Loading...

Secure transmission with covert requirement in untrusted relaying networks

Forouzesh, M ; Sharif University of Technology | 2019

482 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISTEL.2018.8661020
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2019
  4. Abstract:
  5. In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source transmits its data to the untrusted relay, the destination broadcasts its jamming signal. In the second phase, when the relay retransmits the received signal, the source transmits a jamming signal with one of its antennas. For this system model, we suggest a novel power allocation strategy to maximize the instantaneous secrecy rate subject to satisfying the covert requirements in both of the phases. Since the proposed optimization problem is non-convex, the Successive Convex Approximation (SCA) method is used to change it to a convex optimization problem. Numerical curves are presented to reveal the impact of the untrusted relay's location an number of source antennas on the secrecy performance. © 2018 IEEE
  6. Keywords:
  7. Covert communication ; Physical-layer security ; Untrusted relay ; Antennas ; Convex optimization ; Jamming ; Network layers ; Signal processing ; Convex optimization problems ; Covert communications ; Information signals ; Optimization problems ; Physical layer security ; Power allocation strategies ; Successive convex approximations ; Untrusted relays ; Network security
  8. Source: 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 670-675 ; 9781538682746 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/8661020