Secure Communication Guarantees for Diverse Extended-Reality Applications: A Unified Statistical Security Model

被引:4
|
作者
Xiao, Yuquan [1 ]
Du, Qinghe [1 ]
Cheng, Wenchi [2 ]
Lu, Nan [1 ]
机构
[1] Jiaotong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
[2] Xidian Univ, Sch Informat & Commun Engn, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
6G; extended reality; QoSec exponent; statistical security model; fine-grained metric; LAYER SECURITY; MASSIVE MIMO; CAPACITY; 6G;
D O I
10.1109/JSTSP.2023.3304117
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy and security assurance over wireless transmissions is one of critical issues for future extended reality (XR) communication systems expected to be supported by the sixth generation of mobile communications networks (6G). In light of the strong anti-eavesdropping capability, physical layer security (PLS) techniques have been recognized as a competitive candidate to provide secure transmissions for XR services. However, existing key performance evaluation metrics, such as the security capacity and the outage security capacity, cannot well capture diverse features of quality-of-security (QoSec) requirements raised by XR services. To overcome the problem, in this article we propose a unified statistical security model that can characterize fine-grained security requirements for various XR applications. Specifically, the eavesdropping process at the eavesdropper is modeled by a queuing system. The arrival process represents the legitimate user's streaming data correctly-captured by the eavesdropper. The departure process represents data that are outdated and moved out of the queue, fitting the essential time-sensitive nature of XR applications. Yet storing the overheard data in the queue is not equivalent to data recovery, the eavesdropper has to accumulate a sufficient of amount correctly-captured data in the queue to successfully decipher some data each time. Under this framework, leveraging the effective bandwidth theory in statistically queuing analyses, we develop the concept of statistical security capacity, which is used to evaluate the legitimate user's throughput with the constrained information level leaked to the eavesdropper. The statistical security model is featured with a parameter called QoSec exponent, quantitatively indicating the fine-grained level of security requirement. Following this model, we formulate the nonconvex statistical-security-capacity maximization problems with the internal and external eavesdroppers, respectively, associated with the cases with and without eavesdropper's CSI known at the legitimate transmitter. Solving the two problems, we derive the corresponding optimal resource schemes over the time-varying fading channels. Simulation results demonstrate our proposal as an effective model for security requirements, and our scheme can significantly improve security-constrained throughput in XR communications compared to the baseline schemes.
引用
收藏
页码:1007 / 1021
页数:15
相关论文
共 33 条
  • [21] Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET
    Hasrouny, Hamssa
    Bassil, Carole
    Samhat, Abed Ellatif
    Laouiti, Anis
    VEHICULAR AD-HOC NETWORKS FOR SMART CITIES, 2017, 548 : 71 - 83
  • [22] Unified Statistical Channel Model for Turbulence-Induced Fading in Underwater Wireless Optical Communication Systems
    Zedini, Emna
    Oubei, Hassan Makine
    Kammoun, Abla
    Hamdi, Mounir
    Ooi, Boon S.
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (04) : 2893 - 2907
  • [23] Simple statistical model of scattering by tree for site-specific channel model for wireless communication applications
    Lee, JM
    Koh, IS
    Oh, Y
    IGARSS 2005: IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, VOLS 1-8, PROCEEDINGS, 2005, : 570 - 573
  • [24] Secure JAVA']JAVA applets and applications: Guidelines and lessons learnt from the JAVA']JAVA security model
    Bichindaritz, I
    Siadak, MF
    Jocom, J
    Moinpour, C
    Donaldson, G
    Bush, N
    Chapko, M
    Sullivan, KM
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, : 1028 - 1028
  • [25] A novel extended Gumbel Type II model with statistical inference and Covid-19 applications
    Lone, Showkat Ahmad
    Sindhu, Tabassum Naz
    Shafiq, Anum
    Jarad, Fahd
    RESULTS IN PHYSICS, 2022, 35
  • [26] Standards for science communication in extended and virtual reality: a model for XR/VR based on London Charter and Seville Principles
    Tamayo, Jose Luis Rubio
    Wuebben, Daniel Lewis
    Gertrudix, Manuel
    JCOM-JOURNAL OF SCIENCE COMMUNICATION, 2024, 23 (03):
  • [27] A novel extended model with versatile shaped failure rate: Statistical inference with Covid-19 applications
    Shafiq, Anum
    Sindhu, Tabassum Naz
    Alotaibi, Naif
    RESULTS IN PHYSICS, 2022, 36
  • [28] Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
    Xie, Qi
    Wong, Duncan S.
    Wang, Guilin
    Tan, Xiao
    Chen, Kefei
    Fang, Liming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1382 - 1392
  • [29] Determinants of Acceptance of Weight Management Applications in Overweight and Obese Individuals: Using an Extended Unified Theory of Acceptance and Use of Technology Model
    Baeuerle, Alexander
    Frewer, Anna-Lena
    Rentrop, Vanessa
    Schueren, Lynik Chantal
    Niedergethmann, Marco
    Lortz, Julia
    Skoda, Eva-Maria
    Teufel, Martin
    NUTRIENTS, 2022, 14 (09)
  • [30] Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
    Li, Xiaowei
    Yang, Dengqi
    Zeng, Xing
    Chen, Benhui
    Zhang, Yuqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3344 - 3345