Feb. 6, 2023, 2:10 a.m. | Shaohan Feng, Xiao Lu, Kun Zhu, Dusit Niyato, Ping Wang

cs.CR updates on arXiv.org arxiv.org

In this paper, we aim to secure the D2D communication of the D2D-underlaid
cellular network by leveraging covert communication to hide its presence from
the vigilant adversary. In particular, there are adversaries aiming to detect
D2D communications based on their received signal powers. To avoid being
detected, the legitimate entity, i.e., D2D-underlaid cellular network, performs
power control so as to hide the presence of the D2D communication. We model the
combat between the adversaries and the legitimate entity as a …

adversaries adversary aim cellular communication communications control covert detect hide network perspective power security signal system

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)