Abstract:
Covert communication is achieved if a transmitter (Alice) sends a message to a legitimate receiver (Bob) without being detected by an attentive warden (Willie). Recent wo...Show MoreMetadata
Abstract:
Covert communication is achieved if a transmitter (Alice) sends a message to a legitimate receiver (Bob) without being detected by an attentive warden (Willie). Recent work has taken an outage approach that considers an infinite blocklength and analyzes the probability that channel conditions are such that communication is reliable and/or covert. Power adaptation via truncated channel inversion (TCI) has been examined in previous work in an attempt to minimize outage under the covertness constraint. However, the optimality of TCI was not established, and the associated parameters in the TCI scheme were only found numerically. We provide the exact optimal power adaptation schemes under different covertness constraints and with different channel models: 1) when the channel between Willie and an uninformed jammer is AWGN; and 2) when the channel is a Rayleigh fading channel. We also examine the performance improvement of these schemes over standard approaches. This establishes that TCI is optimal in some, but not all, scenarios of interest.
Published in: IEEE Transactions on Wireless Communications ( Volume: 19, Issue: 5, May 2020)