System-Level Security Solution for Hybrid D2D Communication in Heterogeneous D2D-Underlaid Cellular Network
To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network,...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 23; no. 10; pp. 15054 - 15069 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.10.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network, where the D2D communication is performed on a hybrid manner (i.e., operating over either mmWave or microwave frequency band). To secure the hybrid D2D communication against vigilant adversary, we apply covert communication to hide its presence. In particular, the D2D transmitters perform power control and communication mode switch as well as leveraging the cellular signal to avoid the transmission detection by the adversaries. We model the conflict between the D2D transmitters and adversaries in the framework of a two-stage Stackelberg game. The D2D transmitters are the leaders to maximize their utility subject to the constraints on communication covertness at the upper stage. The adversaries are the followers to minimize their detection errors at the lower stage. We apply stochastic geometry to mathematically characterize the network spatial configuration and consider a large-scale D2D-underlaid network, enabling the study from system-level perspective. We analyze the game equilibrium and obtain it by adopting a bi-level algorithm. Numerical results are provided and insightful conclusions are drawn. Compared with the conventional D2D communication, hybrid D2D communication shows a significant advantage regarding throughput under the same security requirement while weak resistance to the more stringent security requirement. |
---|---|
AbstractList | To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying cellular network by Device-to-Device (D2D) communication are two promising solutions. In this paper, we focus on D2D-underlaid cellular network, where the D2D communication is performed on a hybrid manner (i.e., operating over either mmWave or microwave frequency band). To secure the hybrid D2D communication against vigilant adversary, we apply covert communication to hide its presence. In particular, the D2D transmitters perform power control and communication mode switch as well as leveraging the cellular signal to avoid the transmission detection by the adversaries. We model the conflict between the D2D transmitters and adversaries in the framework of a two-stage Stackelberg game. The D2D transmitters are the leaders to maximize their utility subject to the constraints on communication covertness at the upper stage. The adversaries are the followers to minimize their detection errors at the lower stage. We apply stochastic geometry to mathematically characterize the network spatial configuration and consider a large-scale D2D-underlaid network, enabling the study from system-level perspective. We analyze the game equilibrium and obtain it by adopting a bi-level algorithm. Numerical results are provided and insightful conclusions are drawn. Compared with the conventional D2D communication, hybrid D2D communication shows a significant advantage regarding throughput under the same security requirement while weak resistance to the more stringent security requirement. |
Author | Lu, Xiao Wang, Wenbo Feng, Shaohan Wu, Yuan Shen, Xuemin Niyato, Dusit |
Author_xml | – sequence: 1 givenname: Shaohan orcidid: 0000-0002-8193-466X surname: Feng fullname: Feng, Shaohan email: feng_shaohan@mail.zjgsu.edu.cn organization: School of Information and Electronic Engineering (Sussex Artificial Intelligence Institute), Zhejiang Gongshang University, Hangzhou, China – sequence: 2 givenname: Xiao orcidid: 0000-0002-0602-2337 surname: Lu fullname: Lu, Xiao email: xiao.lu@ericsson.com organization: Ericsson Canada Inc., Kanata, ON, Canada – sequence: 3 givenname: Dusit orcidid: 0000-0002-7442-7416 surname: Niyato fullname: Niyato, Dusit email: DNIYATO@ntu.edu.sg organization: College of Computing and Data Science, Nanyang Technological University, Nanyang Avenue, Singapore – sequence: 4 givenname: Yuan orcidid: 0000-0001-6661-9461 surname: Wu fullname: Wu, Yuan email: yuanwu@um.edu.mo organization: Department of Computer and Information Science, State Key Laboratory of Internet of Things for Smart City, University of Macau, Taipa, Macau – sequence: 5 givenname: Xuemin orcidid: 0000-0002-4140-287X surname: Shen fullname: Shen, Xuemin email: sshen@uwaterloo.ca organization: Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada – sequence: 6 givenname: Wenbo orcidid: 0000-0002-7500-8723 surname: Wang fullname: Wang, Wenbo email: wenbo_wang@kust.edu.cn organization: Faculty of Mechanical and Electrical Engineering, and Yunnan Key Laboratory of Intelligent Control and Application, Kunming University of Science and Technology, Kunming, China |
BookMark | eNp9kD1PwzAQhi1UJEphZ2CIxJziz3yMKAWKVMHQVoyR61yQWycujgPKvydpOyAGpjvp3udO91yiUW1rQOiG4CkhOL1fvWdTiimfMk4ZE-QMjYkQSUgpT0ZDz6KQ0Di6QJdNs8WYxJEQY7Rbdo2HKlzAF5hgCap12nfB0prWa1sHpXXBvNs4XQQzOgsyW1VtrZU8DHUdzMGDsx9Qg22bIRKu6wKckT2QgTGtkS54Bf9t3e4KnZfSNHB9qhO0fnpcZfNw8fb8kj0sQkVT6kMFsYpwolKRpoVkQiYFL0uF-QYSYFziWJRASQwRS1mUMMWp5DHjPKGAuUrZBN0d9-6d_Wyh8fnWtq7uT-aM9FJiTntFExQdU8rZpnFQ5kr7w1_eSW1ygvNBbN6LzQex-UlsD-I_4N7pSrruP-T2iGgA-BXvP6SEsx_EgoVm |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1002_dac_70047 |
Cites_doi | 10.1109/TWC.2015.2489651 10.1109/MNET.001.1900652 10.1109/JSAC.2015.2452492 10.1109/TVT.2017.2675451 10.1109/MNET.011.1900579 10.1109/JSAC.2018.2825560 10.1109/VTCSpring.2016.7504074 10.1109/TCOMM.2011.100411.100541 10.1109/ChinaCom.2012.6417577 10.1109/TIFS.2021.3054507 10.1109/WCNC.2012.6214252 10.1109/TSP.2016.2551690 10.1145/2811587.2811597 10.1090/S0002-9939-1953-0055639-3 10.1109/TWC.2014.2316519 10.1109/TCOMM.2018.2824807 10.1109/TCOMM.2017.2691704 10.1109/twc.2023.3325384 10.1109/JSAC.2013.130923 10.1109/TIFS.2021.3050070 10.1109/TVT.2021.3121004 10.1109/TWC.2014.2364267 10.1109/MCOM.2015.7081071 10.1109/TWC.2016.2614502 10.1109/TMC.2020.2965450 10.1109/TWC.2021.3116106 10.1109/TWC.2016.2577582 10.1109/TWC.2022.3157885 10.1109/ISIT.2012.6284228 10.1109/VTCFall.2013.6692447 10.1109/twc.2023.3280464 10.1109/TSP.2013.2293126 10.1109/twc.2024.3363186 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TWC.2024.3423351 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2248 |
EndPage | 15069 |
ExternalDocumentID | 10_1109_TWC_2024_3423351 10599214 |
Genre | orig-research |
