Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang
{"title":"支持d2d的蜂窝网络的隐蔽监控","authors":"Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang","doi":"10.1109/NaNA56854.2022.00016","DOIUrl":null,"url":null,"abstract":"This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert Monitoring for D2D-enabled Cellular Networks\",\"authors\":\"Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang\",\"doi\":\"10.1109/NaNA56854.2022.00016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.\",\"PeriodicalId\":113743,\"journal\":{\"name\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"111 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA56854.2022.00016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Covert Monitoring for D2D-enabled Cellular Networks
This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.