{"title":"基于生成对抗网络的CCRNs协同干扰隐蔽通信","authors":"Yingkun Wen;Yan Huo;Junhuai Li;Jin Qian;Kan Wang","doi":"10.1109/TIFS.2025.3526058","DOIUrl":null,"url":null,"abstract":"This paper investigates a centralized cooperative cognitive radio network (CCRN) where a primary base station (PBS) transmits a message to a primary user while a secondary user transmitter (SU-Tx) function as a friendly jammer. The jammer sends jamming signals to protect the PBS’s messages from a potential eavesdropper (Eve). However, the SU-Tx also attempts to covertly transmit its own messages to a secondary user receiver using the allocated spectrum resource, contravening the PBS regulations. To address this issue, the PBS requests its partner CBS to help detect jammer’s behavior. Specifically, we propose a generative adversarial network (GAN) optimization framework that models the strategic game between the CBS monitoring and the covert transmission of cooperative jammers. We introduce a novel GAN-based beamforming design algorithm, termed GAN-BD, to determine the power allocation at the jammer for covert communication. Additionally, we develop the detection error probability (DEP) at the CBS and derive its expression using a hypothesis testing problem. Through extensive simulation results, we demonstrate that the proposed GAN-BD algorithm can achieve near-optimal solutions for conducting covert communication, leveraging knowledge of the current network environment and exhibiting rapid convergence capabilities. The simulation results highlight the effectiveness of our GAN-BD algorithm.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"1278-1289"},"PeriodicalIF":6.3000,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs\",\"authors\":\"Yingkun Wen;Yan Huo;Junhuai Li;Jin Qian;Kan Wang\",\"doi\":\"10.1109/TIFS.2025.3526058\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates a centralized cooperative cognitive radio network (CCRN) where a primary base station (PBS) transmits a message to a primary user while a secondary user transmitter (SU-Tx) function as a friendly jammer. The jammer sends jamming signals to protect the PBS’s messages from a potential eavesdropper (Eve). However, the SU-Tx also attempts to covertly transmit its own messages to a secondary user receiver using the allocated spectrum resource, contravening the PBS regulations. To address this issue, the PBS requests its partner CBS to help detect jammer’s behavior. Specifically, we propose a generative adversarial network (GAN) optimization framework that models the strategic game between the CBS monitoring and the covert transmission of cooperative jammers. We introduce a novel GAN-based beamforming design algorithm, termed GAN-BD, to determine the power allocation at the jammer for covert communication. Additionally, we develop the detection error probability (DEP) at the CBS and derive its expression using a hypothesis testing problem. Through extensive simulation results, we demonstrate that the proposed GAN-BD algorithm can achieve near-optimal solutions for conducting covert communication, leveraging knowledge of the current network environment and exhibiting rapid convergence capabilities. The simulation results highlight the effectiveness of our GAN-BD algorithm.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"1278-1289\"},\"PeriodicalIF\":6.3000,\"publicationDate\":\"2025-01-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10824837/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10824837/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs
This paper investigates a centralized cooperative cognitive radio network (CCRN) where a primary base station (PBS) transmits a message to a primary user while a secondary user transmitter (SU-Tx) function as a friendly jammer. The jammer sends jamming signals to protect the PBS’s messages from a potential eavesdropper (Eve). However, the SU-Tx also attempts to covertly transmit its own messages to a secondary user receiver using the allocated spectrum resource, contravening the PBS regulations. To address this issue, the PBS requests its partner CBS to help detect jammer’s behavior. Specifically, we propose a generative adversarial network (GAN) optimization framework that models the strategic game between the CBS monitoring and the covert transmission of cooperative jammers. We introduce a novel GAN-based beamforming design algorithm, termed GAN-BD, to determine the power allocation at the jammer for covert communication. Additionally, we develop the detection error probability (DEP) at the CBS and derive its expression using a hypothesis testing problem. Through extensive simulation results, we demonstrate that the proposed GAN-BD algorithm can achieve near-optimal solutions for conducting covert communication, leveraging knowledge of the current network environment and exhibiting rapid convergence capabilities. The simulation results highlight the effectiveness of our GAN-BD algorithm.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features