Covert Communication With Truncated Channel Inversion Power Control in D2D Underlaid Cellular Networks

Ranran Sun, Bin Yang
{"title":"Covert Communication With Truncated Channel Inversion Power Control in D2D Underlaid Cellular Networks","authors":"Ranran Sun, Bin Yang","doi":"10.33969/j-nana.2021.010405","DOIUrl":null,"url":null,"abstract":"Device-to-device (D2D) underlaid cellular networks are regarded as an emerging network structure in the 5G systems. We study the covert communication of such networks consisting of a base station BS, a cellular user Alice, a D2D pair with a transmitter Dt and a receiver Dr , and a warden W illie. To conduct the covert communication, Alice adopts the truncated channel inversion power control (CIPC) to hide itself from W illie, where the received signal power at BS is fixed avoiding channel estimation for decoding Alice’s signal. Meanwhile, the interference generated by the D2D pair reusing the spectrum of Alice is exploited to confuse W illie. To understand the fundamental covert rate performance in the considered network, we first provide a theoretical model for characterizing the detection error probability of W illie as well as the effective covert rate at BS under the truncated CIPC scheme. Based on the main results, we then explore the effective covert rate maximization under the constraint of the detection error probability to identify the optimal truncated CIPC scheme designing and interference management. Finally, extensive numerical results are presented to illustrate the impacts of the truncated CIPC and interference from Dt on the covert performance.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Networking and Network Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33969/j-nana.2021.010405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Device-to-device (D2D) underlaid cellular networks are regarded as an emerging network structure in the 5G systems. We study the covert communication of such networks consisting of a base station BS, a cellular user Alice, a D2D pair with a transmitter Dt and a receiver Dr , and a warden W illie. To conduct the covert communication, Alice adopts the truncated channel inversion power control (CIPC) to hide itself from W illie, where the received signal power at BS is fixed avoiding channel estimation for decoding Alice’s signal. Meanwhile, the interference generated by the D2D pair reusing the spectrum of Alice is exploited to confuse W illie. To understand the fundamental covert rate performance in the considered network, we first provide a theoretical model for characterizing the detection error probability of W illie as well as the effective covert rate at BS under the truncated CIPC scheme. Based on the main results, we then explore the effective covert rate maximization under the constraint of the detection error probability to identify the optimal truncated CIPC scheme designing and interference management. Finally, extensive numerical results are presented to illustrate the impacts of the truncated CIPC and interference from Dt on the covert performance.
基于截断信道反转功率控制的D2D蜂窝网络隐蔽通信
设备到设备(Device-to-device, D2D)底层蜂窝网络被认为是5G系统中新兴的网络结构。我们研究了这种由基站BS、蜂窝用户Alice、具有发送器Dt和接收器Dr的D2D对以及监狱长wlie组成的网络的隐蔽通信。为了进行隐蔽通信,Alice采用截断信道反转功率控制(CIPC)对wilie进行隐藏,wilie在BS处接收到的信号功率是固定的,避免了对Alice信号进行信道估计解码。同时,利用D2D对复用Alice频谱产生的干扰来混淆wilie。为了了解所考虑的网络中的基本隐蔽率性能,我们首先提供了一个理论模型来表征截断CIPC方案下wilie的检测错误概率以及BS时的有效隐蔽率。在此基础上,探讨了在检测误差概率约束下有效隐蔽率最大化的问题,确定了截断CIPC的最优方案设计和干扰管理。最后,给出了大量的数值结果来说明截断的CIPC和Dt干扰对隐蔽性能的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信