Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks

Yu'e Jiang, Liangmin Wang, Hsiao Hwa Chen

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Wireless energy harvesting (WEH) enabled Device-to-Device (D2D) communication emerges as an effective technique to improve spectral and energy efficiencies. However, D2D users are usually power-constrained devices that may be monitored or attacked by adversaries easily. To confuse randomly distributed adversaries in WEH-enabled D2D underlaying cellular networks, power beacons (PBs) can be used to send jamming signals in idle time slots. A time slot is divided into two sub-slots, i.e., WEH sub-slot and covert transmission sub-slot. The energy collected by a D2D transmitter in the first sub-slot is used to support possible covert transmission in the second sub-slot. The performance of the proposed scheme is measured by covert throughput, which is defined as D2D communication rate with several constraints, e.g., wireless energy harvesting, covertness, and cellular link communication requirements. The closed-form expressions of energy outage probability, covert probability, and desired link connection outage probabilities are derived. The minimum covert probability is used to measure covertness. Moreover, an alternating optimization algorithm is adopted to maximize covert throughput. The analytical results are compared with Monte-Carlo simulation results to verify the analytical approach. In addition, the impacts of different parameters (e.g., density of PBs and covert signal transmit power) on covert performance are evaluated.

Original languageEnglish
Pages (from-to)5401-5415
Number of pages15
JournalIEEE Transactions on Information Forensics and Security
Volume18
DOIs
Publication statusPublished - 2023

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks'. Together they form a unique fingerprint.

Cite this