Secure Communication Guarantees for Diverse Extended-Reality Applications: A Unified Statistical Security Model

被引:4
|
作者
Xiao, Yuquan [1 ]
Du, Qinghe [1 ]
Cheng, Wenchi [2 ]
Lu, Nan [1 ]
机构
[1] Jiaotong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
[2] Xidian Univ, Sch Informat & Commun Engn, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
6G; extended reality; QoSec exponent; statistical security model; fine-grained metric; LAYER SECURITY; MASSIVE MIMO; CAPACITY; 6G;
D O I
10.1109/JSTSP.2023.3304117
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy and security assurance over wireless transmissions is one of critical issues for future extended reality (XR) communication systems expected to be supported by the sixth generation of mobile communications networks (6G). In light of the strong anti-eavesdropping capability, physical layer security (PLS) techniques have been recognized as a competitive candidate to provide secure transmissions for XR services. However, existing key performance evaluation metrics, such as the security capacity and the outage security capacity, cannot well capture diverse features of quality-of-security (QoSec) requirements raised by XR services. To overcome the problem, in this article we propose a unified statistical security model that can characterize fine-grained security requirements for various XR applications. Specifically, the eavesdropping process at the eavesdropper is modeled by a queuing system. The arrival process represents the legitimate user's streaming data correctly-captured by the eavesdropper. The departure process represents data that are outdated and moved out of the queue, fitting the essential time-sensitive nature of XR applications. Yet storing the overheard data in the queue is not equivalent to data recovery, the eavesdropper has to accumulate a sufficient of amount correctly-captured data in the queue to successfully decipher some data each time. Under this framework, leveraging the effective bandwidth theory in statistically queuing analyses, we develop the concept of statistical security capacity, which is used to evaluate the legitimate user's throughput with the constrained information level leaked to the eavesdropper. The statistical security model is featured with a parameter called QoSec exponent, quantitatively indicating the fine-grained level of security requirement. Following this model, we formulate the nonconvex statistical-security-capacity maximization problems with the internal and external eavesdroppers, respectively, associated with the cases with and without eavesdropper's CSI known at the legitimate transmitter. Solving the two problems, we derive the corresponding optimal resource schemes over the time-varying fading channels. Simulation results demonstrate our proposal as an effective model for security requirements, and our scheme can significantly improve security-constrained throughput in XR communications compared to the baseline schemes.
引用
收藏
页码:1007 / 1021
页数:15
相关论文
共 33 条
  • [1] Color Rendering in Medical Extended-Reality Applications
    Andrea Seung Kim
    Wei-Chung Cheng
    Ryan Beams
    Aldo Badano
    Journal of Digital Imaging, 2021, 34 : 16 - 26
  • [2] Color Rendering in Medical Extended-Reality Applications
    Kim, Andrea Seung
    Cheng, Wei-Chung
    Beams, Ryan
    Badano, Aldo
    JOURNAL OF DIGITAL IMAGING, 2021, 34 (01) : 16 - 26
  • [3] Body Area Network Channel Measurement and Modeling for Extended-Reality Applications
    Aldana, Carlos H.
    Takamizawa, Koichiro
    Soora, Shruthi
    Kennedy, Connor
    Mehrnoush, Morteza
    Cook-Ramirez, Jameelia
    Hu, Chunyu
    Molisch, Andreas F.
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 7715 - 7729
  • [4] Extended-Reality Technologies: An Overview of Emerging Applications in Medical Education and Clinical Care
    Lopez-Ojeda, Wilfredo
    Hurley, Robin A.
    JOURNAL OF NEUROPSYCHIATRY AND CLINICAL NEUROSCIENCES, 2021, 33 (03) : A4 - +
  • [5] An Extended Halanay Inequality and Its Applications in Secure Communication
    Wu Quanjun
    Zhang Hua
    Xiang Lan
    Zhou Jin
    2011 30TH CHINESE CONTROL CONFERENCE (CCC), 2011, : 370 - 375
  • [6] MAS Secure Communication Model Based on XML Security
    Sun Bo Cheng
    Yuan Ping
    2011 INTERNATIONAL CONFERENCE ON FUTURE MANAGEMENT SCIENCE AND ENGINEERING (ICFMSE 2011), VOL 2, 2011, 6 : 269 - 274
  • [7] Develop secure database system with security extended ER model
    Liu, X
    Han, Z
    Liu, JQ
    Shen, CX
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1005 - 1010
  • [8] Real Time Data Communication for Intelligent Extended Reality Applications
    Kose, Ahmet
    Tepljakov, Aleksei
    Petlenkov, Eduard
    2020 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND VIRTUAL ENVIRONMENTS FOR MEASUREMENT SYSTEMS AND APPLICATIONS (CIVEMSA 2020), 2020,
  • [9] Extended Model of Secure Communication for Embedded Systems with IoT and MQTT
    Peniak, Peter
    Franekova, Maria
    2018 23RD INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2018, : 109 - 112
  • [10] GENERALIZED SYNCHRONIZATION AND CONTROL FOR INCOMMENSURATE FRACTIONAL UNIFIED CHAOTIC SYSTEM AND APPLICATIONS IN SECURE COMMUNICATION
    Liang, Hongtao
    Wang, Zhen
    Yue, Zongmin
    Lu, Ronghui
    KYBERNETIKA, 2012, 48 (02) : 190 - 205