Next Article in Journal
YOLO-MBBi: PCB Surface Defect Detection Method Based on Enhanced YOLOv5
Previous Article in Journal
Four-Dimensional Trajectory Planning Algorithm for Fixed-Wing Aircraft Formation Based on Improved Hunter—Prey Optimization
Previous Article in Special Issue
Covert Communication for Integrated Satellite–Terrestrial Relay Networks with Cooperative Jamming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications

1
College of Communication Engineering, Army Engineering University of PLA, Nanjing 210007, China
2
National Innovation Institute of Defense Technology, Academyof Military Sciences of PLA, Beijing 100091, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(13), 2822; https://doi.org/10.3390/electronics12132822
Submission received: 22 May 2023 / Revised: 20 June 2023 / Accepted: 21 June 2023 / Published: 26 June 2023
(This article belongs to the Special Issue Covert Wireless Communication with Multi-Domain Uncertainties)

Abstract

:
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D communication model assisted by covert communication, and further propose the notion of effective covert throughput (ECT) to quantitatively characterize the trade-off between the covertness and reliability of IoT state monitoring information transmission. Secondly, in the constructed communication scenario, we analyze the detection error probability of the warden and clarify that the existing equal power transmission of pilot and data signals can minimize the detection performance of the warden. However, this strategy is achieved by compromising the transmission performance of the system, which means that the ECT of D2D pair may not be optimal. Thirdly, we aim to maximize the ECT of D2D pair and construct a joint optimization problem for pilot transmission power, data transmission power, and packet length. Furthermore, a joint optimization algorithm based on the 2D search is adopted to obtain the optimal solution of the established optimization problem. Simulation results demonstrated that the transmission performance of the joint optimization algorithm is better than that of the scheme of the equal power scheme on the premise of ensuring the covertness.

1. Introduction

The vigorous development of IoT technology has brought great convenience to people’s life. At the same time, a large number of node devices that support the IoT application are connected to the mobile Internet [1]. Their large number, wide distribution and diverse demands bring enormous pressure to cellular networks, and make the contradiction between the scarce wireless resources and the accelerating resource consumption more prominent [2,3,4]. In view of this, short-packet D2D communication has been widely used. Its core idea is that in D2D communication, information exchange is conducted between adjacent devices through short packets [5]. Due to the characteristics of the short communication distance and direct communication, it has advantages such as high data rate [6], low delay [7] and low power consumption [8].
Compared with traditional cellular communication, the D2D communication based on short packets faces severe challenges in terms of security. (i) Because D2D communication is not verified by the management of the base station, its communication link is vulnerable to attack [9]. (ii) Due to the limited computing capacity and energy reserve of user terminal devices in D2D networks, it is difficult to enhance data security through high-complexity key encryption algorithms [10]. (iii) The data carried by short data packets are generally key core information, such as the control information of IoT nodes, the highly compressed basis of semantic communication, the privacy data of patients in telemedicine, etc. Once the data packets containing such information are intercepted or even deciphered, the blow to communication security will be devastating [11]. Therefore, in order to enhance the security of D2D communication, covert communication technology is added to the existing secure communication system to ensure that the warden can only detect the signals transmitted between D2D pairs with a very low probability, so as to achieve the purpose of hiding communication signals or communication behaviors [12,13].
Unfortunately, most existing studies focus on covert D2D communication and have not yet explored the impact of using short data packets on covert D2D communication [14]. In essence, the covert D2D communication hides the communication behavior by using the co-channel interference generated by CUEs (Cellular Users) and the inherent noise of the physical environment, so that the warden cannot accurately judge whether the change of the received signal is from the occurrence of D2D communication behavior. In a word, since the covertness performance in covert D2D communication depends on the warden’s ability to recognize the changes in its received signals [15,16], most of the existing works are to ensure the covert performance between D2D pairs by introducing uncertainty factors. According to the working mode of D2D pairs, the relevant studies are described as follows:
In the dedicated mode: Ref. [17] utilizes the co-channel interference generated by multiple D2D pairs sharing the same resource block, causing the uncertainty of the warden to the interference signal to realize covert D2D communication. The results demonstrate that the number of D2D pairs in the same channel and the transmission power are important factors affecting the communication covertness. In [18], the D2D link dedicates orthogonal spectrum resources, and delimits a security zone. The D2D transmitter acts as a dynamic repeater to forward covert information to cell users outside the security zone. The results demonstrate that as long as the transmission power of the transmitter does not exceed the maximum value, the probability of detection by the warden is small enough.
In the multiplexed mode: Ref. [10] uses the co-channel interference generated by spectrum multiplexing to achieve covertness. Considering the freshness of information and energy consumption, a high energy transmission probability-power control method under age of information (AoI) constraints is proposed. Ref. [19] makes use of the channel uncertainty of the warden and introduces the power domain NOMA and continuous interference cancellation techniques to study the covert performance of the D2D transmitter when it knows and does not know the detection decision threshold of the warden. In addition to using cochannel interference generated by CUEs, in order to further enhance the covertness of D2D communication, Ref. [20] deploys an antenna array at the base station to send artificial noise to disturb the warden. The research demonstrates that the covert throughput can be further improved by setting the appropriate number of base station antennas as well as using artificial noise transmission power.
It is worth noting that while the above methods implement covert transmission between the D2D pair, they do not take into account the effect of short packets on covert D2D communication, as mentioned earlier [21,22]. In fact, compared with the long packet, the decoding error is inevitable in short packet communication, and the influence of background noise on the decoding error is difficult to eliminate due to the limited observation samples at the D2D receiver [23]. Therefore, the existing covert D2D communication cannot be directly applied to covert short-packet D2D communication. Moreover, the D2D communication rate is not only affected by the received signal to the interference plus noise ratio (SINR), but also by the combination of the packet length and packet error rate [24]. Therefore, the optimization of the packet length as well as the transmission power should be considered in the implementation of covert short-packet D2D communication. In addition, the existing research still has the following deficiencies:
(1) Most existing studies assume that the receiver has mastered the channel state information (CSI) between the D2D pair, without considering the acquisition process. It is precisely the process of obtaining CSI that may lead to the exposure of the D2D user communication behavior [25]. Therefore, it is necessary to consider the acquisition process of CSI under covert conditions [26]. Especially, considering the special role of the pilot in the process of channel estimation, it is a feasible solution to achieve covert channel estimation by reasonably allocating resources such as the pilot packet length and transmission power [24].
(2) In covert D2D communication, there is mutual interference between D2D pairs and CUEs in the spectrum multiplexing mode. D2D users not only need to ensure their own communication quality, but also need ensure that the interferences to CUEs are within a reasonable range [10]. Therefore, it is necessary to comprehensively consider the communication link quality of CUEs and D2D pairs.
(3) In existing covert D2D communication, there is not much analysis on the tradeoff between communication covertness and reliability, which leads to the improvement of the communication covert performance at the expense of communication quality. Moreover, different scenarios have different requirements for communication covertness and reliability. Therefore, we need to properly control and allocate resources, such as transmission power and packet length based on the preferences of communication scenarios for performance indicators to ensure both the D2D communication covertness performance and transmission performance.
Inspired by the above analysis, we consider using a power allocation of pilot signals to realize the channel estimation under covert conditions in covert short-packet D2D communication scenarios, so as to obtain accurate CSI. Furthermore, we consider the quality of cellular user communication links as one of the constraints and propose a joint scheme of packet length and transmission power to achieve the optimal compromise between the covertness and reliability of the D2D pair. The main work is summarized as follows:
  • Through the uncertainty of the background noise power of the warden and the interference of CUE in the detection process, the warden cannot accurately judge whether the changes in the received signal come from the occurrence of the D2D communication behavior. We construct a short-packet D2D communication scene assisted by covert communication. In this model, the ECT is proposed to quantitatively characterize the tradeoff between the covertness and reliability of the D2D pair under the short packet communication. We consider the process of obtaining CSI under covert conditions, comprehensively considering the average decoding error and channel estimation error of the short packet communication receiver, and analyze the transmission performance of the system.
  • In the covert short-packet D2D communication scenario, we derive a strict covert constraint lower bound based on the KL divergence of the observed signal probability, and analyze the factors affecting the covert performance such as the allocation factor and pilot packet length. On this basis, the analysis of the existing equal power distribution scheme between the pilot and data signal can ensure the best covert performance of D2D communication, but it damages the reliability of D2D communication.
  • To ensure both communication covertness and reliability, we aim to maximize the ECT of D2D pairs and construct a joint optimization problem for the pilot transmission power, data transmission power, and packet length. Furthermore, we propose a 2D numerical search algorithm to obtain the optimal solution of the established optimization problem. The simulation results demonstrate that compared with the scheme of the equal power transmission for the pilot and data, under the general model, the transmission performance of the system has been improved to a certain extent while ensuring covertness.
The remaining parts of this paper are organized as follows. Section 2 introduces the system model and analyzes the channel estimation process for covert D2D communication. Section 3 analyzes the covertness performance to demonstrate the influencing factors of communication covertness. Section 4 puts forward the optimization scheme and analyzes the performance of the communication system. We conduct numerical simulations and analyze the results in Section 5. Finally, the conclusion is drawn in Section 6.

