skip to main content
10.1145/3477314.3507080acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Multi-antenna covert communications in random wireless networks with full-duplex relay

Published:06 May 2022Publication History

ABSTRACT

Covert communication, which protects the existence of wireless transmissions from being detected by a warden, has become a prominent way to ensure wireless communication security. This paper considers a covert communication system, in which a multi-antenna transmitter sends the covert message to a single-antenna receiver via a full-duplex (FD) relay in the presence of multiple randomly located wardens and jammers. To depict the covertness performance of the system, we first provide theoretical model for average detection probability and covert outage probability. We further analyze the worst-case situation where wardens maximize the covert outage probability and derive the optimal detection threshold of wardens. Finally, numerical results are provided to evaluate the performance of the covert communication system.

References

  1. Amr Abdelaziz and C Emre Koksal. 2017. Fundamental limits of covert communication over MIMO AWGN channel. In 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas, NV, USA, 1--9. Google ScholarGoogle ScholarCross RefCross Ref
  2. Boulat A Bash, Dennis Goeckel, and Don Towsley. 2013. Limits of reliable communication with low probability of detection on AWGN channels. IEEE journal on selected areas in communications 31, 9 (Aug. 2013), 1921--1930. Google ScholarGoogle ScholarCross RefCross Ref
  3. Boulat A Bash, Dennis Goeckel, Don Towsley, and Saikat Guha. 2015. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Communications Magazine 53, 12 (Dec. 2015), 26--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, and Phee Lep Yeoh. 2020. Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Transactions on Communications 68, 6 (June 2020), 3737--3749. Google ScholarGoogle ScholarCross RefCross Ref
  5. Biao He, Shihao Yan, Xiangyun Zhou, and Hamid Jafarkhani. 2018. Covert wireless communication with a Poisson field of interferers. IEEE Transactions on Wireless Communications 17, 9 (Sept. 2018), 6005--6017. Google ScholarGoogle ScholarCross RefCross Ref
  6. Biao He, Shihao Yan, Xiangyun Zhou, and Vincent KN Lau. 2017. On covert communication with noise uncertainty. IEEE Communications Letters 21, 4 (April 2017), 941--944. Google ScholarGoogle ScholarCross RefCross Ref
  7. Feng hu, Tingzhen Xu, Jinsong Hu, and Shihao Yan. 2019. Delay-constrained covert communications with a full-duplex receiver. IEEE Wireless Communications Letters 8, 3 (June 2019), 813--816. Google ScholarGoogle ScholarCross RefCross Ref
  8. Jie Hu, Chuang Lin, and Xiangyang Li. 2016. Relationship privacy leakage in network traffics. In 2016 25th International Conference on Computer Communication and Networks (ICCCN). Waikoloa, HI, USA, 1--9. Google ScholarGoogle ScholarCross RefCross Ref
  9. Jinsong Hu, Shihao Yan, Xiangyun Zhou, Feng Shu, Jun Li, and Jiangzhou Wang. 2018. Covert communication achieved by a greedy relay in wireless networks. IEEE Transactions on Wireless Communications 17, 7 (July 2018), 4766--4779. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Erik G Larsson, Ove Edfors, Fredrik Tufvesson, and Thomas L Marzetta. 1990. Power-law shot noise. IEEE communications magazine 36, 6 (Nov. 1990), 1302--1318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Erik G Larsson, Ove Edfors, Fredrik Tufvesson, and Thomas L Marzetta. 2014. Massive MIMO for next generation wireless systems. IEEE communications magazine 52, 2 (Feb. 2014), 186--195. Google ScholarGoogle ScholarCross RefCross Ref
  12. Yiliang Liu, Hsiao-Hwa Chen, and Liangmin Wang. 2016. Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys & Tutorials 19, 1 (Aug. 2016), 347--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Khurram Shahzad, Xiangyun Zhou, Shihao Yan, Jinsong Hu, Feng Shu, and Jun Li. 2018. Achieving covert wireless communications using a full-duplex receiver. IEEE Transactions on Wireless Communications 17, 12 (Nov. 2018), 8517--8530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ori Shmuel, Asaf Cohen, and Omer Gurewitz. 2021. Multi-antenna jamming in covert communication. IEEE Transactions on Communications 69, 7 (July 2021), 4644--4658. Google ScholarGoogle ScholarCross RefCross Ref
  15. Tamara V Sobers, Boulat A Bash, Saikat Guha, Don Towsley, and Dennis Goeckel. 2017. Covert communication in the presence of an uninformed jammer. IEEE Transactions on Wireless Communications 16, 9 (June 2017), 6193--6206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ranran Sun, Bin Yang, Yulong Shen, and Xiaohong Jiang. 2020. On the secrecy capacity of covert communication in full-duplex relay system. In Proceedings of the 1st International Workshop on Physical-Layer Augmented Security for Sensor Systems. 26--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shihao Yan, Xiangyun Zhou, Jinsong Hu, and Stephen V Hanly. 2019. Low probability of detection communication: Opportunities and challenges. IEEE Wireless Communications 26, 5 (Oct. 2019), 19--25. Google ScholarGoogle ScholarCross RefCross Ref
  18. Tong-Xing Zheng, Hui-Ming Wang, Derrick Wing Kwan Ng, and Jinhong Yuan. 2019. Multi-antenna covert communications in random wireless networks. IEEE Transactions on Wireless Communications 18, 3 (March 2019), 1974--1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fengchao Zhu, Feifei Gao, Tao Zhang, Ke Sun, and Minli Yao. 2015. Physical-layer security for full duplex communications with self-interference mitigation. IEEE Transactions on Wireless Communications 15, 1 (Aug. 2015), 329--340. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Multi-antenna covert communications in random wireless networks with full-duplex relay

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing
      April 2022
      2099 pages
      ISBN:9781450387132
      DOI:10.1145/3477314

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 May 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

      Upcoming Conference

      SAC '24
    • Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader