Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

被引:29
|
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Kuhestani, Ali [2 ]
Yeoh, Phee Lep [3 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115111, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Commun & Elect Dept, Qom 3716146611, Iran
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
美国国家科学基金会;
关键词
Transmitters; Optimization; Receivers; Internet of Things; Indexes; Jamming; Gold; Covert communication; imperfect channel state information (CSI); information theoretic secrecy (ITS); power allocation; PHYSICAL LAYER SECURITY; RELAY; TRANSMISSION; NETWORKS; SYSTEMS; OPTIMIZATION; ALLOCATION; POWER;
D O I
10.1109/JIOT.2020.3038682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden. To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously. We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint. Since the proposed optimization problem is nonconvex, we utilize successive convex approximation to obtain a tractable solution. Moreover, we extend our proposed system model to multiple antenna Alice scenario and find beamforming vectors so that the average sum rate is maximized. Furthermore, we consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol. Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
引用
收藏
页码:7170 / 7181
页数:12
相关论文
共 50 条
  • [31] An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication
    Tong, Xinyi
    Xu, Jian
    Huang, Shao-Lun
    2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 49 - 54
  • [32] Communication system performance: Achieving the ultimate information-theoretic limits?
    Drajic, D
    Bajic, D
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (06) : 124 - 129
  • [33] Information-Theoretic Model of Evolution over Protein Communication Channel
    Gong, Liuling
    Bouaynaya, Nidhal
    Schonfeld, Dan
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2011, 8 (01) : 143 - 151
  • [34] An Information-theoretic Security Metric for Future Wireless Communication Systems
    Cao, Zhen
    Deng, Hui
    Lu, Lu
    Duan, Xiaodong
    2014 XXXITH URSI GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM (URSI GASS), 2014,
  • [35] Information-theoretic Key Encapsulation and its Application to Secure Communication
    Sharifian, Setareh
    Safavi-Naini, Reihaneh
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2393 - 2398
  • [36] Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework
    Mantel, Heiko
    Sudbrock, Henning
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 326 - +
  • [37] Applying Information-theoretic Measures To Computation and Communication in Neural Ensembles
    Carmena, Jose M.
    Canolty, Ryan T.
    So, Kelvin
    Gastpar, Michael C.
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 2169 - 2171
  • [38] Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    Yeoh, Phee Lep
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (06) : 3737 - 3749
  • [39] MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    Li, Xiaohua
    Ratazzi, E. Paul
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1353 - 1359
  • [40] Completion Time in Two-User Channels: An Information-Theoretic Perspective
    Liu, Yuanpeng
    Erkip, Elza
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (05) : 3209 - 3223