4.8 Article

Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 12, Pages 10160-10171

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2023.3237640

Keywords

Jamming; Security; Optimization; Wireless communication; Internet of Things; Information theory; Uncertainty; Colluding Willies; covert communication; imperfect channel state information (CSI); secure transmission

Ask authors/readers for more resources

This article investigates the security of a simple IoT-based point-to-point communication. It addresses the attacks of overhearing and detecting data communication, and proposes an optimization problem to enhance the security design. The numerical results demonstrate that a more accurate estimation of Willie's location has a more positive impact on the secrecy performance compared to the accuracy of Eves' CSI estimation.
In practice, Internet of Things (IoT) applications may face two different hostile attacks, i.e., overhearing the broadcasted data and detecting the presence of data communication. Previous works have assumed that only one of these attacks is present in the network and have addressed these attacks separately. In this article, we investigate the security of a simple but practical IoT-based point-to-point communication which is facing with the above-mentioned two attacks under some realistic assumptions. In other words, we aim to protect the data against two adversary nodes, namely Eve (who tries to capture the broadcasted data) and warden Willie (who tries to detect the presence of data communication between legitimate nodes). To tackle these attacks, we jointly employ the information-theoretic security and covert communication techniques. To hide information from Willies, we force the source to transmit its message in the selected time slot and the multiple-antennas cooperative jammer to inject jamming during all time slots contentiously which leads to deceive Eves and Willies jointly. To enhance the performance of this security design, we formulate an optimization problem, with the goal of maximizing the secrecy rate subject to power constraints at the source and jammer, while satisfying a covert communication requirement. Since the mentioned optimization problem is nonconvex, we propose an algorithm to solve it. Then, to obtain further insights, we extend our proposed system model to noncolluding and colluding Willies. Next, we study a practical communication scenario, where the source has uncertainty about Willie's location and knows the channel state information (CSI) of Eves imperfectly. Our numerical results highlight that a more accurate estimation of Willie's location has a more positive efficacy on the secrecy performance compared to the case with more accuracy of Eves' CSI estimation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available