Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming

We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their tr...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 23; no. 1; p. 1
Main Authors Feng, Shaohan, Lu, Xiao, Sun, Sumei, Niyato, Dusit, Hossain, Ekram
Format Journal Article
LanguageEnglish
Published New York IEEE 01.01.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1536-1276
1558-2248
DOI10.1109/TWC.2023.3280464

Cover

Loading…
Abstract We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, and 2) leveraging friendly jamming to ensure information secrecy even if the D2D transmissions are detected. We model the combat between the wardens and the D2D network (the transmitters and the friendly jammers) as a two-stage Stackelberg game. Therein, the wardens are the followers at the lower stage aiming to minimize their detection errors, and the D2D network is the leader at the upper stage aiming to maximize its utility (in terms of link reliability and communication security) subject to the constraint on communication covertness. We apply stochastic geometry to model the network spatial configuration so as to conduct a system-level study. We develop a bi-level optimization algorithm to search for the equilibrium of the proposed Stackelberg game based on the successive convex approximation (SCA) method and Rosenbrock method. Numerical results reveal interesting insights. We observe that without the assistance from the jammers, it is difficult to achieve covert communication on D2D transmission. Moreover, we illustrate the advantages of the proposed friendly jamming-assisted covert communication by comparing it with the information-theoretical secrecy approach in terms of the secure communication probability and network utility.
AbstractList We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, and 2) leveraging friendly jamming to ensure information secrecy even if the D2D transmissions are detected. We model the combat between the wardens and the D2D network (the transmitters and the friendly jammers) as a two-stage Stackelberg game. Therein, the wardens are the followers at the lower stage aiming to minimize their detection errors, and the D2D network is the leader at the upper stage aiming to maximize its utility (in terms of link reliability and communication security) subject to the constraint on communication covertness. We apply stochastic geometry to model the network spatial configuration so as to conduct a system-level study. We develop a bi-level optimization algorithm to search for the equilibrium of the proposed Stackelberg game based on the successive convex approximation (SCA) method and Rosenbrock method. Numerical results reveal interesting insights. We observe that without the assistance from the jammers, it is difficult to achieve covert communication on D2D transmission. Moreover, we illustrate the advantages of the proposed friendly jamming-assisted covert communication by comparing it with the information-theoretical secrecy approach in terms of the secure communication probability and network utility.
Author Lu, Xiao
Hossain, Ekram
Sun, Sumei
Feng, Shaohan
Niyato, Dusit
Author_xml – sequence: 1
  givenname: Shaohan
  orcidid: 0000-0002-8193-466X
  surname: Feng
  fullname: Feng, Shaohan
  organization: School of Information and Electronic Engineering (Sussex Artificial Intelligence Institute), Zhejiang Gongshang University, Hangzhou, China
– sequence: 2
  givenname: Xiao
  orcidid: 0000-0002-0602-2337
  surname: Lu
  fullname: Lu, Xiao
  organization: York University, Toronto, ON, Canada
– sequence: 3
  givenname: Sumei
  orcidid: 0000-0002-1701-8122
  surname: Sun
  fullname: Sun, Sumei
  organization: Institute for Infocomm Research (I2R), Agency for Science, Technology and Research (ASTAR), Singapore
– sequence: 4
  givenname: Dusit
  orcidid: 0000-0002-7442-7416
  surname: Niyato
  fullname: Niyato, Dusit
  organization: School of Computer Science and Engineering, Nanyang Technological University, Singapore
– sequence: 5
  givenname: Ekram
  orcidid: 0000-0002-5932-6887
  surname: Hossain
  fullname: Hossain, Ekram
  organization: Department of Electrical and Computer Engineering, University of Manitoba, Canada
BookMark eNp9kD1PwzAQhi1UJNrCzsAQiTnFvjiJPaKW8qEKhNqK0XKcS5WSj2InoP57EtoBMTDdSfe8d6dnRAZVXSEhl4xOGKPyZvU2nQCFYBKAoDziJ2TIwlD4AFwM-j6IfAZxdEZGzm0pZXEUhkPyukTT2rzaeAttN-gvjS7Qm8HMe8bmq7bvzlu7fjytP9E2XSnLtsqNbvK68nSVenObY5UWe-9Jl2VHnpPTTBcOL451TNbzu9X0wV-83D9Obxe-AQmNL4BxE8iUZzE1knEuQgy5wBRpAlILCZBKCVEUJylKGScmjnlGQQMLdCLDYEyuD3t3tv5o0TVqW7e26k4qkAxk2EkQHRUdKGNr5yxmyuTNz_ON1XmhGFW9PtXpU70-ddTXBemf4M7mpbb7_yJXh0iOiL9wxgPOZPANekZ7Ow
CODEN ITWCAX
CitedBy_id crossref_primary_10_1007_s10207_024_00960_7
crossref_primary_10_1109_TMC_2024_3371377
crossref_primary_10_1109_TIFS_2025_3540575
crossref_primary_10_1109_TMC_2024_3396793
crossref_primary_10_3390_s24113389
crossref_primary_10_1109_JIOT_2024_3460052
crossref_primary_10_1109_TIFS_2025_3530689
crossref_primary_10_3390_s25020350
Cites_doi 10.1109/TSP.2013.2293126
10.1109/COMST.2021.3104581
10.1109/JSAC.2018.2872373
10.1016/s0003-2670(00)82860-3
10.1109/TWC.2016.2614502
10.1109/GLOCOM.2018.8647745
10.1109/TCOMM.2020.3017287
10.1109/TWC.2021.3068096
10.1109/MNET.011.1900579
10.1109/TWC.2015.2504983
10.1109/INFOCOMWKSHPS50562.2020.9162671
10.1109/TCOMM.2015.2411266
10.1017/CBO9781139043816
10.1109/ICC.2018.8422940
10.1109/TWC.2021.3059306
10.1109/LCOMM.2016.2647716
10.1201/9781003042273
10.1109/JCN.2019.000042
10.1109/CIOT.2018.8627099
10.1109/TIT.2013.2276811
10.1109/TCOMM.2018.2854275
10.1109/TCOMM.2021.3116162
10.1109/ICACC.2010.5486887
10.1109/VTCFall.2013.6692447
10.1109/TVT.2021.3121004
10.1109/TWC.2022.3157885
10.1109/MSN.2009.73
10.1109/TWC.2016.2562010
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TWC.2023.3280464
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 1
ExternalDocumentID 10_1109_TWC_2023_3280464
10143419
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
HZ~
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
AETIX
AIBXA
CITATION
EJD
H~9
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c292t-8214c39d4f70c914485e548ede0b29a8922d992667bde997bc774f02a213ab953
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Sun Jul 13 05:00:41 EDT 2025
Thu Apr 24 23:09:54 EDT 2025
Tue Jul 01 04:13:36 EDT 2025
Wed Aug 27 02:57:13 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-8214c39d4f70c914485e548ede0b29a8922d992667bde997bc774f02a213ab953
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8193-466X
0000-0002-7442-7416
0000-0002-0602-2337
0000-0002-1701-8122
0000-0002-5932-6887
PQID 2912954648
PQPubID 105736
PageCount 1
ParticipantIDs ieee_primary_10143419
proquest_journals_2912954648
crossref_citationtrail_10_1109_TWC_2023_3280464
crossref_primary_10_1109_TWC_2023_3280464
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-01-01
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – month: 01
  year: 2024
  text: 2024-01-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref15
ref14
ref31
ref11
ref2
Cohen (ref33) 2007; 5
ref1
ref17
Forouzesh (ref10) 2018
ref16
ref19
ref18
Palomar (ref30) 2020
Van Huynh (ref12) 2022
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
Havil (ref32) 2003
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref29
  doi: 10.1109/TSP.2013.2293126
– ident: ref31
  doi: 10.1109/COMST.2021.3104581
– ident: ref2
  doi: 10.1109/JSAC.2018.2872373
– ident: ref28
  doi: 10.1016/s0003-2670(00)82860-3
– ident: ref15
  doi: 10.1109/TWC.2016.2614502
– ident: ref17
  doi: 10.1109/GLOCOM.2018.8647745
– start-page: 250
  volume-title: Gamma: Exploring Euler’s Constant
  year: 2003
  ident: ref32
