Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA
A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g...
Saved in:
Published in | IEEE systems journal Vol. 14; no. 3; pp. 3717 - 3728 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g., privacy sensitive data) to ensure a low probability of detection. We allocate transmit powers of cellular and D2D noncovert signals following a fading D2D channel to add the uncertainty in adversary's background noises. With the help of base station, cooperative power domain nonorthogonal multiple access and successive interference cancellation are used to decode covert signal. Depending on whether a D2D transmitter has the knowledge of adversary's detection threshold, we derive minimum error probability to measure the covertness performance. Furthermore, we evaluate covert throughput, which is defined as a maximum average transmission rate of covert signal, subject to a given covertness performance. |
---|---|
AbstractList | A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g., privacy sensitive data) to ensure a low probability of detection. We allocate transmit powers of cellular and D2D noncovert signals following a fading D2D channel to add the uncertainty in adversary's background noises. With the help of base station, cooperative power domain nonorthogonal multiple access and successive interference cancellation are used to decode covert signal. Depending on whether a D2D transmitter has the knowledge of adversary's detection threshold, we derive minimum error probability to measure the covertness performance. Furthermore, we evaluate covert throughput, which is defined as a maximum average transmission rate of covert signal, subject to a given covertness performance. |
Author | Chen, Hsiao-Hwa Wang, Liangmin Jiang, Yu'e Zhao, Hui |
Author_xml | – sequence: 1 givenname: Yu'e orcidid: 0000-0002-1612-7212 surname: Jiang fullname: Jiang, Yu'e email: jiang2012118@163.com organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China – sequence: 2 givenname: Liangmin orcidid: 0000-0003-0048-5979 surname: Wang fullname: Wang, Liangmin email: wanglm@ujs.edu.cn organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China – sequence: 3 givenname: Hui surname: Zhao fullname: Zhao, Hui email: zhaohui@ujs.edu.cn organization: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China – sequence: 4 givenname: Hsiao-Hwa orcidid: 0000-0001-8473-0729 surname: Chen fullname: Chen, Hsiao-Hwa email: hshwchen@ieee.org organization: Department of Engineering Science, National Cheng Kung University, Tainan, Taiwan |
BookMark | eNp9kMtOwzAQRS1UJErhB2BjiXWKH0lsL6uUp0oLaivEKnIcB1zSuNgJVf-e9CEWLFjNLO6Z0T2noFPZSgNwgVEfYySuH6dv01mfIIL6RMQMcXEEulhQFghCw85uJwHHPDwBp94vEIp4xEQXvCT2W7saJna5bCqjZG1s5aGp4JAM4bzKtSvlxlTvMNFl2ZTSwbGu19Z9evhq6g_4bNfawaFdypYZT54GZ-C4kKXX54fZA_Pbm1lyH4wmdw_JYBQoIqI6yBiXOssoURirPCMiFEjFiEqWK0q4jGksYxYXOGKYCoaJQkLJKGI5KfJQStoDV_u7K2e_Gu3rdGEbV7UvUxK2BApjxNsU36eUs947XaTK1LuStZOmTDFKtwLTncB0KzA9CGxR8gddObOUbvM_dLmHjNb6F-CCibDt8QPSX33G |
CODEN | ISJEB2 |
CitedBy_id | crossref_primary_10_1109_COMST_2023_3263921 crossref_primary_10_3390_s21238059 crossref_primary_10_1109_LWC_2023_3238510 crossref_primary_10_1016_j_phycom_2022_101598 crossref_primary_10_1109_TVT_2023_3308718 crossref_primary_10_1109_TIFS_2021_3071602 crossref_primary_10_1109_TWC_2021_3134179 crossref_primary_10_1109_TIFS_2022_3197327 crossref_primary_10_1109_JIOT_2024_3491431 crossref_primary_10_1109_TCOMM_2023_3242670 crossref_primary_10_1109_TVT_2021_3061661 crossref_primary_10_1109_TIFS_2023_3307931 crossref_primary_10_1109_TIFS_2022_3152353 crossref_primary_10_1109_JSYST_2022_3168851 crossref_primary_10_1109_TVT_2023_3347378 crossref_primary_10_1109_TVT_2022_3181414 