Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

被引:29
|
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Kuhestani, Ali [2 ]
Yeoh, Phee Lep [3 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115111, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Commun & Elect Dept, Qom 3716146611, Iran
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
美国国家科学基金会;
关键词
Transmitters; Optimization; Receivers; Internet of Things; Indexes; Jamming; Gold; Covert communication; imperfect channel state information (CSI); information theoretic secrecy (ITS); power allocation; PHYSICAL LAYER SECURITY; RELAY; TRANSMISSION; NETWORKS; SYSTEMS; OPTIMIZATION; ALLOCATION; POWER;
D O I
10.1109/JIOT.2020.3038682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden. To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously. We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint. Since the proposed optimization problem is nonconvex, we utilize successive convex approximation to obtain a tractable solution. Moreover, we extend our proposed system model to multiple antenna Alice scenario and find beamforming vectors so that the average sum rate is maximized. Furthermore, we consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol. Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
引用
收藏
页码:7170 / 7181
页数:12
相关论文
共 50 条
  • [1] Achievable Information-Theoretic Secrecy in the Presence of a Radar
    Guan, Bo
    Goeckel, Dennis L.
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [2] An Information-Theoretic Approach to Joint Sensing and Communication
    Ahmadipour, Mehrasa
    Kobayashi, Mari
    Wigger, Michele
    Caire, Giuseppe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (02) : 1124 - 1146
  • [3] Information-Theoretic Perspective to Thermal Covert Channels
    Miketic, Ivan
    Yethiraj, Krithika
    Salman, Emre
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [4] Information-Theoretic Secrecy with Access to Decryption Oracles
    Portmann, Christopher
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (07) : 1585 - 1590
  • [5] Increasing the Information-Theoretic Secrecy by Cooperative Relaying and Jamming
    Marina, Ninoslav
    Stojanovski, Toni Draganov
    Poor, H. Vincent
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 974 - 981
  • [6] Analysis of an information-theoretic model for communication
    Dickman, Ronald
    Moloney, Nicholas R.
    Altmann, Eduardo G.
    JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2012,
  • [7] On the information-theoretic assessment of visual communication
    Huck, FO
    Fales, CL
    Rahman, ZU
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL II, 1996, : 437 - 440
  • [8] Joint Information-Theoretic Secrecy and Covertness for UAV-Assisted Wireless Transmission With Finite Blocklength
    Liu, Pengpeng
    Li, Zan
    Si, Jiangbo
    Al-Dhahir, Naofal
    Gao, Yang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 10187 - 10199
  • [9] Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden
    Chen, Xinying
    Chang, Zheng
    Zhao, Nan
    Chen, Yunfei
    Yu, F. Richard
    Hamalainen, Limo
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [10] Covert Communication and Secure Transmission in the Presence of Multiple Antenna Untrusted Relay
    Yari, MohammadReza
    Azmi, Paeiz
    Ghasedi, Mahyar
    Forouzesh, Moslem
    Saeedi, Hamid
    2024 32ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, ICEE 2024, 2024, : 656 - 661