Securing Probabilistic Wireless Transmissions Against a Power-Constrained Eavesdropper

Chen Z, Yan S, Li L, Yang L, Ng DWK, Schober R (2025)


Publication Type: Conference contribution

Publication year: 2025

Journal

Publisher: Institute of Electrical and Electronics Engineers Inc.

Pages Range: 6359-6364

Conference Proceedings Title: IEEE International Conference on Communications

Event location: Montreal, QC, CAN

ISBN: 9798331505219

DOI: 10.1109/ICC52391.2025.11160901

Abstract

This work proposes a framework for safeguarding probabilistic communications from a transmitter Alice to a receiver Bob in the presence of a power-constrained eavesdropper Eve, where Eve awakens with a prior probability λ and employs a detection-and-then-decoding strategy to eavesdrop on Alice's transmissions. We first optimally design Eve's wake-up probability λ and her detection threshold to achieve the maximum overall secrecy outage probability pos* subject to her average power consumption budget. Our analysis proves that the proposed detection-and-then-decoding strategy requires less power to keep Eve consistently awake for eavesdropping compared to a conventional direct-decoding strategy. Subsequently, from the perspective of Alice, the optimal transmit power and redundancy rate are determined to maximize the effective transmission rate subject to the maximum tolerable secrecy outage probability and Alice's maximum transmit power. We explicitly show that the achievable confidentiality 1-pos* is a combination of communication covertness, measured by the probability that Eve fails to detect Alice's transmission, and communication secrecy, measured by the probability that Eve fails to decode Alice's communication. Our results unveil the non-trivial tradeoff between the achieved covertness and secrecy with respect to the power-constrained Eve.

Authors with CRIS profile

Involved external institutions

How to cite

APA:

Chen, Z., Yan, S., Li, L., Yang, L., Ng, D.W.K., & Schober, R. (2025). Securing Probabilistic Wireless Transmissions Against a Power-Constrained Eavesdropper. In Matthew Valenti, David Reed, Melissa Torres (Eds.), IEEE International Conference on Communications (pp. 6359-6364). Montreal, QC, CAN: Institute of Electrical and Electronics Engineers Inc..

MLA:

Chen, Zhilin, et al. "Securing Probabilistic Wireless Transmissions Against a Power-Constrained Eavesdropper." Proceedings of the 2025 IEEE International Conference on Communications, ICC 2025, Montreal, QC, CAN Ed. Matthew Valenti, David Reed, Melissa Torres, Institute of Electrical and Electronics Engineers Inc., 2025. 6359-6364.

BibTeX: Download