Securing probabilistic wireless transmissions against a power-constrained eavesdropper
Author Identifier (ORCID)
Shihao Yan: https://orcid.org/0000-0002-4586-1926
Abstract
This work proposes a framework for safeguarding probabilistic communications from a transmitter Alice to a receiver Bob in the presence of a power-constrained eavesdropper Eve, where Eve awakens with a prior probability λ and employs a detection-and-then-decoding strategy to eavesdrop on Alice's transmissions. We first optimally design Eve's wake-up probability λ and her detection threshold to achieve the maximum overall secrecy outage probability pos* subject to her average power consumption budget. Our analysis proves that the proposed detection-and-then-decoding strategy requires less power to keep Eve consistently awake for eavesdropping compared to a conventional direct-decoding strategy. Subsequently, from the perspective of Alice, the optimal transmit power and redundancy rate are determined to maximize the effective transmission rate subject to the maximum tolerable secrecy outage probability and Alice's maximum transmit power. We explicitly show that the achievable confidentiality 1-pos* is a combination of communication covertness, measured by the probability that Eve fails to detect Alice's transmission, and communication secrecy, measured by the probability that Eve fails to decode Alice's communication. Our results unveil the non-trivial tradeoff between the achieved covertness and secrecy with respect to the power-constrained Eve.
Document Type
Conference Proceeding
Date of Publication
1-1-2025
Publication Title
IEEE International Conference on Communications
Publisher
IEEE
School
School of Science
RAS ID
84819
Funders
Taishan Young Scholar Project of Shandong (tsqn202306158) / National Science Foundation of China (2024HYYQ-054, ZR2021LZH010)
Copyright
subscription content
First Page
6359
Last Page
6364
Comments
Chen, Z., Yan, S., Li, L., Yang, L., Ng, D. W. K., & Schober, R. (2025). Securing probabilistic wireless transmissions against a power-constrained eavesdropper. In ICC 2025-IEEE International Conference on Communications (pp. 6359-6364). IEEE. https://doi.org/10.1109/ICC52391.2025.11160901