Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

被引:29
|
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Kuhestani, Ali [2 ]
Yeoh, Phee Lep [3 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115111, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Commun & Elect Dept, Qom 3716146611, Iran
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
美国国家科学基金会;
关键词
Transmitters; Optimization; Receivers; Internet of Things; Indexes; Jamming; Gold; Covert communication; imperfect channel state information (CSI); information theoretic secrecy (ITS); power allocation; PHYSICAL LAYER SECURITY; RELAY; TRANSMISSION; NETWORKS; SYSTEMS; OPTIMIZATION; ALLOCATION; POWER;
D O I
10.1109/JIOT.2020.3038682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden. To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously. We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint. Since the proposed optimization problem is nonconvex, we utilize successive convex approximation to obtain a tractable solution. Moreover, we extend our proposed system model to multiple antenna Alice scenario and find beamforming vectors so that the average sum rate is maximized. Furthermore, we consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol. Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
引用
收藏
页码:7170 / 7181
页数:12
相关论文
共 50 条
  • [41] A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security
    Chrysikos, Theofilos
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    SECURITY IN EMERGING WIRELESS COMMUNICATION AND NETWORKING SYSTEMS, 2010, 42 : 3 - 12
  • [42] Single-RF Multi-User Communication Through Reconfigurable Intelligent Surfaces: An Information-Theoretic Analysis
    Karasik, Roy
    Simeone, Osvaldo
    Di Renzo, Marco
    Shamai , Shlomo
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2352 - 2357
  • [43] Information-theoretic multi-user power adaptation in retransmission schemes
    Tajan, Romain
    Ciblat, Philippe
    2016 IEEE 17TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2016,
  • [44] An Information-Theoretic Analysis of the Gaussian Multicast Channel With Interactive User Cooperation
    Exposito, Victor
    Yang, Sheng
    Gresset, Nicolas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (02) : 899 - 913
  • [45] Keyless Covert Communication in the Presence of Channel State Information
    ZivariFard, Hassan
    Bloch, Matthieu
    Nosratinia, Aria
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 834 - 839
  • [46] Information-theoretic bounds of evolutionary processes modeled as a protein communication system
    Gong, Liuling
    Bouaynaya, Nidhal
    Schonfeld, Dan
    2007 IEEE/SP 14TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 1 - 5
  • [47] On the information-theoretic capacity of magnetic recording systems in the presence of medium noise
    Arnold, D
    Eleftheriou, E
    IEEE TRANSACTIONS ON MAGNETICS, 2002, 38 (05) : 2319 - 2321
  • [48] A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels
    Cvitic, Ivan
    Perakovic, Dragan
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 3 - 22
  • [49] An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
    Long Kong
    Yun Ai
    Lei Lei
    Georges Kaddoum
    Symeon Chatzinotas
    Björn Ottersten
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [50] Information-Theoretic Estimates of Communication and Processing in NanoScale and Quantum OptoElectronic Systems
    Lyshevski, Sergey Edward
    Reznik, Leonid
    2013 IEEE XXXIII INTERNATIONAL SCIENTIFIC CONFERENCE ELECTRONICS AND NANOTECHNOLOGY (ELNANO), 2013, : 33 - 37