支持d2d的蜂窝网络的隐蔽监控

Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang
{"title":"支持d2d的蜂窝网络的隐蔽监控","authors":"Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang","doi":"10.1109/NaNA56854.2022.00016","DOIUrl":null,"url":null,"abstract":"This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert Monitoring for D2D-enabled Cellular Networks\",\"authors\":\"Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang\",\"doi\":\"10.1109/NaNA56854.2022.00016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.\",\"PeriodicalId\":113743,\"journal\":{\"name\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"111 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA56854.2022.00016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了由蜂窝用户Alice、基站BS、合法监视器和可疑D2D对组成的支持设备对设备(device-对device, D2D)的蜂窝网络的隐蔽监控性能。在这种网络中,可疑的D2D发送者试图向其接收者发送消息,而合法的监视器试图窃听D2D通信的消息。蜂窝用户Alice协助合法监视器暗中发送信号(AN)干扰D2D可疑接收器(Dr)。为此,我们首先研究了当可疑接收方Dr检测到Alice是否向其发送AN时,可疑链路和干扰链路的不确定信道的影响。然后导出了Dr的虚警概率、漏检概率以及最优AN检测阈值和平均最小检测误差概率的表达式。最后,通过优化Alice的功率,在隐蔽需求约束下实现非中断概率的最大化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Covert Monitoring for D2D-enabled Cellular Networks
This paper studies the covert monitoring performance for a device-to-device (D2D)-enabled cellular network, consisting of a cellular user Alice, a base station BS, a legal monitor and a suspicious D2D pair. In such a network, a suspicious D2D transmitter intends to transmit message to its receiver, while the legitimate monitor attempts to eavesdrop the messages of the D2D communication. The cellular user Alice assists the legitimate monitor to covertly send signal (AN) to interfere with the D2D suspicious receiver (Dr). To this end, we first study the effects of uncertain channel of suspicious link and interfering link when the suspicious receiver Dr detects whether Alice transmits AN to it or not. Then we derive false alarm probability, missed detection probability of Dr and expressions for optimal AN detection threshold and the average minimum detection error probability. Finally, we maximize the non-outage probability with the constraint of covert requirement by optimizing power of Alice.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信