Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their tr...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 23; no. 1; p. 1 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.01.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1536-1276 1558-2248 |
DOI | 10.1109/TWC.2023.3280464 |
Cover
Loading…
Abstract | We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, and 2) leveraging friendly jamming to ensure information secrecy even if the D2D transmissions are detected. We model the combat between the wardens and the D2D network (the transmitters and the friendly jammers) as a two-stage Stackelberg game. Therein, the wardens are the followers at the lower stage aiming to minimize their detection errors, and the D2D network is the leader at the upper stage aiming to maximize its utility (in terms of link reliability and communication security) subject to the constraint on communication covertness. We apply stochastic geometry to model the network spatial configuration so as to conduct a system-level study. We develop a bi-level optimization algorithm to search for the equilibrium of the proposed Stackelberg game based on the successive convex approximation (SCA) method and Rosenbrock method. Numerical results reveal interesting insights. We observe that without the assistance from the jammers, it is difficult to achieve covert communication on D2D transmission. Moreover, we illustrate the advantages of the proposed friendly jamming-assisted covert communication by comparing it with the information-theoretical secrecy approach in terms of the secure communication probability and network utility. |
---|---|
AbstractList | We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, and 2) leveraging friendly jamming to ensure information secrecy even if the D2D transmissions are detected. We model the combat between the wardens and the D2D network (the transmitters and the friendly jammers) as a two-stage Stackelberg game. Therein, the wardens are the followers at the lower stage aiming to minimize their detection errors, and the D2D network is the leader at the upper stage aiming to maximize its utility (in terms of link reliability and communication security) subject to the constraint on communication covertness. We apply stochastic geometry to model the network spatial configuration so as to conduct a system-level study. We develop a bi-level optimization algorithm to search for the equilibrium of the proposed Stackelberg game based on the successive convex approximation (SCA) method and Rosenbrock method. Numerical results reveal interesting insights. We observe that without the assistance from the jammers, it is difficult to achieve covert communication on D2D transmission. Moreover, we illustrate the advantages of the proposed friendly jamming-assisted covert communication by comparing it with the information-theoretical secrecy approach in terms of the secure communication probability and network utility. |
Author | Lu, Xiao Hossain, Ekram Sun, Sumei Feng, Shaohan Niyato, Dusit |
Author_xml | – sequence: 1 givenname: Shaohan orcidid: 0000-0002-8193-466X surname: Feng fullname: Feng, Shaohan organization: School of Information and Electronic Engineering (Sussex Artificial Intelligence Institute), Zhejiang Gongshang University, Hangzhou, China – sequence: 2 givenname: Xiao orcidid: 0000-0002-0602-2337 surname: Lu fullname: Lu, Xiao organization: York University, Toronto, ON, Canada – sequence: 3 givenname: Sumei orcidid: 0000-0002-1701-8122 surname: Sun fullname: Sun, Sumei organization: Institute for Infocomm Research (I2R), Agency for Science, Technology and Research (ASTAR), Singapore – sequence: 4 givenname: Dusit orcidid: 0000-0002-7442-7416 surname: Niyato fullname: Niyato, Dusit organization: School of Computer Science and Engineering, Nanyang Technological University, Singapore – sequence: 5 givenname: Ekram orcidid: 0000-0002-5932-6887 surname: Hossain fullname: Hossain, Ekram organization: Department of Electrical and Computer Engineering, University of Manitoba, Canada |
BookMark | eNp9kD1PwzAQhi1UJNrCzsAQiTnFvjiJPaKW8qEKhNqK0XKcS5WSj2InoP57EtoBMTDdSfe8d6dnRAZVXSEhl4xOGKPyZvU2nQCFYBKAoDziJ2TIwlD4AFwM-j6IfAZxdEZGzm0pZXEUhkPyukTT2rzaeAttN-gvjS7Qm8HMe8bmq7bvzlu7fjytP9E2XSnLtsqNbvK68nSVenObY5UWe-9Jl2VHnpPTTBcOL451TNbzu9X0wV-83D9Obxe-AQmNL4BxE8iUZzE1knEuQgy5wBRpAlILCZBKCVEUJylKGScmjnlGQQMLdCLDYEyuD3t3tv5o0TVqW7e26k4qkAxk2EkQHRUdKGNr5yxmyuTNz_ON1XmhGFW9PtXpU70-ddTXBemf4M7mpbb7_yJXh0iOiL9wxgPOZPANekZ7Ow |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1007_s10207_024_00960_7 crossref_primary_10_1109_TMC_2024_3371377 crossref_primary_10_1109_TIFS_2025_3540575 crossref_primary_10_1109_TMC_2024_3396793 crossref_primary_10_3390_s24113389 crossref_primary_10_1109_JIOT_2024_3460052 crossref_primary_10_1109_TIFS_2025_3530689 crossref_primary_10_3390_s25020350 |
Cites_doi | 10.1109/TSP.2013.2293126 10.1109/COMST.2021.3104581 10.1109/JSAC.2018.2872373 10.1016/s0003-2670(00)82860-3 10.1109/TWC.2016.2614502 10.1109/GLOCOM.2018.8647745 10.1109/TCOMM.2020.3017287 10.1109/TWC.2021.3068096 10.1109/MNET.011.1900579 10.1109/TWC.2015.2504983 10.1109/INFOCOMWKSHPS50562.2020.9162671 10.1109/TCOMM.2015.2411266 10.1017/CBO9781139043816 10.1109/ICC.2018.8422940 10.1109/TWC.2021.3059306 10.1109/LCOMM.2016.2647716 10.1201/9781003042273 10.1109/JCN.2019.000042 10.1109/CIOT.2018.8627099 10.1109/TIT.2013.2276811 10.1109/TCOMM.2018.2854275 10.1109/TCOMM.2021.3116162 10.1109/ICACC.2010.5486887 10.1109/VTCFall.2013.6692447 10.1109/TVT.2021.3121004 10.1109/TWC.2022.3157885 10.1109/MSN.2009.73 10.1109/TWC.2016.2562010 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TWC.2023.3280464 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2248 |
EndPage | 1 |
ExternalDocumentID | 10_1109_TWC_2023_3280464 10143419 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS HZ~ IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX AETIX AIBXA CITATION EJD H~9 RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c292t-8214c39d4f70c914485e548ede0b29a8922d992667bde997bc774f02a213ab953 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Sun Jul 13 05:00:41 EDT 2025 Thu Apr 24 23:09:54 EDT 2025 Tue Jul 01 04:13:36 EDT 2025 Wed Aug 27 02:57:13 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c292t-8214c39d4f70c914485e548ede0b29a8922d992667bde997bc774f02a213ab953 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8193-466X 0000-0002-7442-7416 0000-0002-0602-2337 0000-0002-1701-8122 0000-0002-5932-6887 |
PQID | 2912954648 |
PQPubID | 105736 |
PageCount | 1 |
ParticipantIDs | ieee_primary_10143419 proquest_journals_2912954648 crossref_citationtrail_10_1109_TWC_2023_3280464 crossref_primary_10_1109_TWC_2023_3280464 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-01-01 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2024 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref15 ref14 ref31 ref11 ref2 Cohen (ref33) 2007; 5 ref1 ref17 Forouzesh (ref10) 2018 ref16 ref19 ref18 Palomar (ref30) 2020 Van Huynh (ref12) 2022 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 Havil (ref32) 2003 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref29 doi: 10.1109/TSP.2013.2293126 – ident: ref31 doi: 10.1109/COMST.2021.3104581 – ident: ref2 doi: 10.1109/JSAC.2018.2872373 – ident: ref28 doi: 10.1016/s0003-2670(00)82860-3 – ident: ref15 doi: 10.1109/TWC.2016.2614502 – ident: ref17 doi: 10.1109/GLOCOM.2018.8647745 – start-page: 250 volume-title: Gamma: Exploring Euler’s Constant year: 2003 ident: ref32 – ident: ref1 doi: 10.1109/TCOMM.2020.3017287 – ident: ref21 doi: 10.1109/TWC.2021.3068096 – year: 2018 ident: ref10 article-title: Information-theoretic security or covert communication publication-title: arXiv:1803.06608 – ident: ref14 doi: 10.1109/MNET.011.1900579 – ident: ref22 doi: 10.1109/TWC.2015.2504983 – ident: ref18 doi: 10.1109/INFOCOMWKSHPS50562.2020.9162671 – ident: ref24 doi: 10.1109/TCOMM.2015.2411266 – ident: ref7 doi: 10.1017/CBO9781139043816 – ident: ref11 doi: 10.1109/ICC.2018.8422940 – ident: ref20 doi: 10.1109/TWC.2021.3059306 – ident: ref3 doi: 10.1109/LCOMM.2016.2647716 – year: 2022 ident: ref12 article-title: Defeating eavesdroppers with ambient backscatter communications publication-title: arXiv:2201.06204 – ident: ref27 doi: 10.1201/9781003042273 – ident: ref19 doi: 10.1109/JCN.2019.000042 – volume-title: Algorithms: Successive Convex Approximation (SCA) year: 2020 ident: ref30 – ident: ref6 doi: 10.1109/CIOT.2018.8627099 – ident: ref8 doi: 10.1109/TIT.2013.2276811 – ident: ref9 doi: 10.1109/TCOMM.2018.2854275 – ident: ref13 doi: 10.1109/TCOMM.2021.3116162 – ident: ref26 doi: 10.1109/ICACC.2010.5486887 – volume: 5 volume-title: Numerical Methods for Laplace Transform Inversion year: 2007 ident: ref33 – ident: ref25 doi: 10.1109/VTCFall.2013.6692447 – ident: ref5 doi: 10.1109/TVT.2021.3121004 – ident: ref4 doi: 10.1109/TWC.2022.3157885 – ident: ref16 doi: 10.1109/MSN.2009.73 – ident: ref23 doi: 10.1109/TWC.2016.2562010 |
SSID | ssj0017655 |
Score | 2.5182247 |
Snippet | We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Backscatter Communication covert communication Device-to-device communication friendly jamming Game theory Games Internet of Things Jammers Jamming Large-scale D2D network physical-layer security Receivers Stackelberg game successive convex approximation Transmitters |
Title | Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming |
URI | https://ieeexplore.ieee.org/document/10143419 https://www.proquest.com/docview/2912954648 |
Volume | 23 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG6Ekx58YkTR9ODFwy67bfcxRwMSQpTECJHbpi88yMPIctBfb9tdCGg03vYwbZqZduc9H0LXVEtBQh56IaeRx0LFvdToNU_FhFPBWRpI2-_80I-7Q9YbRaOyWd31wmitXfGZ9u2ny-WruVzaUFnT4sra-WMVVDGeW9GstU4ZJLGDODUv2ALLJOucZADNwXPLtzDhPiWpTeVt6SAHqvLjT-zUS-cA9VcHK6pKXv1lLnz5-W1m479Pfoj2S0MT3xY34wjt6Nkx2tsYP3iCHstg-wu-t_Xg3pORl8Zt0sb9ojh8gV1FAW7ZOs8cbzWTYD5TuGOnJKvJB-7x6dRQ1tCwczdodb0SYsGTBEjupSRkkoJi4ySQYJyrNNLGh9FKB4IAT4EQBWCUeCKUBkiENObiOCCchJQLiOgpqs7mM32GsBRAmQJGOaRMJJFZQAnX4wRiQQSTddRcMT2T5fxxC4MxyZwfEkBmxJRZMWWlmOroZr3irZi98QdtzXJ9g65geB01VoLNyte5yAiENr0Zs_T8l2UXaNfszopYSwNV8_elvjTWRy6u3K37AhD60_c |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFH7iGICBG1FODywMSRPbOd6IClWBUglRBFvkqwxAQZAO8OuxnbTiEIgtw7NsvWfn3e8DOGBGSRqLOIgFSwIeaxHkVq8FOqWCScHzSLl-54te2rnmZ7fJbd2s7nthjDG--MyE7tPn8vWTGrlQWdPhyrr5Y9MwaxU_x6pda5I0yFIPcmrfsIOWySZZyQib_ZtW6IDCQ0Zzl8z7ooU8rMqPf7FXMO0l6I2PVtWV3IejUobq_dvUxn-ffRkWa1OTHFV3YwWmzHAVFj4NIFyDyzrcfke6riI8uLISM-SYHpNeVR7-SnxNAWm5Ss-SfGknIWKoSdvNSdYPb-RMPD5aynW4bp_0W52gBlkIFEVaBjmNuWKo-SCLFFr3Kk-M9WKMNpGkKHKkVCNaNZ5JbRAzqazBOIiooDETEhO2ATPDp6HZBKIkMq6RM4E5l1liFzAqzCDDVFLJVQOaY6YXqp5A7oAwHgrviURYWDEVTkxFLaYGHE5WPFfTN_6gXXdc_0RXMbwBO2PBFvX7fC0oxi7BmfJ865dl-zDX6V90i-5p73wb5u1OvIq87MBM-TIyu9YWKeWev4EfXrfXRw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Large-Scale+D2D+Networks+Using+Covert+Communication+and+Friendly+Jamming&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Feng%2C+Shaohan&rft.au=Lu%2C+Xiao&rft.au=Sun%2C+Sumei&rft.au=Niyato%2C+Dusit&rft.date=2024-01-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=23&rft.issue=1&rft.spage=592&rft.epage=606&rft_id=info:doi/10.1109%2FTWC.2023.3280464&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2023_3280464 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |