TY - JOUR
T1 - Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks
AU - Jiang, Yu'e
AU - Wang, Liangmin
AU - Chen, Hsiao Hwa
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2023
Y1 - 2023
N2 - Wireless energy harvesting (WEH) enabled Device-to-Device (D2D) communication emerges as an effective technique to improve spectral and energy efficiencies. However, D2D users are usually power-constrained devices that may be monitored or attacked by adversaries easily. To confuse randomly distributed adversaries in WEH-enabled D2D underlaying cellular networks, power beacons (PBs) can be used to send jamming signals in idle time slots. A time slot is divided into two sub-slots, i.e., WEH sub-slot and covert transmission sub-slot. The energy collected by a D2D transmitter in the first sub-slot is used to support possible covert transmission in the second sub-slot. The performance of the proposed scheme is measured by covert throughput, which is defined as D2D communication rate with several constraints, e.g., wireless energy harvesting, covertness, and cellular link communication requirements. The closed-form expressions of energy outage probability, covert probability, and desired link connection outage probabilities are derived. The minimum covert probability is used to measure covertness. Moreover, an alternating optimization algorithm is adopted to maximize covert throughput. The analytical results are compared with Monte-Carlo simulation results to verify the analytical approach. In addition, the impacts of different parameters (e.g., density of PBs and covert signal transmit power) on covert performance are evaluated.
AB - Wireless energy harvesting (WEH) enabled Device-to-Device (D2D) communication emerges as an effective technique to improve spectral and energy efficiencies. However, D2D users are usually power-constrained devices that may be monitored or attacked by adversaries easily. To confuse randomly distributed adversaries in WEH-enabled D2D underlaying cellular networks, power beacons (PBs) can be used to send jamming signals in idle time slots. A time slot is divided into two sub-slots, i.e., WEH sub-slot and covert transmission sub-slot. The energy collected by a D2D transmitter in the first sub-slot is used to support possible covert transmission in the second sub-slot. The performance of the proposed scheme is measured by covert throughput, which is defined as D2D communication rate with several constraints, e.g., wireless energy harvesting, covertness, and cellular link communication requirements. The closed-form expressions of energy outage probability, covert probability, and desired link connection outage probabilities are derived. The minimum covert probability is used to measure covertness. Moreover, an alternating optimization algorithm is adopted to maximize covert throughput. The analytical results are compared with Monte-Carlo simulation results to verify the analytical approach. In addition, the impacts of different parameters (e.g., density of PBs and covert signal transmit power) on covert performance are evaluated.
UR - http://www.scopus.com/inward/record.url?scp=85168747237&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85168747237&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2023.3307931
DO - 10.1109/TIFS.2023.3307931
M3 - Article
AN - SCOPUS:85168747237
SN - 1556-6013
VL - 18
SP - 5401
EP - 5415
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -