Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA

A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 14; no. 3; pp. 3717 - 3728
Main Authors Jiang, Yu'e, Wang, Liangmin, Zhao, Hui, Chen, Hsiao-Hwa
Format Journal Article
LanguageEnglish
Published New York IEEE 01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g., privacy sensitive data) to ensure a low probability of detection. We allocate transmit powers of cellular and D2D noncovert signals following a fading D2D channel to add the uncertainty in adversary's background noises. With the help of base station, cooperative power domain nonorthogonal multiple access and successive interference cancellation are used to decode covert signal. Depending on whether a D2D transmitter has the knowledge of adversary's detection threshold, we derive minimum error probability to measure the covertness performance. Furthermore, we evaluate covert throughput, which is defined as a maximum average transmission rate of covert signal, subject to a given covertness performance.
AbstractList A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g., privacy sensitive data) to ensure a low probability of detection. We allocate transmit powers of cellular and D2D noncovert signals following a fading D2D channel to add the uncertainty in adversary's background noises. With the help of base station, cooperative power domain nonorthogonal multiple access and successive interference cancellation are used to decode covert signal. Depending on whether a D2D transmitter has the knowledge of adversary's detection threshold, we derive minimum error probability to measure the covertness performance. Furthermore, we evaluate covert throughput, which is defined as a maximum average transmission rate of covert signal, subject to a given covertness performance.
Author Chen, Hsiao-Hwa
Wang, Liangmin
Jiang, Yu'e
Zhao, Hui
Author_xml – sequence: 1
  givenname: Yu'e
  orcidid: 0000-0002-1612-7212
  surname: Jiang
  fullname: Jiang, Yu'e
  email: jiang2012118@163.com
  organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China
– sequence: 2
  givenname: Liangmin
  orcidid: 0000-0003-0048-5979
  surname: Wang
  fullname: Wang, Liangmin
  email: wanglm@ujs.edu.cn
  organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China
– sequence: 3
  givenname: Hui
  surname: Zhao
  fullname: Zhao, Hui
  email: zhaohui@ujs.edu.cn
  organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China
– sequence: 4
  givenname: Hsiao-Hwa
  orcidid: 0000-0001-8473-0729
  surname: Chen
  fullname: Chen, Hsiao-Hwa
  email: hshwchen@ieee.org
  organization: Department of Engineering Science, National Cheng Kung University, Tainan, Taiwan
BookMark eNp9kMtOwzAQRS1UJErhB2BjiXWKH0lsL6uUp0oLaivEKnIcB1zSuNgJVf-e9CEWLFjNLO6Z0T2noFPZSgNwgVEfYySuH6dv01mfIIL6RMQMcXEEulhQFghCw85uJwHHPDwBp94vEIp4xEQXvCT2W7saJna5bCqjZG1s5aGp4JAM4bzKtSvlxlTvMNFl2ZTSwbGu19Z9evhq6g_4bNfawaFdypYZT54GZ-C4kKXX54fZA_Pbm1lyH4wmdw_JYBQoIqI6yBiXOssoURirPCMiFEjFiEqWK0q4jGksYxYXOGKYCoaJQkLJKGI5KfJQStoDV_u7K2e_Gu3rdGEbV7UvUxK2BApjxNsU36eUs947XaTK1LuStZOmTDFKtwLTncB0KzA9CGxR8gddObOUbvM_dLmHjNb6F-CCibDt8QPSX33G
CODEN ISJEB2
CitedBy_id crossref_primary_10_1109_COMST_2023_3263921
crossref_primary_10_3390_s21238059
crossref_primary_10_1109_LWC_2023_3238510
crossref_primary_10_1016_j_phycom_2022_101598
crossref_primary_10_1109_TVT_2023_3308718
crossref_primary_10_1109_TIFS_2021_3071602
crossref_primary_10_1109_TWC_2021_3134179
crossref_primary_10_1109_TIFS_2022_3197327
crossref_primary_10_1109_JIOT_2024_3491431
crossref_primary_10_1109_TCOMM_2023_3242670
crossref_primary_10_1109_TVT_2021_3061661
crossref_primary_10_1109_TIFS_2023_3307931
crossref_primary_10_1109_TIFS_2022_3152353
crossref_primary_10_1109_JSYST_2022_3168851
crossref_primary_10_1109_TVT_2023_3347378
crossref_primary_10_1109_TVT_2022_3181414
