Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA

A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be compromised by adversaries due to the fact that D2D terminals are power limited nodes. This article proposes a covert communication scheme that allows D2D communication links to transmit covert signals (e.g., privacy sensitive data) to ensure a low probability of detection. We allocate transmit powers of cellular and D2D noncovert signals following a fading D2D channel to add the uncertainty in adversary's background noises. With the help of base station, cooperative power domain nonorthogonal multiple access and successive interference cancellation are used to decode covert signal. Depending on whether a D2D transmitter has the knowledge of adversary's detection threshold, we derive minimum error probability to measure the covertness performance. Furthermore, we evaluate covert throughput, which is defined as a maximum average transmission rate of covert signal, subject to a given covertness performance.

[1]  Chenchen Liu Enhanced Physical Layer Security for Ultra-Dense D2D Communications Underlaying Cellular Networks with Full-Duplex Users , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[2]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[3]  Hsiao-Hwa Chen,et al.  Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Jintao Wang,et al.  Covert communications with extremely low power under finite block length over slow fading , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[6]  Mahmoud M. Elmesalawy,et al.  Adaptive Resource Sharing Algorithm for Device-to-Device Communications Underlaying Cellular Networks , 2016, IEEE Communications Letters.

[7]  Sherali Zeadally,et al.  Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.

[8]  Shu Fang,et al.  Robust artificial noise-aided transmit optimisation for MISO wiretap channel with device-to-device underlay communication , 2018, IET Commun..

[9]  Min Dong,et al.  Joint Power Optimization for Device-to-Device Communication in Cellular Networks With Interference Control , 2017, IEEE Transactions on Wireless Communications.

[10]  Song Guo,et al.  Achieve Sustainable Ultra-Dense Heterogeneous Networks for 5G , 2017, ArXiv.

[11]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[12]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[13]  Zhu Han,et al.  A Survey on Socially Aware Device-to-Device Communications , 2018, IEEE Communications Surveys & Tutorials.

[14]  Xiaohong Jiang,et al.  Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective , 2018, IEEE Transactions on Communications.

[15]  H. Vincent Poor,et al.  Cooperative Non-Orthogonal Multiple Access in 5G Systems , 2015, IEEE Communications Letters.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Jianfeng Ma,et al.  Covert Wireless Communications in IoT Systems: Hiding Information in Interference , 2018, IEEE Wireless Communications.

[18]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[19]  Kemal Davaslioglu,et al.  The optimum received power levels of uplink non-orthogonal multiple access (NOMA) signals , 2017, 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON).

[20]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[21]  Sherali Zeadally,et al.  A Survey of Device-to-Device Communications: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.

[22]  Majid Ghaderi,et al.  Uplink Scheduling in Wireless Networks with Successive Interference Cancellation , 2014, IEEE Transactions on Mobile Computing.

[23]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[24]  Nan Yang,et al.  Non-Orthogonal Multiple Access: Achieving Sustainable Future Radio Access , 2019, IEEE Communications Magazine.

[25]  Dusit Niyato,et al.  Auction-Based Time Scheduling for Backscatter-Aided RF-Powered Cognitive Radio Networks , 2019, IEEE Transactions on Wireless Communications.

[26]  Martin Haenggi,et al.  Superposition Coding Strategies: Design and Experimental Evaluation , 2012, IEEE Transactions on Wireless Communications.

[27]  Leo Liberti,et al.  Introduction to Global Optimization , 2006 .

[28]  Cong Ling,et al.  Design and Optimization of Scheduling and Non-Orthogonal Multiple Access Algorithms With Imperfect Channel State Information , 2018, IEEE Transactions on Vehicular Technology.

[29]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[30]  Mohsen Guizani,et al.  5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.

[31]  Rui Zhang,et al.  Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications , 2016, IEEE Internet of Things Journal.

[32]  Jiaheng Wang,et al.  Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications , 2013, IEEE Communications Letters.

[33]  Caijun Zhong,et al.  Joint Spectrum and Power Allocation for D2D Communications Underlaying Cellular Networks , 2016, IEEE Transactions on Vehicular Technology.

[34]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[35]  Nei Kato,et al.  Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.