GrantInformation_xml | – fundername: Infocomm Media Development Authority under its Future Communications Research and Development Programme, Defence Science Organisation (DSO) National Laboratories through the AI Singapore Programme (AISG) grantid: AISG2-RP-2020-019; FCP-ASTAR-TG-2022-003 – fundername: National Natural Science Foundation of China; NSFC grantid: 6232046 funderid: 10.13039/501100001809 – fundername: NSFC through Yunnan Major Scientific and Technological Projects grantid: 202202AG050002 – fundername: National Natural Science Foundation of China (NSFC) grantid: 62302446 – fundername: National Key Research and Development Program of China grantid: 2023YFB3308401 – fundername: Provincial Universities Basic Research Project (Science and Technology) grantid: QRK23011 – fundername: National Research Foundation Singapore; National Research Foundation, Singapore funderid: 10.13039/501100001381 – fundername: Singapore Ministry of Education (MOE) Tier 1 grantid: RG87/22 – fundername: ChingMu Tech. Ltd., Research Project “WiTracker” funderid: 10.13039/501100001809 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c292t-ce7c608c9599da35a8d4ffc04be8e34a075fe217e6393683c42a4734482e04c93 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Fri Jul 25 12:20:55 EDT 2025 Tue Jul 01 04:13:40 EDT 2025 Thu Apr 24 22:55:12 EDT 2025 Wed Aug 27 02:20:02 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c292t-ce7c608c9599da35a8d4ffc04be8e34a075fe217e6393683c42a4734482e04c93 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8193-466X 0000-0001-6661-9461 0000-0002-7442-7416 0000-0002-0602-2337 0000-0002-4140-287X 0000-0002-7500-8723 |
PQID | 3115574223 |
PQPubID | 105736 |
PageCount | 16 |
ParticipantIDs | proquest_journals_3115574223 ieee_primary_10599214 crossref_citationtrail_10_1109_TWC_2024_3423351 crossref_primary_10_1109_TWC_2024_3423351 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-10-01 |
PublicationDateYYYYMMDD | 2024-10-01 |
PublicationDate_xml | – month: 10 year: 2024 text: 2024-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2024 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 Kiefer (ref29) 1953; 4 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref8 ref7 ref9 ref4 ref3 ref6 ref5 Cohen (ref34) 2007 |
References_xml | – ident: ref13 doi: 10.1109/TWC.2015.2489651 – ident: ref3 doi: 10.1109/MNET.001.1900652 – ident: ref24 doi: 10.1109/JSAC.2015.2452492 – ident: ref5 doi: 10.1109/TVT.2017.2675451 – ident: ref6 doi: 10.1109/MNET.011.1900579 – ident: ref16 doi: 10.1109/JSAC.2018.2825560 – ident: ref1 doi: 10.1109/VTCSpring.2016.7504074 – ident: ref33 doi: 10.1109/TCOMM.2011.100411.100541 – ident: ref14 doi: 10.1109/ChinaCom.2012.6417577 – ident: ref10 doi: 10.1109/TIFS.2021.3054507 – ident: ref12 doi: 10.1109/WCNC.2012.6214252 – ident: ref31 doi: 10.1109/TSP.2016.2551690 – ident: ref22 doi: 10.1145/2811587.2811597 – volume: 4 start-page: 502 issue: 3 year: 1953 ident: ref29 article-title: Sequential minimax search for a maximum publication-title: Proc. Amer. Math. Soc. doi: 10.1090/S0002-9939-1953-0055639-3 – ident: ref23 doi: 10.1109/TWC.2014.2316519 – ident: ref8 doi: 10.1109/TCOMM.2018.2824807 – ident: ref21 doi: 10.1109/TCOMM.2017.2691704 – volume-title: Numerical Methods for Laplace Transform Inversion year: 2007 ident: ref34 – ident: ref11 doi: 10.1109/twc.2023.3325384 – ident: ref26 doi: 10.1109/JSAC.2013.130923 – ident: ref19 doi: 10.1109/TIFS.2021.3050070 – ident: ref17 doi: 10.1109/TVT.2021.3121004 – ident: ref9 doi: 10.1109/TWC.2014.2364267 – ident: ref15 doi: 10.1109/MCOM.2015.7081071 – ident: ref25 doi: 10.1109/TWC.2016.2614502 – ident: ref2 doi: 10.1109/TMC.2020.2965450 – ident: ref20 doi: 10.1109/TWC.2021.3116106 – ident: ref32 doi: 10.1109/TWC.2016.2577582 – ident: ref7 doi: 10.1109/TWC.2022.3157885 – ident: ref27 doi: 10.1109/ISIT.2012.6284228 – ident: ref28 doi: 10.1109/VTCFall.2013.6692447 – ident: ref18 doi: 10.1109/twc.2023.3280464 – ident: ref30 doi: 10.1109/TSP.2013.2293126 – ident: ref4 doi: 10.1109/twc.2024.3363186 |
SSID | ssj0017655 |
Score | 2.468765 |
Snippet | To alleviate the spectrum scarcity problem, exploiting the vast available spectrum provided by the Millimeter-Wave (mmWave) frequency band and underlaying... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 15054 |
SubjectTerms | Algorithms Cellular networks Communication covert communication Device-to-device communication Game theory hybrid communication Microwave communication Microwave frequencies Microwave theory and techniques Millimeter wave communication Millimeter waves Power control Receivers Security stochastic geometry Transmitters Wireless communication Wireless security |
Title | System-Level Security Solution for Hybrid D2D Communication in Heterogeneous D2D-Underlaid Cellular Network |
URI | https://ieeexplore.ieee.org/document/10599214 https://www.proquest.com/docview/3115574223 |
Volume | 23 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELWgEwx8FlEoyAMLQ9I0dr5G1FJFCLrQim5R4lwk1KpBNBng13PnJFULArFlcCJLz869s-_eY-wmsP3Mc5VjCCFiQzpWZgQYdQ0FXuorUkPRWnpPYzecyoeZM6ub1XUvDADo4jMw6VHf5ae5KumorEdcILDJtnoXM7eqWWt9ZeC52uIUdzAZy3jrO0kr6E1eBpgJ2tIkuTvh9LdikDZV-fEn1uFldMjGzcSqqpK5WRaJqT6_aTb-e-ZH7KAmmvyuWhnHbAeWJ2x_Q37wlM0ruXLjkQqH-HPtZMebkzKOfJaHH9TSxYf2kG_1kvDXJQ-plCbHFQh5uaIhhnZRItVJPoDFgipc-biqM2-z6eh-MgiN2nzBUHZgFwSWci2ECyeexsKJ_VRmmbJkAj4IGSPVyADzGUCKI1xfKGnH0hOY7dlgSRWIM9Za5ks4Zxz6fpZhJgakJYf0MEkdDIlZPyFPdhnLDus1cESqViYng4xFpDMUK4gQwIgAjGoAO-x2_cZbpcrxx9g24bExroKiw7oN5FG9b1cRaQ85nkTOdPHLa5dsj75e1fN1Wat4L-EKeUmRXOv1-AWH69yQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0YPKgHPzGiqHvw4qFQutuvowFJVehFiNyadjtNDASMwEF_vTPbloBG462HbbrJ2-282Z15j7Eb3_Iy11G2IYSIDWmbmeFj1DUUuKmnSA1Fa-n1QycYyseRPSqa1XUvDADo4jNo0KO-y09naklHZU3iAr5FttXbGPjtVt6utbo0cB1tcop7mKxl3NWtpOk3By9tzAUt2SDBO2G3NqKQtlX58S_WAaZ7wMJyanldybixXCQN9flNtfHfcz9k-wXV5Hf52jhiWzA9ZntrAoQnbJwLlhs9Kh3iz4WXHS_PyjgyWh58UFMX71gdvtFNwl-nPKBimhmuQZgt5zTE0D5KpDvJ2zCZUI0rD_NK8yobdu8H7cAo7BcMZfnWguBSjomA4cTTWNixl8osU6ZMwAMhYyQbGWBGA0hyhOMJJa1YugLzPQtMqXxxyirT2RTOGIeWl2WYiwGpySFBTFIbg2LWSsiVXcayxpolHJEqtMnJImMS6RzF9CMEMCIAowLAGrtdvfGW63L8MbZKeKyNy6GosXoJeVTs3HlE6kO2K5E1nf_y2jXbCQb9XtR7CJ8u2C59Ka_uq7PK4n0Jl8hSFsmVXptfM33f2Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=System-Level+Security+Solution+for+Hybrid+D2D+Communication+in+Heterogeneous+D2D-Underlaid+Cellular+Network&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Feng%2C+Shaohan&rft.au=Lu%2C+Xiao&rft.au=Niyato%2C+Dusit&rft.au=Wu%2C+Yuan&rft.date=2024-10-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=23&rft.issue=10&rft.spage=15054&rft.epage=15069&rft_id=info:doi/10.1109%2FTWC.2024.3423351&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2024_3423351 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |