Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks

Yu'e Jiang, Liangmin Wang, Hsiao Hwa Chen

研究成果: Article同行評審

1 引文 斯高帕斯(Scopus)

摘要

Wireless energy harvesting (WEH) enabled Device-to-Device (D2D) communication emerges as an effective technique to improve spectral and energy efficiencies. However, D2D users are usually power-constrained devices that may be monitored or attacked by adversaries easily. To confuse randomly distributed adversaries in WEH-enabled D2D underlaying cellular networks, power beacons (PBs) can be used to send jamming signals in idle time slots. A time slot is divided into two sub-slots, i.e., WEH sub-slot and covert transmission sub-slot. The energy collected by a D2D transmitter in the first sub-slot is used to support possible covert transmission in the second sub-slot. The performance of the proposed scheme is measured by covert throughput, which is defined as D2D communication rate with several constraints, e.g., wireless energy harvesting, covertness, and cellular link communication requirements. The closed-form expressions of energy outage probability, covert probability, and desired link connection outage probabilities are derived. The minimum covert probability is used to measure covertness. Moreover, an alternating optimization algorithm is adopted to maximize covert throughput. The analytical results are compared with Monte-Carlo simulation results to verify the analytical approach. In addition, the impacts of different parameters (e.g., density of PBs and covert signal transmit power) on covert performance are evaluated.

原文English
頁(從 - 到)5401-5415
頁數15
期刊IEEE Transactions on Information Forensics and Security
18
DOIs
出版狀態Published - 2023

All Science Journal Classification (ASJC) codes

  • 安全、風險、可靠性和品質
  • 電腦網路與通信

指紋

深入研究「Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks」主題。共同形成了獨特的指紋。

引用此