2. System Model

As shown in Figure 1, we consider a D2D-based IoT State monitoring communication model, which consists of the base station, multiple CUEs, multiple D2D pairs and a warden (Willie). The spectrum resources occupied by CUEs are uniformly allocated by the base station and are mutually orthogonal. The model assumes that the frequency spectrum resources occupied by each CUE can only be reused by one D2D pair and the CUE do not interfere with each other. In this system model, DT (D2D transmitter) periodically generates the node monitoring information and tries to send it to the DR (D2D receiver), while Willie keeps monitoring whether information is being transferred between D2D pairs. Once the warden detects the transmission of information between D2D pairs, it may take steps to block or eavesdrop on the transmission.
In this system model, the D2D pair transmits information with short packets, and their structure is shown in Figure 2. The D2D channel is modeled as the quasi-static Rayleigh fading, and the channel coefficient is constant in one slot, and changes independently between slots. Before decoding, the DR must perform the channel estimation to accurately obtain the CSI. DT transmits L symbols to DR within a time slot, where the first L p symbols are pilot symbols for channel estimation from DT to DR, and the remaining L d = L L p symbols are data symbols. We also assume that Willie does not know the pilot sequence and the information codebook, and the D2D pair shares the secret sequence to randomly arrange the transmitted pilot and data symbols [7,24].
The channel between any two users i and j is labeled h i j , and the subscripts can be c r , c w , t r and t w , corresponding to the CUE-DR, CUE-Willie, DT-DR and DT-Willie channels, respectively. The additive white Gaussian noise of the DR, Willie and base station are denoted as n r l , n w l and n b l , respectively, and n r l C N 0 , σ r 2 , n w l C N 0 , σ w 2 and n b l C N 0 , σ b 2 . Supposing h t r C N 0 , β t r is a zero mean cyclic symmetric complex Gaussian random variable with variance E h t r 2 = β t r .

2.1. Channel Estimation Modeling

It is assumed that the D2D receiver uses the Minimum Mean Square Error (MMSE) estimator when performing channel estimation. The actual fading coefficient of the channel can be expressed as the sum of the estimated channel and the estimated error [27], which are denoted by h ^ t r and h ˜ t r , respectively [26], i.e.,
h t r = h ^ t r + h ˜ t r
and
h ˜ t r C N 0 , β t r σ r 2 β t r L p P p + σ r 2
where P p represents the average power of the pilot signal. For convenience of expression, the variance of the estimated channel and error are denoted as β ^ t r and β ˜ t r , respectively, and the variance of the channel from CUE to DR is denoted as β c r .
In the decoding stage, the signal vector at DR can be expressed as:
y r d l = P d h ^ t r x d l + P d h ˜ t r x d l + P c h c r x c l + n r l
where P d represents the average power of data symbols, P c is the transmission power of CUEs, and x d C 1 × L d and x c C 1 × L d represent data symbols and CUE transmission signals, respectively. The SINR of DR can be expressed as:
γ = Δ P d β ^ t r σ r 2 + P c β c r + P d β ˜ t r = P d β t r 2 L p P p ζ r 2 + P d β t r ζ r + ζ r β t r L p P p
In order to simplify the expression, ζ r = σ r 2 + P c β c r , μ denotes the power fraction allocated to data in the total power, and the power fraction allocated to pilot symbols is denoted as 1 μ , which is specifically expressed as [23]:
P d L d = μ PL , P p L p = ( 1 μ ) PL , 0 < μ < 1
where P represents the average power of all transmitted signals. Therefore, substituting (5) into (4), the SINR of DR can be further expressed as:
γ = β t r 2 μ ( 1 μ ) P L L L p ζ r ζ r P L + μ β t r L L p + β t r ( 1 μ )
In the process of channel estimation, considering its cost, the effective SINR of a single channel is
γ d = L L p L × γ = β t r 2 μ ( 1 μ ) P ( σ r 2 + P c β c r ) σ r 2 + P c β c r P L + μ β t r L L p + β t r ( 1 μ )

2.2. Communication Link Quality Assessment

In the D2D communication underlying cellular networks, the CUEs and D2D users sharing the same channel interfere with each other. To ensure the basic communication requirements, the SINR of the D2D link and cellular link must meet certain constraints. It is assumed that each D2D pair multiplexes, at most, one orthogonal frequency Resource Block (RB). At the same time, each RB can be reused by a D2D pair. The SINR and its restrictions for cellular users and D2D users are shown, as follows [10]:
S I N R j c = P j c h c b 2 P i d h t i b 2 + σ b 2 , S I N R j c S I N R min c
S I N R i d = P i d h c r 2 P j c h t j r 2 + σ r 2 , S I N R i d S I N R min d
where P j c represents the transmission power of the j-th cellular user, P i d represents the transmission power of the i-th cellular user, S I N R min c and S I N R min d represent the minimum signal to the interference plus noise power ratio (SINR) of the cellular user’s link and D2D user, respectively. In this paper, the links’ quality constraints for D2D users are mainly reflected in the average bit error rate (ABER) of the receiver, which will be introduced below.

3. Covert Performance Analysis

3.1. Willie’s Detection Strategy

The signal received by Willie can be expressed as:
y w l = P c h c w x c l + n w l , H 0 P c h c w x c l + P d h t w x d l + n w l , H 1
where the channel parameter h a b is a zero-mean cyclic symmetric complex Gaussian random variable, and h a b C N 0 , β a b , where a b t r , t b , t w , c r , c b , c w . x c l and x d l , respectively, represent normalized signals transmitted by cellular users and D2D transmitters and satisfy E x l x H l = 1 , where l = 1 , 2 , 3 , represents the channel use index, n w l represents AWGN at the node w, subject to distribution n w l C N 0 , σ w 2 , and σ w 2 is Willie’s noise power.
Willie’s detection error probability can be expressed as
ξ P F A + P M D
where
P M D = Δ Pr D 0 H 1 , P F A = Δ Pr D 1 H 0
P M D is the missed detection probability and P F A is the false alarm probability. To ensure covert communication, Willie’s detection error probability must be constrained by certain conditions, namely, ξ * 1 ε , where ε 0 , 1 represents the detection probability tolerated by covert constraints.
Willie makes a binary decision based on the received signal. According to the Neyman–Pearson criterion, Willie’s optimal decision rule is the likelihood ratio detection (LRT), and the mathematical expression is as follows [27,28]:
T y w = P 1 f y w l H 1 P 0 f y w l H 0 D 0 D 1 1
Under the condition of H 0 , Willie’s received signal vector only depends on AWGN. Let ζ w = σ w 2 + P c β c w and the likelihood function of the received signal y w be:
f y w l H 0 = 1 π ζ w L exp l = 1 L y w l 2 / l = 1 L y w l 2 ζ w ζ w
y w l represents the l-th channel use of y w . Under the condition of H 1 , Willie’s received signal vector can be written as:
y w = y w 1 , , y w L p , y w L p + 1 , , y w L
The first L p symbols are composed of DT transmitting pilot symbols and AWGN, and the last L d symbols are composed of DT transmitting data symbols and AWGN.
Therefore, the likelihood function of the received signal y w under the H 1 condition is:
f y w l H 1 = l = 1 L p f y w l l = L p + 1 L f y w l = 1 π ( P p β t w + ζ w ) L p e l = 1 L p y w l 2 P p β t w + ζ w × 1 π ( P d β t w + ζ w ) L L p e l = L p + 1 L y w l 2 P d β t w + ζ w

3.2. Covert Constraints

By observing (15) and (16), we note that it is complicated to calculate the detection error probability directly through the likelihood function. We use the total variation of Willie’s observed signal probability under different conditions to calculate the lower bound of the error detection, and thus approach the optimal detection error probability [21,23]:
ξ * 1 V T ( P 1 P 0 )
It is not practical to use total variables when the observations are vectors and the metric parameters are products of probabilities. From the Pinsker inequality V T ( P 1 P 0 ) 1 2 D ( P 1 P 0 ) , a lower bound of the detection error probability is obtained [13,21], i.e.,
ξ * 1 D ( P 0 P 1 ) / 2
where D ( P 0 P 1 ) is the Kullback–Leibler (KL) divergence from P 0 to P 1 . Thus, the covert constraint can be rewritten as D ( P 0 P 1 ) 2 ε 2 . The KL divergence of this system can be calculated as [24]:
D ( P 0 P 1 ) = L p ln ( 1 + P p ζ w ) P p P p ζ w ζ w 1 + P p h t w 2 P p h t w 2 ζ w ζ w + L d ln ( 1 + P d ζ w ) P d P d ζ w ζ w 1 + P d P d ζ w ζ w = a 1 μ L P L p μ 1 L P L p ζ w + L d ln ( 1 + μ L P L d ζ w ) μ L P μ L P + L d ζ w + L p ln 1 + 1 μ L P L p ζ w
= a indicates that relevant variables are substituted into the formula and obtained through a series of simple algebraic operations.
Next, the influencing factors of the KL divergence are analyzed and discussed in Equation (19). Firstly, the first derivative of the D ( P 0 P 1 ) , with respect to the μ , is calculated as:
D ( P 0 P 1 ) μ = L 2 L μ L d L 2 P β t w 2 μ 2 L 2 P β t w 2 μ + L p L d ζ w 2 μ L P β t w + L d ζ w 2 2 μ 1 L P β t w L p ζ w 2
Let D ( P 0 P 1 ) D ( P 0 P 1 ) μ μ = 0 obtain the three possible values:
μ 1 = L d L d L L
μ 2 = 1 2 P β t w 2 L 2 4 L p L d ζ w 2 2 P β t w L
μ 3 = 1 2 + P β t w 2 L 2 4 L p L d ζ w 2 2 P β t w L
Since L p L d = L p ( L L p ) , and L d , L p are positive integers, L d L p obtains the minimum L 1 when L p = 1 or L d = 1 , and when L p = L d or L p L d = 1 , L d L p takes the maximum L 2 L 2 4 4 or ( L 2 1 ) ( L 2 1 ) 4 4 . Therefore, when P β t w 2 L 2 4 L 1 ζ w 2 < 0 , That is P L β t w < 2 L 1 ζ w ; at this time, μ 2 , μ 3 are both complex numbers, and it is not advisable. μ * = μ 1 = L d L d L L . When P β t w 2 L 2 L 2 ζ w 2 > 0 , that is, P β t w > ζ w , the transmission power must be higher than the equivalent noise power, which is contrary to the original intention of covert communication, and the energy of the application scenario is limited. Therefore, based on the above analysis, the best value of μ is μ * = L d L d L L . Moreover, because L p P p = ( 1 μ ) L P , L d P d = μ L P , we can obtain P p = P d = P [23].
When the condition P L β t w < 2 L 1 ζ w is satisfied, L 2 P β t w 2 μ 2 L 2 P β t w 2 μ + L p L d ζ w 2 in (20) is greater than 0. Therefore, D ( P 0 P 1 ) D ( P 0 P 1 ) μ μ < 0 when μ < μ 1 and D ( P 0 P 1 ) D ( P 0 P 1 ) μ μ > 0 when μ > μ 1 . Thus, we obtain that μ 1 is the optimal solution that minimizes D ( P 0 P 1 ) .
Therefore, when P L β t w < 2 L 1 ζ w , the minimum value of the KL divergence D ( P 0 P 1 ) can be obtained when pilot and data symbols are transmitted with equal power; that is, the maximum lower bound of the Willie detection error probability can be realized. Simultaneously, P L β t w < 2 L 1 ζ w indicates that this condition limits the total transmission power of the D2D communication system, and the value is related to the product of the packet length square root and interference noise, which is the key to ensure the optimal communication covertness of the D2D pair.
Therefore, when analyzing the D2D covert communication system based on channel estimation, we first consider optimizing the packet length to maximize the system performance under the condition of equal power transmission.

4. Communication Performance Analysis

4.1. D2D Receiver Error Packet Rate

Because the packet length of DT is limited, the decoding error is inevitable on the receiver. For the short packet communication with an encoding rate of R (nits /channel use), the packet error rate of DR can be expressed as [21,23]:
δ = Q L d ln 1 + γ d R 1 1 γ d + 1 2 = Q L d 1 + γ d ln 1 + γ d R γ d γ d + 2
where γ d represents the effective received SINR of DR, the encoding rate R = D D L d L d , and D is the information content of a single packet. For fading channels, the packet error rate varies with the channel coefficient. Therefore, the average packet error rate of DR can be used to characterize its receiving performance [23]:
E γ d δ = 0 Q L d 1 + γ d ln 1 + γ d R γ d γ d + 2 f γ d x d x
where Q x = x 1 2 π exp t 2 2 d t and f γ d x is the probability density function of SINR at the receiver of D2D. The expression of the packet error rate based on the Gaussian Q function can be approximately rewritten as [25,27]:
δ = Q L d ln 1 + γ d R 1 1 γ d + 1 2 = Q L d 1 + γ d ln 1 + γ d R γ d γ d + 2 1 , γ d < ϑ + 1 2 φ φ ( γ d ϑ ) + 1 2 , ϑ + 1 2 φ γ d ϑ 1 2 φ 0 , γ d > ϑ 1 2 φ
Among them, φ = L d L d 2 π exp 2 R 1 2 π exp 2 R 1 , and ϑ = exp ( R ) 1 . The average error packet rate of the D2D receiver can be obtained by the following theorem.
Theorem 1.
For the D2D pair short packet communication with an encoding rate of R, the average decoding error rate of the D2D receiver (DR) is:
E γ d δ = 1 φ γ ¯ d exp ( 2 φ ϑ 1 2 φ γ ¯ d ) exp ( 2 φ ϑ + 1 2 φ γ ¯ d )
Proof. 
The approximate expression of Q function is substituted into Formula (25) to obtain
E γ d δ = 0 ϑ + 1 2 φ f γ d x d x + ϑ + 1 2 φ ϑ 1 2 φ φ ( x ϑ ) + 1 2 f γ d x d x = Ξ + F γ d ϑ + 1 2 φ F γ d 0 + 1 2 φ ϑ F γ d ϑ 1 2 φ F γ d ϑ + 1 2 φ
where Ξ = ϑ + 1 2 φ ϑ 1 2 φ φ x f γ d x d x , F γ d x = 1 exp ( x x γ d γ d ) represents the Cumulative Distribution Function (CDF) of SINR at the D2D receiver. According to the antiderivative x e p x d x = e p x ( x x p 1 1 p 2 p 2 p 1 1 p 2 p 2 ) , we can obtain
Ξ = ϑ + 1 2 φ ϑ 1 2 φ φ x f γ d x d x = ϑ + 1 2 φ ϑ 1 2 φ x γ ¯ d x exp x γ ¯ d d x = φ exp 2 φ γ ¯ d 1 2 φ γ ¯ d γ ¯ d ϑ + 1 2 φ φ exp 2 φ γ ¯ d + 1 2 φ γ ¯ d γ ¯ d ϑ 1 2 φ
Substitute the expression (29) into the expression (28) to obtain the proof.    □

4.2. Effective Covert Throughput

Considering covert constraints and decoding errors comprehensively, the D2D’s effective covert throughput (ECT) of the D2D receiver (DR) is defined as [28,29]:
η ¯ c = ( L L p ) R 1 E γ d δ
Its physical meaning is the average information transmitted reliably by the D2D pair in a single time slot under the condition of the average covert constraint, and γ d represents the average SINR of the D2D receiver. The optimization problem to maximize the effective covert throughput of the system can be modeled as:
P : max η ¯ c s . t . ξ * 1 ε
Since the covert communication rate is a small value, φ = L d L d 2 π exp 2 R 1 2 π exp 2 R 1 L d L d 2 π D 2 π D and ϑ = exp ( R ) 1 R = D D L L d . When the independent variable x is small enough, exp ( x ) 1 x + x 2 x 2 2 2 , the correct receiving probability of DR can be simplified, as follows [30].
1 E γ d δ = φ γ ¯ d exp ( 2 φ ϑ 1 2 φ γ ¯ d ) exp ( 2 φ ϑ + 1 2 φ γ ¯ d ) = 1 D L d γ ¯ d 1 π D L d γ ¯ d
Therefore, the optimization problem to maximize the effective covert throughput of the system can be simplified as:
η ¯ c = D 1 D L d γ ¯ d 1 π D L d γ ¯ d
In order to solve the above optimization problems, we first consider the problem of covert constraints.
(1) When P p = P d = P , according to the above analysis, Willie’s KL divergence D ( P 0 P 1 ) can be minimized when pilot and data symbols are transmitted with the same power; that is, the maximum lower bound of Willie’s detection error rate can be obtained. In this case, the optimization problem of the D2D receiver to maximize the effective covert throughput can be written as:
P 1 : max L p , P η ¯ c s . t . C 1 : ξ * 1 ε C 2 : SINR j c SINR min c C 3 : L p + L d = L , L p = 1 , 2 , L 1
In the objective function, the transmission power P of the D2D pair and pilot symbol number L p are optimization variables. Constraint C 1 represents the constraint condition of the D2D communication covertness, constraint C 2 represents the SINR of the CUE communication link meeting the minimum requirement, constraint C 3 represents the constraint the total number of channels uses and is assigned to the pilot signal as an integer.
Firstly, we analyze Willie’s minimum detection error probability. When P p = P d = P , Willie’s optimal detection threshold, false alarm probability, missed detection probability and minimum detection error probability can be obtained by the following theorem, according to the LRT judgment result.
Theorem 2.
Willie’s LRT in a single time slot can be equivalent to energy detection, and the optimal detection threshold that minimizes Willie’s error detection probability and Willie’s false alarm probability and missed detection probability under the condition of an optimal detection threshold are expressed as:
τ * = ζ w P ( ζ w + P β t w ) ln 1 + P β t w ζ w
P F A = 1 γ ( L , L τ * L τ * ζ w ζ w ) Γ ( L )
P M D = γ ( L , L τ * L τ * ( P β t w + ζ w ) ( P β t w + ζ w ) ) Γ ( L )
In the formula, Γ ( L ) = ( L 1 ) ! is the complete gamma function, and γ ( L , x ) = 0 x e t t L 1 d t is the lower incomplete gamma function.
Proof. 
When P p = P d = P , there is the Likelihood Ratio Test (LRT) test development, as follows:
T y w = f y w l H 1 f y w l H 0 = ζ w P p β t w + ζ w L exp l = 1 L y w l 2 ζ w l = 1 L y w l 2 P β t w + ζ w = ζ w P p β t w + ζ w L exp P β t w ζ w P β t w + ζ w l = 1 L y w l 2 D 0 D 1 1
A logarithm of both sides of the test formula is taken at the same time to obtain:
ln T y w = L ln ζ w P p β t w + ζ w + P β t w ζ w P β t w + ζ w l = 1 L y w l 2 D 0 D 1 0
Therefore, Willie’s likelihood ratio detection is equivalent to the following energy detection:
Λ y w = 1 L l = 1 L y w l 2 D 0 D 1 ζ w P β t w P β t w + ζ w ln P p β t w + ζ w ζ w
Λ y w is the average symbol power received by Willie on a single channel use, and the right side of the decision is Willie’s optimal detection threshold, represented by symbol τ * .
Since f y w l H 0 C N 0 , ζ w , f y w l H 1 C N 0 , ζ w + P β t w , and Λ y w is a chi-square distribution with degrees of freedom as 2 L , according to relevant literature, definitions of the false alarm, and missed detection probabilities, Willie’s false alarm and missed detection probabilities under τ * are:
P F A = 1 γ ( L , L τ * L τ * ζ w ζ w ) Γ ( L ) , P M D = γ ( L , L τ * L τ * ( P β t w + ζ w ) ( P β t w + ζ w ) ) Γ ( L )
   □
The minimum detection error rate of Willie is:
ξ * = 1 γ ( L , L τ * L τ * ζ w ζ w ) Γ ( L ) + γ ( L , L τ * L τ * ( P β t w + ζ w ) ( P β t w + ζ w ) ) Γ ( L )
It can be observed from the expression that under P p = P d = P , the detection error probability of Willie is determined by the total number of packet lengths L, and is independent of L p and L d .
Then, consider the maximum covert throughput η ¯ c of the D2D communication system,
η ¯ c = D ( L L P ) L d φ γ d exp ( 2 φ ϑ 1 2 φ γ d ) exp ( 2 φ ϑ + 1 2 φ γ d )
When pilot and data symbols are sent at an equal power, SINR at the receiver of D2D is
γ ¯ d = β t r 2 μ ( 1 μ ) P L L L p ( σ r 2 + P c β c r ) σ r 2 + P c β c r P L + μ β t r L L p + β t r ( 1 μ ) = β t r 2 P 2 L p ( σ r 2 + P c β c r ) σ r 2 + P c β c r + P β t r ( L p + 1 )
1 D L d γ ¯ d = 1 D ( σ r 2 + P c β c r ) σ r 2 + P c β c r + P β t r ( L p + 1 ) L d β t r 2 P 2 L p
η ¯ c L p = D P β t r D ζ r 2 L P β t r L p 2 + D L ζ r 2 ( ζ r 2 + P β t r ) L 2 β t r 2 P L p 2
In the formula, ζ r 2 = σ r 2 + P c β c r , it can be observed that the molecular formula is a quadratic term of one unary; η ¯ c η ¯ c L p L p = 0 has two real roots, one positive and one negative. The channel use of the pilot symbols is a positive integer; thus, the solution of L p can be obtained as follows:
L p = ζ r 2 ( ζ r 2 + P * β t r ) P * β t r L P * β t r D ζ r 2
L p is a positive integer. Therefore, when P p = P d = P , the optimal pilot symbol number L p of the D2D receiver to maximize ECT can be expressed as:
L p * = L p c e i l , i f η ¯ c c e i l η ¯ c f l o o r L p f l o o r , i f η ¯ c f l o o r η ¯ c c e i l
among them
L p c e i l = ζ r 2 ( ζ r 2 + P * β t r ) P * β t r L P * β t r D ζ r 2
L p f l o o r = ζ r 2 ( ζ r 2 + P * β t r ) P * β t r L P * β t r D ζ r 2
In this formula, the symbols ⌈⌉ and ⌊⌋ represent the function of rounding up and down, respectively.
At the same time, the optimal value of the average symbolic power P * can be obtained by the following equation.
1 γ ( L , L τ * L τ * ζ w ζ w ) Γ ( L ) + γ ( L , L τ * L τ * ( P + ζ w ) ( P + ζ w ) ) Γ ( L ) = ε
In the formula, τ * = ζ w P ( ζ w + P ) ln 1 + P ζ w , ε is the covert constraint and given value under general conditions. According to the analysis of the literature, when the covertness requirement is higher, the number of data symbols sent should be reduced, and more pilots are needed to obtain accurate channel information.
(2) When P p P d , the optimization problem to maximize the effective covert throughput of the system can be modeled as:
P 2 : max L p , μ , P η ¯ c s . t . C 1 : ξ * 1 ε C 2 : SINR j c SINR min c C 3 : P d L d = μ P L , P p L p = ( 1 μ ) P L C 4 : L p + L d = L , L p = 1 , 2 , L 1
γ ¯ d represents the average SINR of a D2D pair at the receiving end. In the objective function, the transmission power P of DT and the number of pilot symbols L p are optimization variables. Constraint C 1 represents the constraint condition of communication covertness, constraint C 2 represents the communication link of cellular users meeting the minimum demand, constraint C 3 represents the distribution factor constraint of the total signal power, and constraint C 4 represents the total number of channels and the integer allocated to the pilot signal.
When P p P d , the expression of ξ * in the optimization problem is different from P p = P d . In order to solve the above problems, the latest expression of ξ * should be first derived, and the statistic under H 1 is
T = X 1 + X 2
and
X 1 = 1 L l = 1 L p ( y w l 2 ) = P p + ζ w 2 L χ 2 L p 2
X 2 = 1 L l = L p + 1 L ( y w l 2 ) = P d + ζ w 2 L χ 2 L d 2
χ 2 L p 2 and χ 2 L d 2 are chi-square random variables with degrees of freedom 2 L p and 2 L d , respectively, and their probability density functions are as follows:
f X 1 ( x ) = x L p 1 Γ ( L p ) L P p + ζ w L p e L x P p + ζ w
f X 1 ( x ) = x L p 1 Γ ( L p ) L P p + ζ w L p e L x P p + ζ w
The likelihood function of T under H 1 is [23]:
f T H 1 ( t ) = L L t L 1 P p + ζ w L p P d + ζ w L d Γ ( L ) e L t P p + ζ w × 1 F 1 L p ; L ; L t ( P p P d ) P p + ζ w P d + ζ w
where 1 F 1 a ; b ; c represents the first kind of confluent hypergeometric function and is the degenerate form of the hypergeometric function 2 F 1 a ; b ; c ; 2 F 1 a ; b ; c is the solution of the confluent hypergeometric differential equation. The confluence hypergeometric function can be expressed as the following hypergeometric number.
1 F 1 a ; b ; c = 1 + a b z + a ( a + 1 ) b ( b + 1 ) z 2 2 ! + + k = 0 a k b k z k k !
a k and b k are Pochhammer symbols. It can be observed that due to the complexity of the expression, it is difficult to directly derive the closed expression of Willie’s detection error probability. In order to achieve the goal of maximizing the effective covert throughput under covert conditions effectively, according to the analysis of [24] and combined with the actual situation of D2D communication scenarios, for P p P d , the optimal detection threshold that minimizes the Willie detection error probability can be approximately expressed as:
τ * = ζ w ( P p + ζ w ) P p × W 1 , P p L P p + ζ w Γ L Γ L p 1 1 L L e P d + ζ w P p + ζ w
The minimum error probability ξ * is
ξ * = 1 γ ( L , L τ * L τ * ζ w ζ w ) Γ ( L ) + γ ( L p , L τ * P ζ w L τ * P ζ w ( P + ζ w ) ( P + ζ w ) ) Γ ( L )
where W z is the Lambert W function and represents the solution t of the equation x = t e t .
The above process approximates the packet length to a large enough number. However, in reality, the packet length may not be large under the condition of short packet communication, but the minimum detection error probability obtained by this approximation can be the lower bound of the minimum detection error probability. Therefore, the optimization problem can be solved directly by 2D (2-Dimension) numerical search algorithm (Algorithm 1) under the P p P d condition. In the numerical search, send power P is placed in the outermost layer of the cycle. For any P, according to the constraints (52), the relationship between L p and μ is found, represented by μ as a function of L p , and L p is searched within the range of 1 L p L 1 to maximize the objective function. The specific implementation of this search algorithm is shown in the table.
Algorithm 1 The 2D search algorithm for maximizing throughput
1:
Input: the sets of D2D pairs average transmit power and channel allocation factors P and U .
2:
Output: the matching result, M .
3:
Initialization: packet length L, L p , receiver noise σ w 2 , σ b 2 , σ r 2 , and channel coefficient β t r .
 
4:
   For any given P , according to the Formula (52), let L p be expressed as the function of μ , obtain the μ and L p which maximize η ¯ c ;
5:
   Put P, μ and L p into η ¯ c and obtain η ¯ c .
6:
End for
7:
   Find the maximum value of all η ¯ c , and obtain the corresponding μ * and P * as the global optimal solution.
8:
Return:

5. Simulation Results and Analysis

Next, we will verify the above results by numerical simulation, and observe the influence of different parameters on channel estimation in the D2D covert communication system. In the model considered, the coverage radius of the cellular user cell is 1000 meters without a special description. The specific parameter settings are shown in the Table 1. The communication distance of the D2D pair is 30 meters, and its transmission power range is 17∼23 dBm; the distance between CUEs and BS is 50 meters, and the distance between the D2D transmitter and the CUE and the Willie are 80 meters, respectively. The distance between the D2D transmitter and BS is 100 meters, and the distance between the CUE and the D2D receiver is 150 meters; the user’s minimum SINR requirement is 0∼10 dB; the noise power of Willie and D2D receivers are set as σ w 2 = σ r 2 = 80 dBm [10,24].
In order to verify that the equal power transmission strategy of the pilot and data can achieve the best covertness of D2D communication, Willie’s detection performance must be the worst. Figure 3 shows the trend diagram of the variation of the Willie detection error probability with distribution parameters under different L p . As can be observed from the figure, with the increase in allocation parameter, the detection error probability of Willie first increases and then decreases, reaching the maximum value at μ = L d / L . It can be observed that the equal power transmission strategy can maximize the detection error probability of Willie. Therefore, equal-power transmission is the best scheme if only the communication covert performance is considered.
Figure 3 shows the minimum detection error probability ξ * achieved by the two methods, namely the lower bound on ξ * determined by KL divergence and the likelihood ratio test. As can be observed from the figure, the variation trends obtained by the two methods are consistent, and despite some differences, the maximum value of ξ * is obtained at the same μ . This indicates that P d = P p can maximize the actual detection error probability; namely, the equal-power transmission strategy can indeed minimize the detection performance of Willie. In addition, we can also observe from the figure that when the allocation parameter and packet length are fixed, the detection error probability also increases with the increase in the pilot packet length. It can be concluded that when the covert requirement is high, it can be achieved by increasing the pilot packet length.
Figure 4 describes the change of the D2D communication covert throughput with the number of pilot symbols under the condition of the equal power transmission of the pilot and data. As can be observed from the figure, there exists an optimal value L p * on the curve that maximizes the covert throughput η c . At the same time, it can be observed that with the increase in the transmission power of the D2D transmitter, the covert throughput of the D2D pair also increases, but the covertness of the communication decreases correspondingly. It can be observed that in order to achieve high communication covertness, a certain communication performance needs to be sacrificed.
In Figure 5, we compare the variation curves of the average error packet rate of the D2D receiver versus the SINR of the D2D receiver at different coding rates R. Firstly, it is observed that the average error packet rate decreases with the increase in the SINR of the D2D receiver when the encoding rate R is fixed. In the case of the fixed SINR, the larger the encoding rate of the short packet communication, the larger the average packet error rate of the D2D receiver. It is not difficult to explain. When the SINR of the D2D receiver is large, it means that it is less affected by noise and has a strong anti-interference ability; thus, the average error packet rate is relatively low. At the same time, with the same SINR, the higher the encoding rate is, the more packets are received, and the higher the error packet rate is, naturally. Therefore, in order to ensure that the packet error rate of the D2D receiver is controlled within a certain range, the SINR of the receiver must be guaranteed to reach a certain threshold, which is consistent with the conclusion of the theoretical analysis.
Figure 6 mainly shows the influence of the change of transmission power P on the covert throughput η c of the D2D communication system when the package length of the pilot is L p = 10 , 20 , 30 , L = 100 . It can be observed that with the increase in the power of the transmitter, the ECT of the system increases and remains unchanged after reaching a certain value. This is because with the continuous increase in the D2D transmission power, on the one hand, it will cause serious interference to the communication link of the cellular network and reduce the communication quality of cellular users. On the other hand, the increase in transmission power also leads to an increase in the risk of being detected by Willie, which reduces ECT at the D2D receiver. In addition, the pilot symbols L p also have a significant impact on η c . Under the same transmission power condition, the larger the pilot packet length, the smaller the throughput. This is because pilots take up more packet length, which will inevitably lead to less data transfer in the case of limited packet length. The above analysis indirectly verifies the conclusion of Figure 4.
Figure 7 and Figure 8 mainly show the comparison graphs of the SINR and ECT of the D2D receiver obtained by an equal-power transmission strategy and joint optimization method. As can be observed from the figure, compared with the equal-power transmission scheme, the transmission performance of the non-equal-power transmission scheme has been significantly improved, because the non-equal-power transmission scheme can not only optimize the power allocation of pilot and data symbols, but also optimize the packet length allocation scheme. In the equal-power transmission scheme, in order to ensure a better system covertness, some effective SINRs and communication throughputs of the system are sacrificed. That also verifies the trade-off between the communication covertness and reliability proposed in this paper.
By observing Figure 7 and Figure 8, it can be found that with the increase in transmission power, the SINR and ECT of the system first demonstrate an upward trend, and then remain unchanged or decline after reaching a certain value, which is caused by the restriction of the communication quality of the cellular link.

6. Conclusions

In this work, the traditional MMSE channel estimation is applied to D2D covert communication scenario, and the resource allocation scheme of the pilot and packet length is studied. Specifically, it is assumed that the D2D pair communication channel and the Willie detection channel are Rayleigh fading channels. Firstly, it is proved that the equal power transmission of the pilot symbol and data symbol can minimize Willie’s detection performance, and, on this basis, the maximum ECT of the D2D communication system is analyzed. However, the transmission performance of the communication system may not be optimal under the condition of the optimal covertness. Then, the joint optimization of the transmission power and channel allocation factor are analyzed to maximize the ECT of the communication system. The simulation results demonstrate that the requirement of covertness is proportional to the number of optimal pilot symbols, which means that when the number of symbols is fixed and the requirement of covertness is high, the number of the pilot needs to be increased to obtain the correct CSI, while the proportion of the data information will inevitably decrease. Under the condition of the jointly optimized power and packet length allocation strategy, the transmission performance of the communication system is obviously better than that of equal power transmission schemes, but the complexity is higher. Therefore, the equal-power transmission strategy achieves a good compromise between the complexity and communication performance, while the joint optimization scheme is the good compromise of the communication covertness and reliability.

Author Contributions

Conceptualization, X.Z. and Y.H.; methodology, X.Z. and J.L.; validation and writing—original draft, X.Z., J.L. and Y.H.; writing—review and editing, X.Z.; supervision, J.L. and Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Science Fund for Excellent Young Scholars under Grant 62122094, Jiangsu Provincial Natural Science Fundation for Excellent Young Scholars under Grant BK20170089, National Natural Science Foundation of China under Grant 61971474, and Beijing Nova Program under Grant Z201100006820121.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ansari, R.I.; Chrysostomou, C.; Hassan, S.A.; Guizani, M.; Mumtaz, S.; Rodriguez, J.; Rodrigues, J.J. 5G D2D networks: Techniques, challenges, and future prospects. IEEE Syst. 2018, 12, 3970–3984. [Google Scholar] [CrossRef]
  2. Salim, M.M.; Wang, D.; Elsayed, H.A.E.A.; Liu, Y.; Abd Elaziz, M. Joint optimization of energy-harvesting-powered two-way relaying D2D communication for IoT: A rate–energy efficiency tradeoff. IEEE Internet Things J. 2020, 7, 11735–11752. [Google Scholar] [CrossRef]
  3. Wu, D.; Zhou, L.; Cai, Y.; Qian, Y. Collaborative caching and matching for D2D content sharing. IEEE Wirel. Commun. 2018, 25, 43–49. [Google Scholar] [CrossRef]
  4. Wu, D.; Zhou, L.; Cai, Y.; Hu, R.Q.; Qian, Y. The role of mobility for D2D communications in LTE-Advanced networks: Energy vs. bandwidth efficiency. IEEE Wirel. Commun. 2014, 21, 66–71. [Google Scholar] [CrossRef]
  5. Yang, W.; Durisi, G.; Koch, T.; Polyanskiy, Y. Quasi-static multiple-antenna fading channels at finite blocklength. IEEE Trans. Inf. Theory 2014, 60, 4232–4265. [Google Scholar] [CrossRef] [Green Version]
  6. Durisi, G.; Koch, T.; Popovski, P. Toward massive, ultrareliable, and low-latency wireless communication with short packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef] [Green Version]
  7. Durisi, G.; Koch, T.; Östman, J.; Polyanskiy, Y.; Yang, W. Short-packet communications over multiple-antenna rayleigh-fading channels. IEEE Trans. Commun. 2016, 64, 618–629. [Google Scholar] [CrossRef]
  8. Lee, B.; Park, S.; Love, D.J.; Ji, H.; Shim, B. Packet structure and receiver design for low latency wireless communications with ultra-short packets. IEEE Trans. Commun. 2018, 66, 796–807. [Google Scholar] [CrossRef]
  9. Tang, A.; Wang, X.; Zhang, C. Cooperative full duplex Device to Device communication underlaying cellular networks. IEEE Trans. Wirel. Commun. 2017, 16, 7800–7815. [Google Scholar] [CrossRef]
  10. Li, J.; Wu, D.; Yue, C.; Yang, Y.; Wang, M.; Yuan, F. Energy-efficient transmit probability-power control for covert D2D communications with age of information constraints. IEEE Trans. Veh. Technol. 2022, 71, 9690–9704. [Google Scholar] [CrossRef]
  11. Jamil, S.; Fawad; Rahman, M.; Ullah, A.; Badnava, S.; Forsat, M.; Mirjavadi, S.S. Malicious UAV detection using integrated audio and visual features for public safety applications. Sensors 2020, 20, 3923. [Google Scholar] [CrossRef] [PubMed]
  12. Bash, B.A.; Goeckel, D.; Towsley, D. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef] [Green Version]
  13. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
  14. Yan, S.; He, B.; Cong, Y.; Zhou, X. Covert communication with finite blocklength in AWGN channels. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  15. Yan, S.; Zhou, X.; Hu, J.; Hanly, S.V. Low probability of detection communication: Opportunities and challenges. IEEE Wirel. Commun. 2019, 26, 19–25. [Google Scholar] [CrossRef] [Green Version]
  16. Wang, L.; Wornell, G.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef] [Green Version]
  17. Wan, C.; Wu, D.; Wang, M.; Shi, X.; Guan, X. Covert communication with power uncertainty for D2D content sharing. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019; pp. 1–6. [Google Scholar]
  18. Rao, H.; Wu, M.; Wang, J.; Tang, W.; Xiao, S.; Li, S. D2D covert communications with safety area. IEEE Syst. J. 2021, 15, 2331–2341. [Google Scholar] [CrossRef]
  19. Jiang, Y.E.; Wang, L.; Zhao, H.; Chen, H.H. Covert communications in D2D underlaying cellular networks with power domain NOMA. IEEE Syst. J. 2020, 14, 3717–3728. [Google Scholar] [CrossRef]
  20. Jiang, Y.; Wang, L.; Chen, H. Covert communications in D2D underlaying cellular networks with antenna array assisted artificial noise transmission. IEEE Trans. Veh. Technol. 2020, 69, 2980–2992. [Google Scholar] [CrossRef]
  21. Yan, S.; He, B.; Zhou, X.; Cong, Y.; Swindlehurst, A.L. Delay-intolerant covert communications with either fixed or random transmit power. IEEE Trans. Inf. Forensics Secur. 2019, 14, 129–140. [Google Scholar] [CrossRef] [Green Version]
  22. Yu, B.; Cai, Y.; Wu, D.; Xiang, Z. Average age of information in Short packet based machine type communication. IEEE Trans. Veh. Technol. 2020, 69, 10306–10319. [Google Scholar] [CrossRef]
  23. Lu, X.; Yang, W.; Yan, S.; Tao, L.; Ng, D.W.K. Joint packet generation and covert communication in delay-intolerant status update systems. IEEE Trans. Veh. Technol. 2022, 71, 2170–2175. [Google Scholar] [CrossRef]
  24. Sun, L.; Xu, T.; Yan, S.; Hu, J.; Yu, X.; Shu, F. On resource allocation in covert wireless communication with channel estimation. IEEE Trans. Commun. 2020, 68, 6456–6469. [Google Scholar] [CrossRef]
  25. Ma, R.; Yang, X.; Pan, G.; Guan, X.; Zhang, Y.; Yang, W. Covert communications with channel inversion power control in the finite blocklength regime. IEEE Wirel. Commun. Lett. 2021, 10, 835–839. [Google Scholar] [CrossRef]
  26. Gursoy, M.C. On the capacity and energy efficiency of training-based transmissions over fading channels. IEEE Trans. Inf. Theory 2009, 55, 4543–4567. [Google Scholar] [CrossRef] [Green Version]
  27. Yang, W.; Lu, X.; Yan, S.; Shu, F.; Li, Z. Age of information for short-packet covert communication. IEEE Wirel. Commun. Lett. 2021, 10, 1890–1894. [Google Scholar] [CrossRef]
  28. Ma, R.; Yang, W.; Tao, L.; Lu, X.; Xiang, Z.; Liu, J. Covert communications with randomly distributed wardens in the finite blocklength regime. IEEE Trans. Veh. Technol. 2022, 71, 533–544. [Google Scholar] [CrossRef]
  29. Ma, R.; Yang, W.; Hu, J.; Lu, X. Covert mmWave communication when the warden locates in the beam direction. IEEE Wirel. Commun. Lett. 2022, 11, 2595–2599. [Google Scholar] [CrossRef]
  30. Lu, X.; Yan, S.; Yang, W.; Li, M.; Ng, D.W.K. Covert communication with time uncertainty in time-critical wireless networks. IEEE Trans. Wirel. Commun. 2023, 22, 1116–1129. [Google Scholar] [CrossRef]
Figure 1. Covert communication system in short packet D2D scenario.
Figure 1. Covert communication system in short packet D2D scenario.
Electronics 12 02822 g001
Figure 2. The structure of transmitting signal.
Figure 2. The structure of transmitting signal.
Electronics 12 02822 g002
Figure 3. The curve of Willie’s minimum detection error probability (DEP) ξ * versus the data power allocation parameter μ for different values of pilot symbols.
Figure 3. The curve of Willie’s minimum detection error probability (DEP) ξ * versus the data power allocation parameter μ for different values of pilot symbols.
Electronics 12 02822 g003
Figure 4. The relationship between the covert throughput η c and pilot symbols L p for different values of transmission power.
Figure 4. The relationship between the covert throughput η c and pilot symbols L p for different values of transmission power.
Electronics 12 02822 g004
Figure 5. The changing curve between D2D ’s receiver SINR γ d and average error packet rate (AEPR) under different given coding rates R.
Figure 5. The changing curve between D2D ’s receiver SINR γ d and average error packet rate (AEPR) under different given coding rates R.
Electronics 12 02822 g005
Figure 6. Under different pilot symbols, the communication covert throughput of D2D pair changes with the transmission power.
Figure 6. Under different pilot symbols, the communication covert throughput of D2D pair changes with the transmission power.
Electronics 12 02822 g006
Figure 7. Comparison graph of SINR of equal-power and joint optimized non-equal-power transmission schemes.
Figure 7. Comparison graph of SINR of equal-power and joint optimized non-equal-power transmission schemes.
Electronics 12 02822 g007
Figure 8. Comparison graph of system throughput between equal-power and jointly optimized non-equal-power transmission schemes.
Figure 8. Comparison graph of system throughput between equal-power and jointly optimized non-equal-power transmission schemes.
Electronics 12 02822 g008
Table 1. Simulation Parameter.
Table 1. Simulation Parameter.
ParameterValue
The minimum distance between CUE and BS30 m
The maximum distance of D2D users50 m
The distance between DT and CUE80 m
The distance between DT and Willie80 m
The distance between CUEs and DR150 m
Cell radius of CUEs1000 m
D2D user’s maximum transmit power24 dBm
The noise power at the receiver of Willie and DR−80 dBm
The user’s minimum SINR0∼10 dB
The transmitted power of CUEs17∼23 dBm
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, X.; Liu, J.; Huang, Y. Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications. Electronics 2023, 12, 2822. https://doi.org/10.3390/electronics12132822

AMA Style

Zhang X, Liu J, Huang Y. Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications. Electronics. 2023; 12(13):2822. https://doi.org/10.3390/electronics12132822

Chicago/Turabian Style

Zhang, Xiaolong, Jie Liu, and Yuzhen Huang. 2023. "Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications" Electronics 12, no. 13: 2822. https://doi.org/10.3390/electronics12132822

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop