System-Level Security Solution for Hybrid D2D Communication in Heterogeneous D2D-Underlaid Cellular Network

To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network,...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 23; no. 10; pp. 15054 - 15069
Main Authors Feng, Shaohan, Lu, Xiao, Niyato, Dusit, Wu, Yuan, Shen, Xuemin, Wang, Wenbo
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network, where the D2D communication is performed on a hybrid manner (i.e., operating over either mmWave or microwave frequency band). To secure the hybrid D2D communication against vigilant adversary, we apply covert communication to hide its presence. In particular, the D2D transmitters perform power control and communication mode switch as well as leveraging the cellular signal to avoid the transmission detection by the adversaries. We model the conflict between the D2D transmitters and adversaries in the framework of a two-stage Stackelberg game. The D2D transmitters are the leaders to maximize their utility subject to the constraints on communication covertness at the upper stage. The adversaries are the followers to minimize their detection errors at the lower stage. We apply stochastic geometry to mathematically characterize the network spatial configuration and consider a large-scale D2D-underlaid network, enabling the study from system-level perspective. We analyze the game equilibrium and obtain it by adopting a bi-level algorithm. Numerical results are provided and insightful conclusions are drawn. Compared with the conventional D2D communication, hybrid D2D communication shows a significant advantage regarding throughput under the same security requirement while weak resistance to the more stringent security requirement.
AbstractList To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network, where the D2D communication is performed on a hybrid manner (i.e., operating over either mmWave or microwave frequency band). To secure the hybrid D2D communication against vigilant adversary, we apply covert communication to hide its presence. In particular, the D2D transmitters perform power control and communication mode switch as well as leveraging the cellular signal to avoid the transmission detection by the adversaries. We model the conflict between the D2D transmitters and adversaries in the framework of a two-stage Stackelberg game. The D2D transmitters are the leaders to maximize their utility subject to the constraints on communication covertness at the upper stage. The adversaries are the followers to minimize their detection errors at the lower stage. We apply stochastic geometry to mathematically characterize the network spatial configuration and consider a large-scale D2D-underlaid network, enabling the study from system-level perspective. We analyze the game equilibrium and obtain it by adopting a bi-level algorithm. Numerical results are provided and insightful conclusions are drawn. Compared with the conventional D2D communication, hybrid D2D communication shows a significant advantage regarding throughput under the same security requirement while weak resistance to the more stringent security requirement.
Author Lu, Xiao
Wang, Wenbo
Feng, Shaohan
Wu, Yuan
Shen, Xuemin
Niyato, Dusit
Author_xml – sequence: 1
  givenname: Shaohan
  orcidid: 0000-0002-8193-466X
  surname: Feng
  fullname: Feng, Shaohan
  email: feng_shaohan@mail.zjgsu.edu.cn
  organization: School of Information and Electronic Engineering (Sussex Artificial Intelligence Institute), Zhejiang Gongshang University, Hangzhou, China
– sequence: 2
  givenname: Xiao
  orcidid: 0000-0002-0602-2337
  surname: Lu
  fullname: Lu, Xiao
  email: xiao.lu@ericsson.com
  organization: Ericsson Canada Inc., Kanata, ON, Canada
– sequence: 3
  givenname: Dusit
  orcidid: 0000-0002-7442-7416
  surname: Niyato
  fullname: Niyato, Dusit
  email: DNIYATO@ntu.edu.sg
  organization: College of Computing and Data Science, Nanyang Technological University, Nanyang Avenue, Singapore
– sequence: 4
  givenname: Yuan
  orcidid: 0000-0001-6661-9461
  surname: Wu
  fullname: Wu, Yuan
  email: yuanwu@um.edu.mo
  organization: Department of Computer and Information Science, State Key Laboratory of Internet of Things for Smart City, University of Macau, Taipa, Macau
– sequence: 5
  givenname: Xuemin
  orcidid: 0000-0002-4140-287X
  surname: Shen
  fullname: Shen, Xuemin
  email: sshen@uwaterloo.ca
  organization: Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada
– sequence: 6
  givenname: Wenbo
  orcidid: 0000-0002-7500-8723
  surname: Wang
  fullname: Wang, Wenbo
  email: wenbo_wang@kust.edu.cn
  organization: Faculty of Mechanical and Electrical Engineering, and Yunnan Key Laboratory of Intelligent Control and Application, Kunming University of Science and Technology, Kunming, China
BookMark eNp9kD1PwzAQhi1UJEphZ2CIxJziz3yMKAWKVMHQVoyR61yQWycujgPKvydpOyAGpjvp3udO91yiUW1rQOiG4CkhOL1fvWdTiimfMk4ZE-QMjYkQSUgpT0ZDz6KQ0Di6QJdNs8WYxJEQY7Rbdo2HKlzAF5hgCap12nfB0prWa1sHpXXBvNs4XQQzOgsyW1VtrZU8DHUdzMGDsx9Qg22bIRKu6wKckT2QgTGtkS54Bf9t3e4KnZfSNHB9qhO0fnpcZfNw8fb8kj0sQkVT6kMFsYpwolKRpoVkQiYFL0uF-QYSYFziWJRASQwRS1mUMMWp5DHjPKGAuUrZBN0d9-6d_Wyh8fnWtq7uT-aM9FJiTntFExQdU8rZpnFQ5kr7w1_eSW1ygvNBbN6LzQex-UlsD-I_4N7pSrruP-T2iGgA-BXvP6SEsx_EgoVm
CODEN ITWCAX
CitedBy_id crossref_primary_10_1002_dac_70047
Cites_doi 10.1109/TWC.2015.2489651
10.1109/MNET.001.1900652
10.1109/JSAC.2015.2452492
10.1109/TVT.2017.2675451
10.1109/MNET.011.1900579
10.1109/JSAC.2018.2825560
10.1109/VTCSpring.2016.7504074
10.1109/TCOMM.2011.100411.100541
10.1109/ChinaCom.2012.6417577
10.1109/TIFS.2021.3054507
10.1109/WCNC.2012.6214252
10.1109/TSP.2016.2551690
10.1145/2811587.2811597
10.1090/S0002-9939-1953-0055639-3
10.1109/TWC.2014.2316519
10.1109/TCOMM.2018.2824807
10.1109/TCOMM.2017.2691704
10.1109/twc.2023.3325384
10.1109/JSAC.2013.130923
10.1109/TIFS.2021.3050070
10.1109/TVT.2021.3121004
10.1109/TWC.2014.2364267
10.1109/MCOM.2015.7081071
10.1109/TWC.2016.2614502
10.1109/TMC.2020.2965450
10.1109/TWC.2021.3116106
10.1109/TWC.2016.2577582
10.1109/TWC.2022.3157885
10.1109/ISIT.2012.6284228
10.1109/VTCFall.2013.6692447
10.1109/twc.2023.3280464
10.1109/TSP.2013.2293126
10.1109/twc.2024.3363186
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TWC.2024.3423351
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 15069
ExternalDocumentID 10_1109_TWC_2024_3423351
10599214
Genre orig-research
GrantInformation_xml – fundername: Infocomm Media Development Authority under its Future Communications Research and Development Programme, Defence Science Organisation (DSO) National Laboratories through the AI Singapore Programme (AISG)
  grantid: AISG2-RP-2020-019; FCP-ASTAR-TG-2022-003
– fundername: National Natural Science Foundation of China; NSFC
  grantid: 6232046
  funderid: 10.13039/501100001809
– fundername: NSFC through Yunnan Major Scientific and Technological Projects
  grantid: 202202AG050002
– fundername: National Natural Science Foundation of China (NSFC)
  grantid: 62302446
– fundername: National Key Research and Development Program of China
  grantid: 2023YFB3308401
– fundername: Provincial Universities Basic Research Project (Science and Technology)
  grantid: QRK23011
– fundername: National Research Foundation Singapore; National Research Foundation, Singapore
  funderid: 10.13039/501100001381
– fundername: Singapore Ministry of Education (MOE) Tier 1
  grantid: RG87/22
– fundername: ChingMu Tech. Ltd., Research Project “WiTracker”
  funderid: 10.13039/501100001809
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c292t-ce7c608c9599da35a8d4ffc04be8e34a075fe217e6393683c42a4734482e04c93
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Fri Jul 25 12:20:55 EDT 2025
Tue Jul 01 04:13:40 EDT 2025
Thu Apr 24 22:55:12 EDT 2025
Wed Aug 27 02:20:02 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-ce7c608c9599da35a8d4ffc04be8e34a075fe217e6393683c42a4734482e04c93
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8193-466X
0000-0001-6661-9461
0000-0002-7442-7416
0000-0002-0602-2337
0000-0002-4140-287X
0000-0002-7500-8723
PQID 3115574223
PQPubID 105736
PageCount 16
ParticipantIDs proquest_journals_3115574223
ieee_primary_10599214
crossref_citationtrail_10_1109_TWC_2024_3423351
crossref_primary_10_1109_TWC_2024_3423351
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-10-01
PublicationDateYYYYMMDD 2024-10-01
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref16
ref19
ref18
Kiefer (ref29) 1953; 4
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref8
ref7
ref9
ref4
ref3
ref6
ref5
Cohen (ref34) 2007
References_xml – ident: ref13
  doi: 10.1109/TWC.2015.2489651
– ident: ref3
  doi: 10.1109/MNET.001.1900652
– ident: ref24
  doi: 10.1109/JSAC.2015.2452492
– ident: ref5
  doi: 10.1109/TVT.2017.2675451
– ident: ref6
  doi: 10.1109/MNET.011.1900579
– ident: ref16
  doi: 10.1109/JSAC.2018.2825560
– ident: ref1
  doi: 10.1109/VTCSpring.2016.7504074
– ident: ref33
  doi: 10.1109/TCOMM.2011.100411.100541
– ident: ref14
  doi: 10.1109/ChinaCom.2012.6417577
– ident: ref10
  doi: 10.1109/TIFS.2021.3054507
– ident: ref12
  doi: 10.1109/WCNC.2012.6214252
– ident: ref31
  doi: 10.1109/TSP.2016.2551690
– ident: ref22
  doi: 10.1145/2811587.2811597
– volume: 4
  start-page: 502
  issue: 3
  year: 1953
  ident: ref29
  article-title: Sequential minimax search for a maximum
  publication-title: Proc. Amer. Math. Soc.
  doi: 10.1090/S0002-9939-1953-0055639-3
– ident: ref23
  doi: 10.1109/TWC.2014.2316519
– ident: ref8
  doi: 10.1109/TCOMM.2018.2824807
– ident: ref21
  doi: 10.1109/TCOMM.2017.2691704
– volume-title: Numerical Methods for Laplace Transform Inversion
  year: 2007
  ident: ref34
– ident: ref11
  doi: 10.1109/twc.2023.3325384
– ident: ref26