– ident: ref1
  doi: 10.1109/TCOMM.2020.3017287
– ident: ref21
  doi: 10.1109/TWC.2021.3068096
– year: 2018
  ident: ref10
  article-title: Information-theoretic security or covert communication
  publication-title: arXiv:1803.06608
– ident: ref14
  doi: 10.1109/MNET.011.1900579
– ident: ref22
  doi: 10.1109/TWC.2015.2504983
– ident: ref18
  doi: 10.1109/INFOCOMWKSHPS50562.2020.9162671
– ident: ref24
  doi: 10.1109/TCOMM.2015.2411266
– ident: ref7
  doi: 10.1017/CBO9781139043816
– ident: ref11
  doi: 10.1109/ICC.2018.8422940
– ident: ref20
  doi: 10.1109/TWC.2021.3059306
– ident: ref3
  doi: 10.1109/LCOMM.2016.2647716
– year: 2022
  ident: ref12
  article-title: Defeating eavesdroppers with ambient backscatter communications
  publication-title: arXiv:2201.06204
– ident: ref27
  doi: 10.1201/9781003042273
– ident: ref19
  doi: 10.1109/JCN.2019.000042
– volume-title: Algorithms: Successive Convex Approximation (SCA)
  year: 2020
  ident: ref30
– ident: ref6
  doi: 10.1109/CIOT.2018.8627099
– ident: ref8
  doi: 10.1109/TIT.2013.2276811
– ident: ref9
  doi: 10.1109/TCOMM.2018.2854275
– ident: ref13
  doi: 10.1109/TCOMM.2021.3116162
– ident: ref26
  doi: 10.1109/ICACC.2010.5486887
– volume: 5
  volume-title: Numerical Methods for Laplace Transform Inversion
  year: 2007
  ident: ref33
– ident: ref25
  doi: 10.1109/VTCFall.2013.6692447
– ident: ref5
  doi: 10.1109/TVT.2021.3121004
– ident: ref4
  doi: 10.1109/TWC.2022.3157885
– ident: ref16
  doi: 10.1109/MSN.2009.73
– ident: ref23
  doi: 10.1109/TWC.2016.2562010
SSID ssj0017655
Score 2.5182247
Snippet We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Backscatter
Communication
covert communication
Device-to-device communication
friendly jamming
Game theory
Games
Internet of Things
Jammers
Jamming
Large-scale D2D network
physical-layer security
Receivers
Stackelberg game
successive convex approximation
Transmitters
Title Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
URI https://ieeexplore.ieee.org/document/10143419
https://www.proquest.com/docview/2912954648
Volume 23
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG6Ekx58YkTR9ODFwy67bfcxRwMSQpTECJHbpi88yMPIctBfb9tdCGg03vYwbZqZduc9H0LXVEtBQh56IaeRx0LFvdToNU_FhFPBWRpI2-_80I-7Q9YbRaOyWd31wmitXfGZ9u2ny-WruVzaUFnT4sra-WMVVDGeW9GstU4ZJLGDODUv2ALLJOucZADNwXPLtzDhPiWpTeVt6SAHqvLjT-zUS-cA9VcHK6pKXv1lLnz5-W1m479Pfoj2S0MT3xY34wjt6Nkx2tsYP3iCHstg-wu-t_Xg3pORl8Zt0sb9ojh8gV1FAW7ZOs8cbzWTYD5TuGOnJKvJB-7x6dRQ1tCwczdodb0SYsGTBEjupSRkkoJi4ySQYJyrNNLGh9FKB4IAT4EQBWCUeCKUBkiENObiOCCchJQLiOgpqs7mM32GsBRAmQJGOaRMJJFZQAnX4wRiQQSTddRcMT2T5fxxC4MxyZwfEkBmxJRZMWWlmOroZr3irZi98QdtzXJ9g65geB01VoLNyte5yAiENr0Zs_T8l2UXaNfszopYSwNV8_elvjTWRy6u3K37AhD60_c
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFH7iGICBG1FODywMSRPbOd6IClWBUglRBFvkqwxAQZAO8OuxnbTiEIgtw7NsvWfn3e8DOGBGSRqLOIgFSwIeaxHkVq8FOqWCScHzSLl-54te2rnmZ7fJbd2s7nthjDG--MyE7tPn8vWTGrlQWdPhyrr5Y9MwaxU_x6pda5I0yFIPcmrfsIOWySZZyQib_ZtW6IDCQ0Zzl8z7ooU8rMqPf7FXMO0l6I2PVtWV3IejUobq_dvUxn-ffRkWa1OTHFV3YwWmzHAVFj4NIFyDyzrcfke6riI8uLISM-SYHpNeVR7-SnxNAWm5Ss-SfGknIWKoSdvNSdYPb-RMPD5aynW4bp_0W52gBlkIFEVaBjmNuWKo-SCLFFr3Kk-M9WKMNpGkKHKkVCNaNZ5JbRAzqazBOIiooDETEhO2ATPDp6HZBKIkMq6RM4E5l1liFzAqzCDDVFLJVQOaY6YXqp5A7oAwHgrviURYWDEVTkxFLaYGHE5WPFfTN_6gXXdc_0RXMbwBO2PBFvX7fC0oxi7BmfJ865dl-zDX6V90i-5p73wb5u1OvIq87MBM-TIyu9YWKeWev4EfXrfXRw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Large-Scale+D2D+Networks+Using+Covert+Communication+and+Friendly+Jamming&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Feng%2C+Shaohan&rft.au=Lu%2C+Xiao&rft.au=Sun%2C+Sumei&rft.au=Niyato%2C+Dusit&rft.date=2024-01-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=23&rft.issue=1&rft.spage=592&rft.epage=606&rft_id=info:doi/10.1109%2FTWC.2023.3280464&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2023_3280464
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon