Professional Documents
Culture Documents
Covert Communication Paper 5
Covert Communication Paper 5
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.
N
∑ √
pDm hDT m ,W d−α/2
DT m ,W xDm + nW , H0 ,
yW = m=2
(2)
√ ∑
N √
pD1 hDT 1 ,W d−α/2
DT 1 ,W xD1 +
−α/2
PDm hDT m ,W dDT m ,W xDm + nW , H1 ,
m=2
N
∑
pDm |hDT m ,W |2 d−α 2
H0 ,
DT m ,W + σW ,
m=2
TW = ∑
(4)
N
pD1 |hDT 1 ,W |2 d−α
DT 1 ,W +
pDm |hDT m ,W |2 d−α
DT m ,W + σW , H1 .
2
m=2
RB. Each D2D pair contains a D2D content transmitter (DT) by [9]
and a D2D content receiver (DR). The N D2D pairs comprise D1
D = {D1 , · · ·, Dn , · · ·, DN }. Accordingly, the N DTs and TW ≷ γ, (3)
D0
DRs comprise DT = {DT1 , · · ·, DTn , · · ·, DTN } and DR =
{DR1 , · · ·, DRn , · · ·, DRN }. For a period of time, D1 wants l
∑
y (k) 2
where TW = 1
l W defines as the average power
to send covert contents, meanwhile, there is a warden in the k=1
network who wants to detect whether the D1 transmits covert received by the warden in a time slot, decision D0 and D1
contents with a radiometer. support hypothesis H0 and H1 , γ is a detection threshold
In order to ensure the covertness of D1 content sharing, predetermined by the warden. In this paper, we take into
other D2D pairs Dm (m = 2, 3...N ) without covert demand account an infinite length of channel use [10]. Thus, TW is
are of great importance. Specifically, when D1 wants to given by Eq. (4) when l → ∞.
transmit covert contents, Dm transmits contents at the same There are two kinds of detection errors for warden. One is
time. Because all D2D pairs reuse the same resource block in the false alarm (FA) when the warden makes decision D1 while
D2D dedicated mode, Dm will cause co-channel interference H0 is true. The other is the miss detection (MD) when the war-
to D1 , and this kind of co-channel interference confuses the den makes decision D0 while H1 is true. Their probabilities
warden. are defined as PF A = P(D1 | H0 ) and PM D = P(D0 | H1 ).
All the channels are independent quasi-static Rayleigh fad- If hypotheses H0 and H1 are equal priori probabilities, the
ing, where the channel coefficients are constant in a time slot detection error rate of warden will be given as
with l channel uses while it changes with time slot [8]. We
define transmission power of D1 and other D2D pairs Dm as ξ = PF A + PM D . (5)
pD1 and pDm , and it is important to note that pD1 is fixed.
Remark 1: When D1 wants to send covert contents, too
On the contrary, pDm changes with the time slot and[ follows]
many Dm will affect the transmission rate of D1 and waste
a continuous uniform distribution over the interval 0, pmax Dm
energy. Therefore, we mainly study the case of N = 2 and
with the probability density function (PDF) given as
{ N = 3, and explore the effect of increasing the number of D2D
1
pmax , 0 ≤ x ≤ pmax
Dm ,
pair in dedicated mode on covert communication performance.
fpDm (x) = Dm (1) Finally, the conclusion we have got can be extended to the case
0, otherwise.
of N.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.
dα dα dα dα α
2 dDT2 ,W
ξ(t) ∗ =
DT1 ,W DT2 ,W DT1 ,W DT2 ,W
+ t( − ) + t ln t − t , (14)
dα
DT2 ,W dα
DT1 ,W dα
DT2 ,W dα
DT1 ,W dα
DT1 ,W
1, γ < σW 2 ,
2
1−
(γ−σW 2 )
, σW 2 ≤ γ < ψ1
+ σW 2 ,
|hDT2 ,W | dDT ,W pD |hDT |
2 −α 2 −α 2
2pmax max
3 ,W dDT3 ,W
PF A = D 2 2 3
(18)
2
(γ−σW 2 − ψ1 ) ψ1
, + σW 2 ≤ γ < ψ1 + σW 2 ,
2pmax |hDT2 ,W |
2 −α
dDT ,W pmax |hDT |
2 −α
dDT3 ,W 2
D 2 2 D 3 3 ,W
0, γ ≥ ψ1 + σW 2 ,
0, γ < ψ2 + σW 2 ,
2
max
(γ−σW 2 − ψ2 )
, σW 2 + ψ2 ≤ γ < ψ1
+ ψ2 + σ W 2 ,
|hDT2 ,W | dDT ,W pD |hDT |
2 −α max 2 −α 2
2pD 3 ,W dDT3 ,W
PM D = 2 2 3 (19)
2
(γ−σW − ψ1 − ψ2 )
2
ψ1
1− , + ψ2 + σ W 2 ≤ γ < ψ 1 + ψ2 + σ W 2 ,
2pmax |
2 −α
|
hDT2 ,W dDT2 ,W pmax
2 −α
hDT3 ,W dDT3 ,W | | 2
D2 D3
1, γ ≥ ψ1 + ψ2 + σW 2 ,
D2 |hDT2 ,W | dDT2 ,W
2 −α
optimal threshold for the warden is denoted as Because D1 does not know the channel from itself to
{ warden, we consider the expected detection error rate ξ ∗ as
γ∗ = [φ1 , φ2 ], φ1 < φ2 ,
(10) the measure of covertness from D1 perspective.
[φ2 , φ1 ], φ1 ≥ φ2 ,
Theorem 2. With the optimal threshold, the expected de-
and the minimum detection error rate at the warden is denoted tection error rate ξ ∗ is shown as Eq. (14), where t =
pD1 λ1
as pD1 λ1 + PDmax
λ2
.
2
( D |hDT2 ,W | d−α
2
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.
−α 2 −α 2
PF A = P[pD2 |hDT2 ,W | dDT2 ,W + pD3 |hDT3 ,W | dDT3 ,W + σW > γ],
2
(20)
2 −α 2 −α 2 −α
PM D = P[pD1 |hDT1 ,W | dDT1 ,W + pD2 |hDT2 ,W | dDT2 ,W + pD3 |hDT3 ,W | dDT3 ,W + σW < γ].
2
(21)
{
0, ψ1 < ψ2 ,
∗
ξ = (ψ1 − ψ2 )2 (23)
, ψ1 ≥ ψ2 ,
|hDT3 | pmax |hDT |
2 −α 2 −α
4 pmax
D ,W dDT ,W D 2 ,W dDT2 ,W
3 3 2
1, γ < σW 2 ,
2
1 − max (γ−σW 2 )
, σW 2 ≤ γ < ψ1
+ σW 2 ,
2pD |hDT2 ,W | d−α
2
DT2 ,W D3 |hDT3 ,W | dDT3 ,W
p max 2 −α 2
2
(γ−σW − ψ1 )
2 2
ψ1
, + σW 2 ≤ γ < ψ1 + σW 2 ,
D2 |hDT2 ,W | dDT2 ,W D3 |hDT3 ,W | dDT3 ,W
2pmax
2 −α 2 −α 2
pmax
ξ= 0, ψ1 + σ W 2 ≤ γ < ψ 2 + σ W 2 , (24)
2
(γ−σW 2 − ψ2 ) ψ1
, ψ2 + σ W ≤ γ < 2 2
+ ψ2 + σ W ,
2pD |hDT2 ,W | dDT ,W D |hDT3 ,W | d−α
max 2 −α
p max 2 2
2 2 3 DT3 ,W
2
(γ−σW 2 − ψ1 − ψ2 ) ψ1
1 − max , + ψ2 + σW 2 ≤ γ < ψ1 + ψ2 + σW 2 ,
2p |h | d−α
2
DT2 ,W D3 |hDT3 ,W | dDT3 ,W
pmax 2 −α 2
D2 DT 2 ,W
1, γ ≥ ψ1 + ψ2 + σW 2 .
pD1 dα
DT 2 ,W
optimal threshold which is given by
{
dα pmax
DT1 D2 λ2 [ψ1 , ψ2 ], ψ1 < ψ2 ,
= , γ∗ = (22)
α max
dDT2 (pD2 λ2 + pD1 λ1 ) [ψ2 , ψ1 ], ψ1 ≥ ψ2 ,
(16) and the warden can minimize the detection error rate with the
optimal threshold given by Eq.(23).
|hDT1 ,W | φ
2
pD1 dα
E[ξ ∗ |φ1 ≥ φ2 ]=1 − pmax DT2 ,W
E[ 2 | 1 ≥
φ2 ] Proof: Comparing ψ1 , ψ21 and ψ2 , we find that the rela-
| hDT1 ,W |
α
D2 dDT1 ,W
α
pD1 dDT ,W
{ max
pD λ2 max
pD λ 2
} tionship of size between the three determines the expression
= 1 − pmax α
2
ln(1 + p
2
) − p +
2
pmax , of ξ, and the detection error rate is presented as the following
D2 dDT1 ,W D1 λ1 D1 λ 1 D2 λ 2
(17) cases.
2
where λi donates the mean value of |hDT i,W | . Finally, the Case 1: When ψ1 ≤ ψ 2 , we can easily obtain that the
proof is finished by substituting Eqs. (16) and (17) into Eq. detection error rate is Eq. (24).
(15). Case 2: When ψ21 < ψ2 < ψ1 , the detection error rate is
Eq. (25).
Case 3: When ψ21 ≥ ψ2 , the detection error rate is Eq. (26).
IV. C OVERT P ERFORMANCE W HEN N = 3
The functions in all three cases are first reduced and then
A. Probability of False Alarm and Miss Detection increased. When case 1, the warden can easily set ψ1 + σW 2 ≤
γ < ψ2 + σW 2 and get the minimum value ξ ∗ = 0. When case
When N = 3, D1 transmits covert contents while D2 and
2 and 3, the warden can set ψ2 + σW 2 ≤ γ < ψ1 + σW 2
D3 make co-channel interference to confuse the warden.
and ψ21 + σW 2 ≤ γ < ψ2 + ψ21 + σW 2 to get the same
Lemma 2. Probabilities of false alarm and miss de- 2
(γ−σW 2 − ψ1 ) + (γ−σW 2 − ψ2 )
2
tection are calculated as Eqs. (18) and (19), where minimum value .
| DT2 ,W | dDT ,W pD |hDT3 ,W | d−α
2 −α 2
2pmax h max
2 −α 2 −α D2 DT3 ,W
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.
1, γ < σW 2 ,
2
(γ−σW 2 )
1 − max , σW 2 ≤ γ < ψ1
+ σW 2 ,
2pD |hDT2 ,W | dDT ,W pD |hDT3 ,W | d−α
2 −α max 2 2
2 2 3 DT3 ,W
(γ−σW 2 − ψ1 )
2
ψ1
+ σW 2 ≤ γ < ψ2 + σW 2 ,
| |
2 −α
| hDT3 ,W | dDT3 ,W
2 −α , 2
2p max p max
h d
D2 DT 2 ,W DT2 ,W D3
2 2
(γ−σW − ψ1 ) + (γ−σW − ψ2 )
2 2
ξ= , ψ2 + σ W 2 ≤ γ < ψ 1 + σ W 2 , (25)
D2 |hDT2 ,W | dDT2 ,W D3 |hDT3 ,W | dDT3 ,W
2 −α 2 −α
2pmax pmax
(γ−σW − ψ2 )
2 2
, ψ1 + σ W 2 ≤ γ < ψ1
+ ψ2 + σ W 2 ,
2pmax | DT2 ,W | dDT ,W pD
2 −α max
|hDT3 ,W | d−α
2 2
D 2
h 2 3 DT3 ,W
(γ−σW 2 − ψ1 − ψ2 )
2
ψ1
1 − max , + ψ2 + σW 2 ≤ γ < ψ1 + ψ2 + σW 2 ,
2pD |hDT2 ,W | d−α | 3 ,W | dDT3 ,W
2 max 2 −α 2
p
2 DT2 ,W D3 h DT
1, γ ≥ ψ1 + ψ2 + σW 2 .
1, γ < σW 2 ,
2
(γ−σW 2 )
1− , σW 2 ≤ γ < ψ2 + σW 2 ,
2pmax |hDT2 ,W | dDT ,W pD
2 −α max
|hDT
2 −α
dDT3 ,W |
D 2 3 ,W
2 3
1−
2 2
(γ−σW ) − (γ−σW − ψ1 ) 2 2
, ψ2 + σW 2 ≤ γ < ψ1
+ σW 2 ,
|
2 −α
|
2 −α
| | 2
2pmax
D2 hDT2 ,W dDT2 ,W pmax
2
D3 hDT3 ,W dDT3 ,W
2
(γ−σW − ψ1 ) + (γ−σW − ψ2 )
2 2
ψ1
ξ= , + σW 2 ≤ γ < λ2 + ψ21 + σW 2 , (26)
| | | |
2 −α 2 −α
2pmax hDT2 ,W dDT2 ,W pmax hDT3 ,W dDT3 ,W 2
D2 D3
−
2 2
(γ−σW − ψ1 − ψ2 ) − (γ−σW 2 − ψ1 )
2
, σW 2 + ψ2 + ψ21 ≤ γ < ψ1 + σW 2 ,
1
|
2 −α
|
2 −α
| |
max
2pD max
hDT2 ,W dDT2 ,W pD3 hDT3 ,W dDT3 ,W
2
(γ−σW 2 − ψ1 − ψ2 )
2
1− , ψ1 + σW 2 ≤ γ < ψ1 + ψ2 + σW 2 ,
2pmax |
2 −α
p max
|
2 −α
| |
D2 hDT2 ,W d DT2 ,W D3 hDT3 ,W dDT3 ,W
1, γ ≥ ψ1 + ψ2 + σW 2 .
∫ ∞ ∫ ∞ ∫ ψ1 (ψ1 − ψ2 )2
E[ξ ∗ |ψ1 ≥ ψ2 ] = 0 0 0 4 xypmax −α −α f|h | (x) f|hDT3 ,W | (y) f|hDT1 ,W | (z)dzdydx.
2 2 2 (29)
D3 dDT3 ,W pmax
D2 dDT2 ,W DT2 ,W
√
m2 ∑ √ ∑
Na Na
∗ m m m m
E[ξ |ψ1 ≥ ψ2 ] = wj 1− j
y 2 wi 1 − x2i G( xi + , yj + ), (30)
4 j=1 i=1
2 2 2 2
−α pmax −α
λ1 (pmax
Theorem 4. The expected detection error rate ξ ∗ is given 2 (pD1 d−α
2 −
D2 dDT2 ,W x+ D3 dDT3 ,W y)
pD d−α
DT1 ,W )
by Eq. (28) and (30) λ31
e ],
1 DT1 ,W and
Proof: The expected detection error rate can be got from yj = cos(π 2j−1
wj = wi = Nπa , Na ), x i = cos(π 2i−1
Na ). Na
Eq. (22) and m denote the parameter of the gauss-chebyshev formula.
ξ ∗ = P[ ψ1 < ψ2 ] × 0 + P[ ψ1 ≥ ψ2 ] × E[ξ ∗ |ψ1 ≥ ψ2 ]
= P[ ψ1 ≥ ψ2 ] × E[ξ ∗ |ψ1 ≥ ψ2 ], V. N UMERICAL R ESULTS
(27) In this section, numerical results are presented to analyze
the performance of covert communication and covert rate of
P[ ψ1 ≥ ψ2 ] D1 . In general, we set the distance from DT to warden as 5m,
pD |hDT ,W |2 pmax |hDT |
2
pmax |hDT |
2 the path-loss exponent α is 4, the transmission power of DT1
= P{ 1dα 1 < D 2
dα
2 ,W
+ D3
dα
3 ,W
} is 17 dBm, the maximum transmission power of DT2 and DT3
DT1 ,W DT2 ,W DT3 ,W
=1− (
λ1 pmax α
D2 dDT 1,W
1
)(
λ1 pmax α
D3 dDT 1,W
). is 20 dBm, noise power at warden is -174dBm, the mean value
2
1+ λ2 pD1 dα
DT 2,W
1+ λ3 pD1 dα
DT 3,W of |hDT i,W | , λi is 1, the parameter of the gauss-chebyshev
(28) formula, N a and m are 20 and 1500.
E[ξ ∗ |ψ1 ≥ ψ2 ] is given by Eq. (29). For this transcendant Fig. 2 and Fig. 3 show the probabilities of FA, MD and
integral, we first simplify the triple integral into a double total error probability ξ ∗ versus the detection threshold γ of
integral, and then make an approximation using the gauss- eavesdropper when N = 2 and N = 3, respectively. As
chebyshev formula [11]. Finally we have the Eq. (30), where expected, we can see that the the simulated curves precisely
pmax −α pmax −α 2
e−λ2 x e−λ3 y ( D2 dDT2 ,W x+ D3 dDT3 ,W y) fit with the theoretical ones, which confirms the correctness
G(x, y) = x y [ λ1
−
2 pD1 −α max −α max −α
dDT1 ,W (pD2 dDT2 ,W x+pD3 dDT 3,E y) 2 (pD1 d−α
2 of our Lemma 1 and Lemma 2. We also observe that there
DT1 ,W )
λ21
+ λ31
− is indeed an optimal value of γ that minimizes ξ and this
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.
1 1 1
FA, theoretical
0.9 0.9 MD, theoretical
, theoretical 0.9
0.8 0.8 FA, simulated
FA, simulated
Probability
N=2,p =0dBm
D1
MD, simulated
0.5 0.5 0.7 N=2,p = -10dBm
, simulated D1
0.4 0.4
0.6
0.3 0.3
0.1 0.1
0.4
0 0 0 2 4 6 8 10 12 14 16 18 20
0 0.5 1 1.5 2 2.5 3 0 1 2 3 4 5 6
Detection Threshold 10 -4 Detection Threshold 10 -4 p max
m
[dBm]
Fig. 2: FA, MD and total error Fig. 3: FA, MD and total error Fig. 4: Expected detection error rate
probability when N = 2. probability when N = 3. when N = 2 and 3.
minimum value satisfies Eq. (11) and Eq. (23), which verifies [2] W. Wang, K. C. Teh, and K. H. Li, “Enhanced physical
the correctness of our Theorem 1 and Theorem 3. In addition layer security in d2d spectrum sharing networks,” IEEE
to this, comparing the two minimum value shows that N = 3 Wireless Commun., vol. 6, no. 1, pp. 106–109, Feb. 2016.
has higher minimum detection error rate of warden. Because [3] D. Wu, L. Zhou, Y. Cai, H. Chao, and Y. Qian, “Physical-
increasing the number of N is equivalent to increasing co- social-aware d2d content sharing networks: A provider-
channel interference, which makes Warden’s decision more demander matching game,” IEEE Trans. Veh. Technol.,
difficult. vol. 67, no. 8, pp. 7538–7549, Aug. 2018.
Fig. 4 shows the expected detection error rate versus the [4] J. Wang, W. Tang, Q. Zhu, X. Li, H. Rao, and S. Li,
transmission power of Dm for pD1 = 0dBm and −10dBm. “Covert communication with the help of relay and chan-
Firstly, we can observe that the expected detection error nel uncertainty,” IEEE Wireless Commun. Lett., vol. 8,
rate increases with the transmission power of Dm . When no. 1, pp. 317–320, Feb. 2019.
pmax
Dm increases sufficiently, the expected detection error rate [5] B. He, S. Yan, X. Zhou, and H. Jafarkhani, “Covert wire-
approaches 1 and the D2D content sharing is harder to be less communication with a poisson field of interferers,”
detected. Then, we also observe that the expected detection IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6005–
error rate increases with the number of Dm , which shows 6017, Sep. 2018.
that the D2D content sharing is harder to be detected when [6] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li,
the number of Dm increases. Last but not least, when N “Achieving covert wireless communications using a full-
is fixed, the transmission power of D1 is smaller and the duplex receiver,” IEEE Trans. Wireless Commun., vol. 17,
less likely content sharing is to be detected, since decreasing no. 12, pp. 8517–8530, Dec. 2018.
the transmission power of D1 means that the uncertainty of [7] X. Shi, D. Wu, C. Yue, C. Wan, and X. Guan, “Resource
interference caused by pDm is relatively greater. allocation for covert communication in d2d content shar-
ing: A matching game approach,” IEEE Access, vol. 7,
no. 2, pp. 72 835–72 849, May. 2019.
VI. C ONCLUSIONS [8] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li,
In this paper, we mainly study the security problem of D2D “Covert communications with a full-duplex receiver over
content sharing in dedicated mode with power uncertainty. wireless fading channels,” in Proc. IEEE Int. Conf.
Multiple D2D pairs reuse the same RB to produce the co- Commun. (ICC), May 2018, pp. 1–6.
channel interference to interfere with the warden, which makes [9] K. Shahzad, X. Zhou, and S. Yan, “Covert communi-
the covert content sharing difficult to be detected. In particular, cation in fading channels under channel uncertainty,” in
we study the case of two D2D pairs and three D2D pairs Proc. IEEE Veh. Technol. Conf. (VTC Spring), Jun. 2017,
reusing the same RB respectively and come to the conclusion pp. 1–5.
that when increasing the number and the transmission power [10] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert
of D2D pairs, D2D pair which needs covert content sharing communication in wireless relay networks,” in Proc.
has a lower probability to be detected and better guarantees IEEE Global Commun. Conf. (GLOBECOM), Dec. 2017,
D2D content sharing security in dedicated mode. pp. 1–6.
[11] Z. Ding, Z. Zhao, M. Peng, J. Hu, and H. Vincent,
“On the spectral efficiency and security enhancements of
R EFERENCES noma assisted multicast-unicast streaming,” IEEE Trans.
[1] D. Wu, L. Zhou, Y. Cai, and Y. Qian, “Collaborative Wireless Commun., vol. 65, no. 7, pp. 3151–3163, Jul.
caching and matching for d2d content sharing,” IEEE 2017.
Wireless Commun., vol. 25, no. 3, pp. 43–49, Jun. 2018.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:53:55 UTC from IEEE Xplore. Restrictions apply.