-MILL under Grant No. 335936; in part by the Natural Science Project of Anhui/ChuZhou University under Grant No. KJ2021ZD0128 ,KJ2021ZD0129,and 2022XJZD12.
Academy of Finland Grant Number: 318927
Detailed Information: 318927 (Academy of Finland Funding decision)
Copyright information: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.