crossref_primary_10_1109_JIOT_2023_3265275
crossref_primary_10_1109_JIOT_2022_3201021
crossref_primary_10_1109_JSYST_2024_3406035
crossref_primary_10_1109_JPROC_2024_3420127
crossref_primary_10_1109_TMC_2024_3371377
crossref_primary_10_1155_2021_4342983
crossref_primary_10_1016_j_phycom_2022_101837
crossref_primary_10_20473_jisebi_6_1_18_26
crossref_primary_10_1109_TWC_2024_3363186
crossref_primary_10_1109_LWC_2023_3314625
crossref_primary_10_1109_JPROC_2024_3364256
crossref_primary_10_1109_TWC_2022_3183892
crossref_primary_10_1016_j_comnet_2024_110532
crossref_primary_10_1049_ell2_12132
crossref_primary_10_1109_LCOMM_2021_3114231
crossref_primary_10_1109_TITS_2024_3374872
crossref_primary_10_1109_LWC_2022_3149279
crossref_primary_10_3390_electronics12132822
crossref_primary_10_1109_TMC_2023_3302413
crossref_primary_10_1371_journal_pone_0317289
Cites_doi 10.1109/TVT.2018.2869305
10.1109/JSYST.2014.2298837
10.1017/CBO9780511804441
10.1109/COMST.2016.2598968
10.1109/COMST.2014.2375934
10.1049/iet-com.2017.0179
10.1109/COMST.2018.2828120
10.1109/JIOT.2016.2549046
10.1109/TIFS.2013.2287046
10.1109/INFCOMW.2018.8406961
10.1007/978-1-4615-0015-5
10.1109/TMC.2013.56
10.1109/TVT.2015.2424395
10.1109/MCOM.2018.1800179
10.1109/MWC.2017.1800070
10.1109/TWC.2012.051512.111622
10.1109/COMST.2018.2820069
10.1109/TWC.2016.2565579
10.1109/TCOMM.2014.2379633
10.1109/LCOMM.2016.2517012
10.1109/GLOCOMW.2017.8269199
10.1109/TIT.2008.921908
10.1109/MCOM.2015.7355565
10.1109/TCOMM.2018.2865930
10.1109/TWC.2017.2706259
10.1109/JSYST.2017.2773633
10.1109/LCOMM.2013.042313.130239
10.1109/LCOMM.2015.2441064
10.1109/COMST.2016.2633387
10.1109/TIFS.2016.2627219
10.1109/WAMICON.2017.7930242
10.1109/MCOM.2017.1700410
10.1109/LWC.2018.2872058
10.1109/TWC.2019.2895340
10.1109/TIT.2016.2530089
10.1109/TWC.2014.2354635
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/JSYST.2020.2967089
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-9234
EndPage 3728
ExternalDocumentID 10_1109_JSYST_2020_2967089
8979471
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: U1736216; U1764263; 61671186
  funderid: 10.13039/501100001809
– fundername: Ministry of Science and Technology, Taiwan
  grantid: 106-2221-E-006-028-MY3; 106-2221-E-006-021-MY3
  funderid: 10.13039/501100004663
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
AAYXX
CITATION
RIG
ID FETCH-LOGICAL-c295t-b78aebb32c11cdb29490c603a7dc328a636a676f157139712c09ca557d2fd4aa3
IEDL.DBID RIE
ISSN 1932-8184
IngestDate Sun Jun 29 16:32:59 EDT 2025
Tue Jul 01 01:43:34 EDT 2025
Thu Apr 24 22:59:31 EDT 2025
Wed Aug 27 02:32:11 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-b78aebb32c11cdb29490c603a7dc328a636a676f157139712c09ca557d2fd4aa3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0048-5979
0000-0001-8473-0729
0000-0002-1612-7212
PQID 2439704608
PQPubID 85494
PageCount 12
ParticipantIDs ieee_primary_8979471
crossref_citationtrail_10_1109_JSYST_2020_2967089
crossref_primary_10_1109_JSYST_2020_2967089
proquest_journals_2439704608
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-Sept.
2020-9-00
20200901
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 09
  year: 2020
  text: 2020-Sept.
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE systems journal
PublicationTitleAbbrev JSYST
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref15
ref36
ref14
ref31
ref30
ref33
ref11
ref32
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref30
  doi: 10.1109/TVT.2018.2869305
– ident: ref7
  doi: 10.1109/JSYST.2014.2298837
– ident: ref36
  doi: 10.1017/CBO9780511804441
– ident: ref15
  doi: 10.1109/COMST.2016.2598968
– ident: ref1
  doi: 10.1109/COMST.2014.2375934
– ident: ref18
  doi: 10.1049/iet-com.2017.0179
– ident: ref26
  doi: 10.1109/COMST.2018.2828120
– ident: ref27
  doi: 10.1109/JIOT.2016.2549046
– ident: ref21
  doi: 10.1109/TIFS.2013.2287046
– ident: ref23
  doi: 10.1109/INFCOMW.2018.8406961
– ident: ref35
  doi: 10.1007/978-1-4615-0015-5
– ident: ref32
  doi: 10.1109/TMC.2013.56
– ident: ref4
  doi: 10.1109/TVT.2015.2424395
– ident: ref34
  doi: 10.1109/MCOM.2018.1800179
– ident: ref24
  doi: 10.1109/MWC.2017.1800070
– ident: ref31
  doi: 10.1109/TWC.2012.051512.111622
– ident: ref28
  doi: 10.1109/COMST.2018.2820069
– ident: ref11
  doi: 10.1109/TWC.2016.2565579
– ident: ref12
  doi: 10.1109/TCOMM.2014.2379633
– ident: ref2
  doi: 10.1109/LCOMM.2016.2517012
– ident: ref10
  doi: 10.1109/GLOCOMW.2017.8269199
– ident: ref14
  doi: 10.1109/TIT.2008.921908
– ident: ref17
  doi: 10.1109/MCOM.2015.7355565
– ident: ref13
  doi: 10.1109/TCOMM.2018.2865930
– ident: ref9
  doi: 10.1109/TWC.2017.2706259
– ident: ref5
  doi: 10.1109/JSYST.2017.2773633
– ident: ref3
  doi: 10.1109/LCOMM.2013.042313.130239
– ident: ref29
  doi: 10.1109/LCOMM.2015.2441064
– ident: ref16
  doi: 10.1109/COMST.2016.2633387
– ident: ref19
  doi: 10.1109/TIFS.2016.2627219
– ident: ref33
  doi: 10.1109/WAMICON.2017.7930242
– ident: ref6
  doi: 10.1109/MCOM.2017.1700410
– ident: ref25
  doi: 10.1109/LWC.2018.2872058
– ident: ref8
  doi: 10.1109/TWC.2019.2895340
– ident: ref22
  doi: 10.1109/TIT.2016.2530089
– ident: ref20
  doi: 10.1109/TWC.2014.2354635
SSID ssj0058579
Score 2.4591753
Snippet A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3717
SubjectTerms Background noise
Cellular communication
Cellular networks
Communication
Covert communications
device-to-device (D2D) underlaying cellular network
Device-to-device communication
Domains
Error analysis
NOMA
Nonorthogonal multiple access
nonorthogonal multiple access (NOMA)
Performance evaluation
power allocation
Receivers
Security
Throughput
Transmission rate (communications)
Transmitters
Title Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA
URI https://ieeexplore.ieee.org/document/8979471
https://www.proquest.com/docview/2439704608
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaACQZeBVFe8sAGSRMnseMRtaAKqQXUVpQpsh1HIEqKaLrw6_E5SVUeQmwZ7Mi6O99953shdEalQe0ioE6YZZkTxqlwuGbC8dPM3L3QiJSEB_1en3ZH4c04Gq-gi0UtjNbaJp9pFz5tLD-dqjk8lbVibqQHCsZXjeNW1mrVWtegXttXD_CIY4xQWBfIeLx1M3gcDI0rSDyXcMo8GOm-ZITsVJUfqtjal-st1KtPVqaVvLjzQrrq41vTxv8efRttVkATX5aSsYNWdL6LNpbaDzbQfRvyNwv8pUhkhp9z3CEdbCciTQSUQeG2nkwgXxX3y6zxGX54Lp7wHYxYw53pqzB7-re9yz00ur4atrtONWLBUYRHhSNZLLSUAVG-r1JJeMg9Rb1AsFQFJBY0oIIymvkRA6joE-VxJaKIpSRLQyGCfbSWT3N9gHCU6UgwxaWMVEiYUeiC-5mEQGigYy6byK9pnqiq_ziMwZgk1g_xeGL5lACfkopPTXS-2PNWdt_4c3UDCL9YWdG8iY5r1ibVBZ0lBIAYBIXjw993HaF1-HeZTnaM1or3uT4x-KOQp1bwPgHeUtZS
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LT9wwEB4BPZQe-oCibktbH8oJZUmc2I4PPaDdouWxWxCLoKdgO45YseyiblZV-1v6V_rf6nGSFX2oN6TecrAdxfPF89n-ZgbgHdeOtauYB0lRFEGS5iqQVqggygv37yUOUhoP9PsD3jtLDi7YxRJ8X8TCWGu9-My28dHf5edTM8ejsp1UOvSIqJZQHtqvX9wGbfZ-v-usuUXp3odhpxfUNQQCQyUrAy1SZbWOqYkik2sqExkaHsZK5CamqeIxV1zwImICuVBETSiNYkzktMgTpWI37jI8cDyD0So6rFnnHc_2mfyQAQXO7SVNSE4odw5OP50O3eaThm0quQixiPwdt-fruPyx-HuPtvcEfjRzUQlZrtvzUrfNt9_SRP6vk_UUHtdUmuxW2H8GS3ayBo_uJFhch5MOKlRL8ksYzIyMJqRLu8TXfBorDPQiHTseoyKXDCpd_Iycj8orcoxF5Eh3eqNcn8HH_u5zOLuXb9qAlcl0Yl8AYYVlShipNTMJFc5lKRkVGq96Y5tK3YKosXFm6gzrWOhjnPmdVigzj4sMcZHVuGjB9qLPbZVf5J-t19HQi5a1jVuw2UApq5egWUaRauK1d_ry773ewsPesH-UHe0PDl_BKr6nEs9twkr5eW5fO7ZV6jce9AQu7xs4PwH7VzNi
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Covert+Communications+in+D2D+Underlaying+Cellular+Networks+With+Power+Domain+NOMA&rft.jtitle=IEEE+systems+journal&rft.au=Jiang%2C+Yu%27e&rft.au=Wang%2C+Liangmin&rft.au=Zhao%2C+Hui&rft.au=Hsiao-Hwa%2C+Chen&rft.date=2020-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=14&rft.issue=3&rft.spage=3717&rft_id=info:doi/10.1109%2FJSYST.2020.2967089&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon