The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer

Document Type : Original Article

Authors

1 Assistant Professor, Director of Research and Technology, Amol University of New Technologies, Amol, Iran

2 M.Sc., Amol University of New Technologies, Amol, Iran

3 Professor, Tarbiat Modares University, Tehran, Iran

4 Assistant Professor, Torbat Heydariyeh University, Torbat Heydariyeh, Iran

Abstract

In this paper, we investigate the information theory security in conjunction with covert communication on a network in the presence of a single transmitter (Alice), a friendly jammer, a single untrusted user, two legitimate users, and a single channel warden (Willie). In the considered network, one of the authorized users, Bob, needs a secure and covert communication, and therefore his message must be sent securely, and at the same time, the existence of his communication with the transmitter should not be detected by the channel’s warden, Willie, Meanwhile, another authorized user, Carol, needs covert communication. The purpose of secure communication is to prevent the message being decoded by the untrusted user who is present on the network, which leads us to use one of the physical layer security methods, named the secure transmission of information theory and also known as the secure capacity of information theory. In some cases, in addition to protecting the content of the message, it is important for the user that, the existence of the transmission is not detected by an adversary, which leads us to covert communication. But as we know, the main problem in covert communication is the low transmission rate, because we have to reduce the transmission power so that the main message gets hidden in the background noise. In this study, in addition to the joint implementation of the security of information theory and the covert communication, we want to examine the average transmission rate according to the limitations and requirements of covert communication and the quality of service requested by users using the power method which is artificial noise creation in the network by a friendly jammer.

Keywords


[1]          C. S. R. Murthy and B. S. Manoj, Ad hoc wireless networks: architectures and protocols. 2004.
[2]          F. Samsami Khodadad and G. A. Hodtani, “Detection of Spread Spectrum multi-user direct Sequence Signals with the help of Information Theory criteria,” J. Electron. Cyber Def., vol. 2, no. 1, 2014 (in Persian).
[3]          Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang, and H. H. Chen, “Physical layer security in wireless networks: A tutorial,” IEEE Wirel. Commun., vol. 18, no. 2, pp. 66–74, 2011, 
doi: 10.1109/MWC.2011.5751298.
[4]          N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land, “Artificial noise: Transmission optimization in multi-input single-output wiretap channels,” IEEE Trans. 
Commun., vol. 63, no. 5, 2015, 
doi: 10.1109/TCOMM.2015.2419634.
[5]          M. Bloch and J. Barros, Physical–layer security: From information theory to security engineering, vol. 9780521516. 2011.
[6]          J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May, 
doi: 10.1109/ICC.2018.8422941.
[7]          A. D. Wyner, “The Wire‐Tap Channel,” Bell Syst. Tech. J., vol. 54, no. 8, 1975, 
doi: 10.1002/j.1538-7305.1975.tb02040.x.
[8]          T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9, doi: 10.1109/TWC.2017.2720736.
[9]          B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” in IEEE Communications Magazine, 2015, vol. 53, no. 12, pp. 26–31, doi: 10.1109/MCOM.2015.7355562.
[10]        M. R. Bloch, “Covert Communication over Noisy Channels: A Resolvability Perspective,” in IEEE Transactions on Information Theory, 2016, vol. 62, no. 5, doi: 10.1109/TIT.2016.2530089.
[11]        S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst, “Achieving undetectable communication,” IEEE J. Sel. Top. Signal Process., vol. 9, no. 7, 2015, 
doi: 10.1109/JSTSP.2015.2421477.
[12]        B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, 2017, 
doi: 10.1109/LCOMM.2016.2647716.
[13]        G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. Signal Process., vol. 61, no. 20, 2013, 
doi: 10.1109/TSP.2013.2269049.
[14]        M. Abedi, N. Mokari, H. Saeedi, and H. Yanikomeroglu, “Secure robust resource allocation using full-duplex receivers,” 2015, 
doi: 10.1109/ICCW.2015.7247229.
[15]        M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wirel. Commun., vol. 11, no. 12, 2012, 
doi: 10.1109/TWC.2012.102612.111278.
[16]        D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” 2013, 
doi: 10.1145/2486001.2486033.
[17]        L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, “Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays,” IEEE Trans. Veh. Technol., vol. 65, no. 8, 2016, 
doi: 10.1109/TVT.2015.2478029.
[18]        M. Forouzesh, P. Azmi, and N. Mokari, “Reduce impact of false detection of adversary states on the secure cooperative network,” 2017, 
doi: 10.1109/ISTEL.2016.7881822.
[19]        M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie’s Location Information,” IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8568–8576, 2020, doi: 10.1109/TVT.2020.2997074.
[20]        Y. Wen, Y. Huo, L. Ma, T. Jing, and Q. Gao, “A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks,” IEEE Trans. Veh. Technol., vol. 68, no. 4, 2019, doi: 10.1109/TVT.2019.2895639.
[21]        S. Sharifian, F. Lin, and R. Safavi-Naini, “Secret key agreement using a virtual wiretap channel,” 2017, doi: 10.1109/INFOCOM.2017.8057119.
[22]        K. Cumanan et al., “Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks,” IEEE 
Access, vol. 5, 2017, 
doi: 10.1109/ACCESS.2016.2636239.
[23]        K. Cumanan, Z. Ding, M. Xu, and H. V. Poor, “Secure multicast communications with private jammers,” in IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2016, vol. 2016-August, doi: 10.1109/SPAWC.2016.7536824.
[24]        L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,” IEEE Wirel. Commun. Lett., vol. 3, no. 3, 2014, doi: 10.1109/WCL.2014.031114.140018.
Volume 9, Issue 4 - Serial Number 36
Serial No. 36, Winter Quarterly
February 2022
Pages 67-76
  • Receive Date: 06 April 2021
  • Revise Date: 31 May 2021
  • Accept Date: 04 July 2021
  • Publish Date: 20 February 2022