Loading…

Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective

To meet the surging wireless traffic demand, underlaying cellular networks with device-to-device (D2D) communication to reuse the cellular spectrum has been envisioned as a promising solution. In this paper, we aim to secure the D2D communication of the D2D-underlaid cellular network by leveraging c...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on wireless communications 2024-08, Vol.23 (8), p.9518-9533
Main Authors: Feng, Shaohan, Lu, Xiao, Zhu, Kun, Niyato, Dusit, Wang, Ping
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c259t-8e326eb9525c45a2b180f6eca89e9277c938d861cfe080c098e92c14bc6ce5073
container_end_page 9533
container_issue 8
container_start_page 9518
container_title IEEE transactions on wireless communications
container_volume 23
creator Feng, Shaohan
Lu, Xiao
Zhu, Kun
Niyato, Dusit
Wang, Ping
description To meet the surging wireless traffic demand, underlaying cellular networks with device-to-device (D2D) communication to reuse the cellular spectrum has been envisioned as a promising solution. In this paper, we aim to secure the D2D communication of the D2D-underlaid cellular network by leveraging covert communication to hide its presence from the vigilant adversary. In particular, there are adversaries aiming to detect D2D communications according to their received signal powers. To avoid being detected, the legitimate entity, i.e., D2D-underlaid cellular network, performs power control aiming to hide the D2D communication. We model the conflict between the adversaries and the legitimate entity as a two-stage Stackelberg game. Therein, the adversaries are the followers intending to detect D2D communication at the lower stage while the legitimate entity is the leader and aims to maximize its utility constrained by the D2D communication covertness and the cellular quality of service (QoS) at the upper stage. Different from the conventional works, the study of the combat is conducted from the system-level perspective, where the scenario that a large-scale D2D-underlaid cellular network threatened by massive spatially distributed adversaries is considered and modeled by stochastic geometry. We obtain the adversary's optimal strategy as the best response from the lower stage and also both analytically and numerically verify its optimality. Taking into consideration the best response from the lower stage and based on the successive convex approximation (SCA) method, we devise a bi-level algorithm to find the optimal strategy of the legitimate entity, which together with the best response from the lower stage constitute the Stackelberg equilibrium. Numerical results are presented to evaluate the network performance and reveal practical insights that instead of improving the legitimate utility by strengthening the D2D link reliability, increasing D2D transmission power will degrade it due to the security concern.
doi_str_mv 10.1109/TWC.2024.3363186
format article
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10436583</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10436583</ieee_id><sourcerecordid>10_1109_TWC_2024_3363186</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-8e326eb9525c45a2b180f6eca89e9277c938d861cfe080c098e92c14bc6ce5073</originalsourceid><addsrcrecordid>eNpNkE1LAzEYhIMoWKt3Dx7yB7bmY5NNvJWtVaGo0BbBy5JN35XofpQkrey_d0t78DTDMDOHB6FbSiaUEn2_-sgnjLB0wrnkVMkzNKJCqISxVJ0fPJcJZZm8RFchfBNCMynECH3m3R58xDM2w3nXNLvWWRNd1-J1uwFfm961XziHut7VxuNXiL-d_3nAU7zsQ4QmWcAearwEu_Mu9vgdfNiCjW4P1-iiMnWAm5OO0Xr-uMqfk8Xb00s-XSSWCR0TBZxJKLVgwqbCsJIqUkmwRmnQLMus5mqjJLUVEEUs0WqILU1LKy0IkvExIsdf67sQPFTF1rvG-L6gpDiwKQY2xYFNcWIzTO6OEwcA_-opl0Jx_gfhRGDM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Feng, Shaohan ; Lu, Xiao ; Zhu, Kun ; Niyato, Dusit ; Wang, Ping</creator><creatorcontrib>Feng, Shaohan ; Lu, Xiao ; Zhu, Kun ; Niyato, Dusit ; Wang, Ping</creatorcontrib><description>To meet the surging wireless traffic demand, underlaying cellular networks with device-to-device (D2D) communication to reuse the cellular spectrum has been envisioned as a promising solution. In this paper, we aim to secure the D2D communication of the D2D-underlaid cellular network by leveraging covert communication to hide its presence from the vigilant adversary. In particular, there are adversaries aiming to detect D2D communications according to their received signal powers. To avoid being detected, the legitimate entity, i.e., D2D-underlaid cellular network, performs power control aiming to hide the D2D communication. We model the conflict between the adversaries and the legitimate entity as a two-stage Stackelberg game. Therein, the adversaries are the followers intending to detect D2D communication at the lower stage while the legitimate entity is the leader and aims to maximize its utility constrained by the D2D communication covertness and the cellular quality of service (QoS) at the upper stage. Different from the conventional works, the study of the combat is conducted from the system-level perspective, where the scenario that a large-scale D2D-underlaid cellular network threatened by massive spatially distributed adversaries is considered and modeled by stochastic geometry. We obtain the adversary's optimal strategy as the best response from the lower stage and also both analytically and numerically verify its optimality. Taking into consideration the best response from the lower stage and based on the successive convex approximation (SCA) method, we devise a bi-level algorithm to find the optimal strategy of the legitimate entity, which together with the best response from the lower stage constitute the Stackelberg equilibrium. Numerical results are presented to evaluate the network performance and reveal practical insights that instead of improving the legitimate utility by strengthening the D2D link reliability, increasing D2D transmission power will degrade it due to the security concern.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2024.3363186</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>IEEE</publisher><subject>cellular network ; Cellular networks ; Covert communication ; D2D network ; Device-to-device communication ; Games ; Geometry ; Security ; Stochastic processes ; system-level optimization ; Wireless networks</subject><ispartof>IEEE transactions on wireless communications, 2024-08, Vol.23 (8), p.9518-9533</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c259t-8e326eb9525c45a2b180f6eca89e9277c938d861cfe080c098e92c14bc6ce5073</cites><orcidid>0000-0002-8193-466X ; 0000-0001-6784-5583 ; 0000-0002-7442-7416 ; 0000-0002-1599-5480 ; 0000-0002-0602-2337</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10436583$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Feng, Shaohan</creatorcontrib><creatorcontrib>Lu, Xiao</creatorcontrib><creatorcontrib>Zhu, Kun</creatorcontrib><creatorcontrib>Niyato, Dusit</creatorcontrib><creatorcontrib>Wang, Ping</creatorcontrib><title>Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>To meet the surging wireless traffic demand, underlaying cellular networks with device-to-device (D2D) communication to reuse the cellular spectrum has been envisioned as a promising solution. In this paper, we aim to secure the D2D communication of the D2D-underlaid cellular network by leveraging covert communication to hide its presence from the vigilant adversary. In particular, there are adversaries aiming to detect D2D communications according to their received signal powers. To avoid being detected, the legitimate entity, i.e., D2D-underlaid cellular network, performs power control aiming to hide the D2D communication. We model the conflict between the adversaries and the legitimate entity as a two-stage Stackelberg game. Therein, the adversaries are the followers intending to detect D2D communication at the lower stage while the legitimate entity is the leader and aims to maximize its utility constrained by the D2D communication covertness and the cellular quality of service (QoS) at the upper stage. Different from the conventional works, the study of the combat is conducted from the system-level perspective, where the scenario that a large-scale D2D-underlaid cellular network threatened by massive spatially distributed adversaries is considered and modeled by stochastic geometry. We obtain the adversary's optimal strategy as the best response from the lower stage and also both analytically and numerically verify its optimality. Taking into consideration the best response from the lower stage and based on the successive convex approximation (SCA) method, we devise a bi-level algorithm to find the optimal strategy of the legitimate entity, which together with the best response from the lower stage constitute the Stackelberg equilibrium. Numerical results are presented to evaluate the network performance and reveal practical insights that instead of improving the legitimate utility by strengthening the D2D link reliability, increasing D2D transmission power will degrade it due to the security concern.</description><subject>cellular network</subject><subject>Cellular networks</subject><subject>Covert communication</subject><subject>D2D network</subject><subject>Device-to-device communication</subject><subject>Games</subject><subject>Geometry</subject><subject>Security</subject><subject>Stochastic processes</subject><subject>system-level optimization</subject><subject>Wireless networks</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkE1LAzEYhIMoWKt3Dx7yB7bmY5NNvJWtVaGo0BbBy5JN35XofpQkrey_d0t78DTDMDOHB6FbSiaUEn2_-sgnjLB0wrnkVMkzNKJCqISxVJ0fPJcJZZm8RFchfBNCMynECH3m3R58xDM2w3nXNLvWWRNd1-J1uwFfm961XziHut7VxuNXiL-d_3nAU7zsQ4QmWcAearwEu_Mu9vgdfNiCjW4P1-iiMnWAm5OO0Xr-uMqfk8Xb00s-XSSWCR0TBZxJKLVgwqbCsJIqUkmwRmnQLMus5mqjJLUVEEUs0WqILU1LKy0IkvExIsdf67sQPFTF1rvG-L6gpDiwKQY2xYFNcWIzTO6OEwcA_-opl0Jx_gfhRGDM</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Feng, Shaohan</creator><creator>Lu, Xiao</creator><creator>Zhu, Kun</creator><creator>Niyato, Dusit</creator><creator>Wang, Ping</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-8193-466X</orcidid><orcidid>https://orcid.org/0000-0001-6784-5583</orcidid><orcidid>https://orcid.org/0000-0002-7442-7416</orcidid><orcidid>https://orcid.org/0000-0002-1599-5480</orcidid><orcidid>https://orcid.org/0000-0002-0602-2337</orcidid></search><sort><creationdate>20240801</creationdate><title>Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective</title><author>Feng, Shaohan ; Lu, Xiao ; Zhu, Kun ; Niyato, Dusit ; Wang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-8e326eb9525c45a2b180f6eca89e9277c938d861cfe080c098e92c14bc6ce5073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>cellular network</topic><topic>Cellular networks</topic><topic>Covert communication</topic><topic>D2D network</topic><topic>Device-to-device communication</topic><topic>Games</topic><topic>Geometry</topic><topic>Security</topic><topic>Stochastic processes</topic><topic>system-level optimization</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feng, Shaohan</creatorcontrib><creatorcontrib>Lu, Xiao</creatorcontrib><creatorcontrib>Zhu, Kun</creatorcontrib><creatorcontrib>Niyato, Dusit</creatorcontrib><creatorcontrib>Wang, Ping</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feng, Shaohan</au><au>Lu, Xiao</au><au>Zhu, Kun</au><au>Niyato, Dusit</au><au>Wang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2024-08-01</date><risdate>2024</risdate><volume>23</volume><issue>8</issue><spage>9518</spage><epage>9533</epage><pages>9518-9533</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>To meet the surging wireless traffic demand, underlaying cellular networks with device-to-device (D2D) communication to reuse the cellular spectrum has been envisioned as a promising solution. In this paper, we aim to secure the D2D communication of the D2D-underlaid cellular network by leveraging covert communication to hide its presence from the vigilant adversary. In particular, there are adversaries aiming to detect D2D communications according to their received signal powers. To avoid being detected, the legitimate entity, i.e., D2D-underlaid cellular network, performs power control aiming to hide the D2D communication. We model the conflict between the adversaries and the legitimate entity as a two-stage Stackelberg game. Therein, the adversaries are the followers intending to detect D2D communication at the lower stage while the legitimate entity is the leader and aims to maximize its utility constrained by the D2D communication covertness and the cellular quality of service (QoS) at the upper stage. Different from the conventional works, the study of the combat is conducted from the system-level perspective, where the scenario that a large-scale D2D-underlaid cellular network threatened by massive spatially distributed adversaries is considered and modeled by stochastic geometry. We obtain the adversary's optimal strategy as the best response from the lower stage and also both analytically and numerically verify its optimality. Taking into consideration the best response from the lower stage and based on the successive convex approximation (SCA) method, we devise a bi-level algorithm to find the optimal strategy of the legitimate entity, which together with the best response from the lower stage constitute the Stackelberg equilibrium. Numerical results are presented to evaluate the network performance and reveal practical insights that instead of improving the legitimate utility by strengthening the D2D link reliability, increasing D2D transmission power will degrade it due to the security concern.</abstract><pub>IEEE</pub><doi>10.1109/TWC.2024.3363186</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-8193-466X</orcidid><orcidid>https://orcid.org/0000-0001-6784-5583</orcidid><orcidid>https://orcid.org/0000-0002-7442-7416</orcidid><orcidid>https://orcid.org/0000-0002-1599-5480</orcidid><orcidid>https://orcid.org/0000-0002-0602-2337</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1536-1276
ispartof IEEE transactions on wireless communications, 2024-08, Vol.23 (8), p.9518-9533
issn 1536-1276
1558-2248
language eng
recordid cdi_ieee_primary_10436583
source IEEE Electronic Library (IEL) Journals
subjects cellular network
Cellular networks
Covert communication
D2D network
Device-to-device communication
Games
Geometry
Security
Stochastic processes
system-level optimization
Wireless networks
title Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T14%3A57%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Covert%20D2D%20Communication%20Underlaying%20Cellular%20Network:%20A%20System-Level%20Security%20Perspective&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Feng,%20Shaohan&rft.date=2024-08-01&rft.volume=23&rft.issue=8&rft.spage=9518&rft.epage=9533&rft.pages=9518-9533&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2024.3363186&rft_dat=%3Ccrossref_ieee_%3E10_1109_TWC_2024_3363186%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c259t-8e326eb9525c45a2b180f6eca89e9277c938d861cfe080c098e92c14bc6ce5073%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10436583&rfr_iscdi=true