2023
DOI: 10.1109/jiot.2022.3201021
|View full text |Cite
|
Sign up to set email alerts
|

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

Abstract: This paper investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-todevice (D2D) network consisting of a full-duplex base station BS, a user equipment UE, an untrusted relay R. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via D2D link from UE to R and cellular link from R to BS, while for the secrecy, we aim to prevent the untrusted relay from eavesdropping the UE message. To explore the fundamental covert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 45 publications
0
4
0
Order By: Relevance
“…To maximize the objective function, the interference region of transmitters must be confined, which is directly proportional to the connection distance. Therefore, in this section, we first derive connection distances for the optimal communication model, where each SBS is linked to its nearest neighbor SBS (as its relay) so that at least one multi-hop path is established from each SBS to ABS [27], namely Multihop Communication Model (MCM). Using the decode-andforward cooperative model, each relay SBS simultaneously transmits its own data and cooperates in relaying forced by administrative enforcement or incentive mechanisms.…”
Section: Problem Definitionmentioning
confidence: 99%
“…To maximize the objective function, the interference region of transmitters must be confined, which is directly proportional to the connection distance. Therefore, in this section, we first derive connection distances for the optimal communication model, where each SBS is linked to its nearest neighbor SBS (as its relay) so that at least one multi-hop path is established from each SBS to ABS [27], namely Multihop Communication Model (MCM). Using the decode-andforward cooperative model, each relay SBS simultaneously transmits its own data and cooperates in relaying forced by administrative enforcement or incentive mechanisms.…”
Section: Problem Definitionmentioning
confidence: 99%
“…where µ = P max j |h aw | 2 + σ 2 w ; χ 2 2n is a chi-squared random variable with 2n degrees of freedom. Based on the Strong Law of Large Numbers and Lebesgue's Dominated Convergence Theorem [21],…”
Section: A Detection Error Probabilitymentioning
confidence: 99%
“…The work in [ 32 ] studied covert rate maximization with a half-duplex (HD)/FD mode switching device-to-device (D2D) covert receiver in the presence of an uplink spectrum-sharing cellular network. Both secrecy and covert rates were optimized when an untrusted FD AF relay delivers the covert message to an FD base station that emits AN to the warden in [ 33 ].…”
Section: Introductionmentioning
confidence: 99%