  doi: 10.1109/JSAC.2013.130923
– ident: ref19
  doi: 10.1109/TIFS.2021.3050070
– ident: ref17
  doi: 10.1109/TVT.2021.3121004
– ident: ref9
  doi: 10.1109/TWC.2014.2364267
– ident: ref15
  doi: 10.1109/MCOM.2015.7081071
– ident: ref25
  doi: 10.1109/TWC.2016.2614502
– ident: ref2
  doi: 10.1109/TMC.2020.2965450
– ident: ref20
  doi: 10.1109/TWC.2021.3116106
– ident: ref32
  doi: 10.1109/TWC.2016.2577582
– ident: ref7
  doi: 10.1109/TWC.2022.3157885
– ident: ref27
  doi: 10.1109/ISIT.2012.6284228
– ident: ref28
  doi: 10.1109/VTCFall.2013.6692447
– ident: ref18
  doi: 10.1109/twc.2023.3280464
– ident: ref30
  doi: 10.1109/TSP.2013.2293126
– ident: ref4
  doi: 10.1109/twc.2024.3363186
SSID ssj0017655
Score 2.468765
Snippet To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 15054
SubjectTerms Algorithms
Cellular networks
Communication
covert communication
Device-to-device communication
Game theory
hybrid communication
Microwave communication
Microwave frequencies
Microwave theory and techniques
Millimeter wave communication
Millimeter waves
Power control
Receivers
Security
stochastic geometry
Transmitters
Wireless communication
Wireless security
Title System-Level Security Solution for Hybrid D2D Communication in Heterogeneous D2D-Underlaid Cellular Network
URI https://ieeexplore.ieee.org/document/10599214
https://www.proquest.com/docview/3115574223
Volume 23
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELWgEwx8FlEoyAMLQ9I0dr5G1FJFCLrQim5R4lwk1KpBNBng13PnJFULArFlcCJLz869s-_eY-wmsP3Mc5VjCCFiQzpWZgQYdQ0FXuorUkPRWnpPYzecyoeZM6ub1XUvDADo4jMw6VHf5ae5KumorEdcILDJtnoXM7eqWWt9ZeC52uIUdzAZy3jrO0kr6E1eBpgJ2tIkuTvh9LdikDZV-fEn1uFldMjGzcSqqpK5WRaJqT6_aTb-e-ZH7KAmmvyuWhnHbAeWJ2x_Q37wlM0ruXLjkQqH-HPtZMebkzKOfJaHH9TSxYf2kG_1kvDXJQ-plCbHFQh5uaIhhnZRItVJPoDFgipc-biqM2-z6eh-MgiN2nzBUHZgFwSWci2ECyeexsKJ_VRmmbJkAj4IGSPVyADzGUCKI1xfKGnH0hOY7dlgSRWIM9Za5ks4Zxz6fpZhJgakJYf0MEkdDIlZPyFPdhnLDus1cESqViYng4xFpDMUK4gQwIgAjGoAO-x2_cZbpcrxx9g24bExroKiw7oN5FG9b1cRaQ85nkTOdPHLa5dsj75e1fN1Wat4L-EKeUmRXOv1-AWH69yQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0YPKgHPzGiqHvw4qFQutuvowFJVehFiNyadjtNDASMwEF_vTPbloBG462HbbrJ2-282Z15j7Eb3_Iy11G2IYSIDWmbmeFj1DUUuKmnSA1Fa-n1QycYyseRPSqa1XUvDADo4jNo0KO-y09naklHZU3iAr5FttXbGPjtVt6utbo0cB1tcop7mKxl3NWtpOk3By9tzAUt2SDBO2G3NqKQtlX58S_WAaZ7wMJyanldybixXCQN9flNtfHfcz9k-wXV5Hf52jhiWzA9ZntrAoQnbJwLlhs9Kh3iz4WXHS_PyjgyWh58UFMX71gdvtFNwl-nPKBimhmuQZgt5zTE0D5KpDvJ2zCZUI0rD_NK8yobdu8H7cAo7BcMZfnWguBSjomA4cTTWNixl8osU6ZMwAMhYyQbGWBGA0hyhOMJJa1YugLzPQtMqXxxyirT2RTOGIeWl2WYiwGpySFBTFIbg2LWSsiVXcayxpolHJEqtMnJImMS6RzF9CMEMCIAowLAGrtdvfGW63L8MbZKeKyNy6GosXoJeVTs3HlE6kO2K5E1nf_y2jXbCQb9XtR7CJ8u2C59Ka_uq7PK4n0Jl8hSFsmVXptfM33f2Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=System-Level+Security+Solution+for+Hybrid+D2D+Communication+in+Heterogeneous+D2D-Underlaid+Cellular+Network&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Feng%2C+Shaohan&rft.au=Lu%2C+Xiao&rft.au=Niyato%2C+Dusit&rft.au=Wu%2C+Yuan&rft.date=2024-10-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=23&rft.issue=10&rft.spage=15054&rft.epage=15069&rft_id=info:doi/10.1109%2FTWC.2024.3423351&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2024_3423351
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon