Secure Transmission with Covert Requirement in Untrusted Relaying Networks

被引:0
|
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Kuhestani, Ali [2 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Sharif Univ Technol, Fac Elect Engn, Tehran, Iran
关键词
Covert communication; physical-layer security; untrusted relay; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source transmits its data to the untrusted relay, the destination broadcasts its jamming signal. In the second phase, when the relay retransmits the received signal, the source transmits a jamming signal with one of its antennas. For this system model, we suggest a novel power allocation strategy to maximize the instantaneous secrecy rate subject to satisfying the covert requirements in both of the phases. Since the proposed optimization problem is non-convex, the Successive Convex Approximation (SCA) method is used to change it to a convex optimization problem. Numerical curves are presented to reveal the impact of the untrusted relay's location an number of source antennas on the secrecy performance.
引用
收藏
页码:670 / 675
页数:6
相关论文
共 50 条
  • [31] Symbol separation and beamforming to improve secure transmission in multi-untrusted relay networks
    Mekkawy, Tamer
    Yao, Rugui
    Zuo, Xiaoya
    Wang, Ling
    ELECTRONICS LETTERS, 2018, 54 (04) : 252 - 254
  • [32] Secure Amplify-and-Forward Untrusted Relaying Networks Using Cooperative Jamming and Zero-forcing Cancelation
    Park, Ki-Hong
    Alouini, Mohamed-Slim
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 234 - 238
  • [33] Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results
    Sun, Li
    Xu, Hongbin
    Zhang, Yong
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (01) : 121 - 125
  • [34] Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information
    Zhang, Tao
    Cai, Yueming
    Huang, Yuzhen
    Duong, Trung Q.
    Yang, Weiwei
    IEEE ACCESS, 2016, 4 : 8212 - 8224
  • [35] Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
    Arafa, Ahmed
    Shin, Wonjae
    Vaezi, Mojtaba
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 210 - 222
  • [36] Secure Capacity Analysis of Untrusted Relaying Energy Harvesting Systems with Multiple Eavesdroppers
    Van Phu Tuan
    Le Thi Anh
    Vo Nguyen Quoc Bao
    Kong, Hyung Yun
    ISCIT 2019: PROCEEDINGS OF 2019 19TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2019, : 361 - 365
  • [37] Physical layer Secure Transmission in RF-Powered Energy Harvesting Untrusted Relay Networks
    Yang W.-W.
    Chen J.
    Chen D.-C.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (08): : 1792 - 1796
  • [38] Secure Communications in Fixed Gain Untrusted Relay Networks
    Qin, Mian
    Yang, Shouyi
    Deng, Hao
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1029 - 1033
  • [39] Secure Transmission via UAV Relaying With Caching
    Cheng, Fen
    Gui, Guan
    Zhao, Nan
    Chen, Yunfei
    Tang, Jie
    Sari, Hikmet
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [40] Blind Forwarding for Secure and Private Communications in Untrusted Networks
    Ichibane, Yacine
    Gucnnoun, Zouhair
    Gahi, Youssef
    Guennoun, Mouhcine
    2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,