crossref_primary_10_1109_JIOT_2023_3265275 crossref_primary_10_1109_JIOT_2022_3201021 crossref_primary_10_1109_JSYST_2024_3406035 crossref_primary_10_1109_JPROC_2024_3420127 crossref_primary_10_1109_TMC_2024_3371377 crossref_primary_10_1155_2021_4342983 crossref_primary_10_1016_j_phycom_2022_101837 crossref_primary_10_20473_jisebi_6_1_18_26 crossref_primary_10_1109_TWC_2024_3363186 crossref_primary_10_1109_LWC_2023_3314625 crossref_primary_10_1109_JPROC_2024_3364256 crossref_primary_10_1109_TWC_2022_3183892 crossref_primary_10_1016_j_comnet_2024_110532 crossref_primary_10_1049_ell2_12132 crossref_primary_10_1109_LCOMM_2021_3114231 crossref_primary_10_1109_TITS_2024_3374872 crossref_primary_10_1109_LWC_2022_3149279 crossref_primary_10_3390_electronics12132822 crossref_primary_10_1109_TMC_2023_3302413 crossref_primary_10_1371_journal_pone_0317289 |
Cites_doi | 10.1109/TVT.2018.2869305 10.1109/JSYST.2014.2298837 10.1017/CBO9780511804441 10.1109/COMST.2016.2598968 10.1109/COMST.2014.2375934 10.1049/iet-com.2017.0179 10.1109/COMST.2018.2828120 10.1109/JIOT.2016.2549046 10.1109/TIFS.2013.2287046 10.1109/INFCOMW.2018.8406961 10.1007/978-1-4615-0015-5 10.1109/TMC.2013.56 10.1109/TVT.2015.2424395 10.1109/MCOM.2018.1800179 10.1109/MWC.2017.1800070 10.1109/TWC.2012.051512.111622 10.1109/COMST.2018.2820069 10.1109/TWC.2016.2565579 10.1109/TCOMM.2014.2379633 10.1109/LCOMM.2016.2517012 10.1109/GLOCOMW.2017.8269199 10.1109/TIT.2008.921908 10.1109/MCOM.2015.7355565 10.1109/TCOMM.2018.2865930 10.1109/TWC.2017.2706259 10.1109/JSYST.2017.2773633 10.1109/LCOMM.2013.042313.130239 10.1109/LCOMM.2015.2441064 10.1109/COMST.2016.2633387 10.1109/TIFS.2016.2627219 10.1109/WAMICON.2017.7930242 10.1109/MCOM.2017.1700410 10.1109/LWC.2018.2872058 10.1109/TWC.2019.2895340 10.1109/TIT.2016.2530089 10.1109/TWC.2014.2354635 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/JSYST.2020.2967089 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1937-9234 |
EndPage | 3728 |
ExternalDocumentID | 10_1109_JSYST_2020_2967089 8979471 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: U1736216; U1764263; 61671186 funderid: 10.13039/501100001809 – fundername: Ministry of Science and Technology, Taiwan grantid: 106-2221-E-006-028-MY3; 106-2221-E-006-021-MY3 funderid: 10.13039/501100004663 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c295t-b78aebb32c11cdb29490c603a7dc328a636a676f157139712c09ca557d2fd4aa3 |
IEDL.DBID | RIE |
ISSN | 1932-8184 |
IngestDate | Sun Jun 29 16:32:59 EDT 2025 Tue Jul 01 01:43:34 EDT 2025 Thu Apr 24 22:59:31 EDT 2025 Wed Aug 27 02:32:11 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-b78aebb32c11cdb29490c603a7dc328a636a676f157139712c09ca557d2fd4aa3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0048-5979 0000-0001-8473-0729 0000-0002-1612-7212 |
PQID | 2439704608 |
PQPubID | 85494 |
PageCount | 12 |
ParticipantIDs | ieee_primary_8979471 crossref_citationtrail_10_1109_JSYST_2020_2967089 crossref_primary_10_1109_JSYST_2020_2967089 proquest_journals_2439704608 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2020-Sept. 2020-9-00 20200901 |
PublicationDateYYYYMMDD | 2020-09-01 |
PublicationDate_xml | – month: 09 year: 2020 text: 2020-Sept. |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE systems journal |
PublicationTitleAbbrev | JSYST |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref30 doi: 10.1109/TVT.2018.2869305 – ident: ref7 doi: 10.1109/JSYST.2014.2298837 – ident: ref36 doi: 10.1017/CBO9780511804441 – ident: ref15 doi: 10.1109/COMST.2016.2598968 – ident: ref1 doi: 10.1109/COMST.2014.2375934 – ident: ref18 doi: 10.1049/iet-com.2017.0179 – ident: ref26 doi: 10.1109/COMST.2018.2828120 – ident: ref27 doi: 10.1109/JIOT.2016.2549046 – ident: ref21 doi: 10.1109/TIFS.2013.2287046 – ident: ref23 doi: 10.1109/INFCOMW.2018.8406961 – ident: ref35 doi: 10.1007/978-1-4615-0015-5 – ident: ref32 doi: 10.1109/TMC.2013.56 – ident: ref4 doi: 10.1109/TVT.2015.2424395 – ident: ref34 doi: 10.1109/MCOM.2018.1800179 – ident: ref24 doi: 10.1109/MWC.2017.1800070 – ident: ref31 doi: 10.1109/TWC.2012.051512.111622 – ident: ref28 doi: 10.1109/COMST.2018.2820069 – ident: ref11 doi: 10.1109/TWC.2016.2565579 – ident: ref12 doi: 10.1109/TCOMM.2014.2379633 – ident: ref2 doi: 10.1109/LCOMM.2016.2517012 – ident: ref10 doi: 10.1109/GLOCOMW.2017.8269199 – ident: ref14 doi: 10.1109/TIT.2008.921908 – ident: ref17 doi: 10.1109/MCOM.2015.7355565 – ident: ref13 doi: 10.1109/TCOMM.2018.2865930 – ident: ref9 doi: 10.1109/TWC.2017.2706259 – ident: ref5 doi: 10.1109/JSYST.2017.2773633 – ident: ref3 doi: 10.1109/LCOMM.2013.042313.130239 – ident: ref29 doi: 10.1109/LCOMM.2015.2441064 – ident: ref16 doi: 10.1109/COMST.2016.2633387 – ident: ref19 doi: 10.1109/TIFS.2016.2627219 – ident: ref33 doi: 10.1109/WAMICON.2017.7930242 – ident: ref6 doi: 10.1109/MCOM.2017.1700410 – ident: ref25 doi: 10.1109/LWC.2018.2872058 – ident: ref8 doi: 10.1109/TWC.2019.2895340 – ident: ref22 doi: 10.1109/TIT.2016.2530089 – ident: ref20 doi: 10.1109/TWC.2014.2354635 |
SSID | ssj0058579 |
Score | 2.4591753 |
Snippet | A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3717 |
SubjectTerms | Background noise Cellular communication Cellular networks Communication Covert communications device-to-device (D2D) underlaying cellular network Device-to-device communication Domains Error analysis NOMA Nonorthogonal multiple access nonorthogonal multiple access (NOMA) Performance evaluation power allocation Receivers Security Throughput Transmission rate (communications) Transmitters |
Title | Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA |
URI | https://ieeexplore.ieee.org/document/8979471 https://www.proquest.com/docview/2439704608 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaACQZeBVFe8sAGSRMnseMRtaAKqQXUVpQpsh1HIEqKaLrw6_E5SVUeQmwZ7Mi6O99953shdEalQe0ioE6YZZkTxqlwuGbC8dPM3L3QiJSEB_1en3ZH4c04Gq-gi0UtjNbaJp9pFz5tLD-dqjk8lbVibqQHCsZXjeNW1mrVWtegXttXD_CIY4xQWBfIeLx1M3gcDI0rSDyXcMo8GOm-ZITsVJUfqtjal-st1KtPVqaVvLjzQrrq41vTxv8efRttVkATX5aSsYNWdL6LNpbaDzbQfRvyNwv8pUhkhp9z3CEdbCciTQSUQeG2nkwgXxX3y6zxGX54Lp7wHYxYw53pqzB7-re9yz00ur4atrtONWLBUYRHhSNZLLSUAVG-r1JJeMg9Rb1AsFQFJBY0oIIymvkRA6joE-VxJaKIpSRLQyGCfbSWT3N9gHCU6UgwxaWMVEiYUeiC-5mEQGigYy6byK9pnqiq_ziMwZgk1g_xeGL5lACfkopPTXS-2PNWdt_4c3UDCL9YWdG8iY5r1ibVBZ0lBIAYBIXjw993HaF1-HeZTnaM1or3uT4x-KOQp1bwPgHeUtZS |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LT9wwEB4BPZQe-oCibktbH8oJZUmc2I4PPaDdouWxWxCLoKdgO45YseyiblZV-1v6V_rf6nGSFX2oN6TecrAdxfPF89n-ZgbgHdeOtauYB0lRFEGS5iqQVqggygv37yUOUhoP9PsD3jtLDi7YxRJ8X8TCWGu9-My28dHf5edTM8ejsp1UOvSIqJZQHtqvX9wGbfZ-v-usuUXp3odhpxfUNQQCQyUrAy1SZbWOqYkik2sqExkaHsZK5CamqeIxV1zwImICuVBETSiNYkzktMgTpWI37jI8cDyD0So6rFnnHc_2mfyQAQXO7SVNSE4odw5OP50O3eaThm0quQixiPwdt-fruPyx-HuPtvcEfjRzUQlZrtvzUrfNt9_SRP6vk_UUHtdUmuxW2H8GS3ayBo_uJFhch5MOKlRL8ksYzIyMJqRLu8TXfBorDPQiHTseoyKXDCpd_Iycj8orcoxF5Eh3eqNcn8HH_u5zOLuXb9qAlcl0Yl8AYYVlShipNTMJFc5lKRkVGq96Y5tK3YKosXFm6gzrWOhjnPmdVigzj4sMcZHVuGjB9qLPbZVf5J-t19HQi5a1jVuw2UApq5egWUaRauK1d_ry773ewsPesH-UHe0PDl_BKr6nEs9twkr5eW5fO7ZV6jce9AQu7xs4PwH7VzNi |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Covert+Communications+in+D2D+Underlaying+Cellular+Networks+With+Power+Domain+NOMA&rft.jtitle=IEEE+systems+journal&rft.au=Jiang%2C+Yu%27e&rft.au=Wang%2C+Liangmin&rft.au=Zhao%2C+Hui&rft.au=Hsiao-Hwa%2C+Chen&rft.date=2020-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=14&rft.issue=3&rft.spage=3717&rft_id=info:doi/10.1109%2FJSYST.2020.2967089&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon |