Achieving Covertness and Secrecy: The Interplay between Detection and Eavesdropping Attacks
Wu, Huihui; Zhang, Yuanyu; Shen, Yulong; Jiang, Xiaohong; Taleb, Tarik (2023-07-18)
Wu, Huihui
Zhang, Yuanyu
Shen, Yulong
Jiang, Xiaohong
Taleb, Tarik
IEEE
18.07.2023
H. Wu, Y. Zhang, Y. Shen, X. Jiang and T. Taleb, "Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks," in IEEE Internet of Things Journal, vol. 11, no. 2, pp. 3233-3249, 15 Jan.15, 2024, doi: 10.1109/JIOT.2023.3296368
https://creativecommons.org/licenses/by-nc-nd/4.0/
© 2023 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0.
https://creativecommons.org/licenses/by-nc-nd/4.0/
© 2023 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0.
https://creativecommons.org/licenses/by-nc-nd/4.0/
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202402121693
https://urn.fi/URN:NBN:fi:oulu-202402121693
Tiivistelmä
Abstract
This article explores a new secure wireless communication scenario for the data collection in the Internet of Things (IoT) where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical covertness and secrecy properties of the communication are jointly guaranteed. We first provide theoretical modeling for covertness outage probability (COP), secrecy outage probability (SOP), and transmission probability (TP) to depict the covertness, secrecy, and transmission performances of the wireless communication system. To understand the fundamental security performance under the wireless communication system, we then define a new metric—covert secrecy rate (CSR), which characterizes the maximum transmission rate subject to the constraints of COP, SOP, and TP. We further conduct a detailed theoretical analysis to identify the CSR under various scenarios determined by the detector-eavesdropper relationships and the secure transmission schemes adopted by transmitters. Finally, numerical results are provided to illustrate the achievable performances under the secure wireless communication system.
This article explores a new secure wireless communication scenario for the data collection in the Internet of Things (IoT) where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical covertness and secrecy properties of the communication are jointly guaranteed. We first provide theoretical modeling for covertness outage probability (COP), secrecy outage probability (SOP), and transmission probability (TP) to depict the covertness, secrecy, and transmission performances of the wireless communication system. To understand the fundamental security performance under the wireless communication system, we then define a new metric—covert secrecy rate (CSR), which characterizes the maximum transmission rate subject to the constraints of COP, SOP, and TP. We further conduct a detailed theoretical analysis to identify the CSR under various scenarios determined by the detector-eavesdropper relationships and the secure transmission schemes adopted by transmitters. Finally, numerical results are provided to illustrate the achievable performances under the secure wireless communication system.
Kokoelmat
- Avoin saatavuus [38841]