Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations

Tools
- Tools
+ Tools

Cao, Y., Sun, W., Zhao, N., Chen, Yunfei, Yu, R. F. and Nallanathan, A. (2021) Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations. IEEE Transactions on Wireless Communications, 20 (8). pp. 5467-5480. doi:10.1109/TWC.2021.3068096 ISSN 1536-1276.

[img]
Preview
PDF
WRAP-multi-antenna-covert-communication-via-full-duplex-jamming-against-warden-uncertain-locations-Chen-2021.pdf - Accepted Version - Requires a PDF viewer.

Download (1594Kb) | Preview
Official URL: http://dx.doi.org/10.1109/TWC.2021.3068096

Request Changes to record.

Abstract

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the location of warden is uncertain. In this paper, we propose a covert communication scheme against a warden with uncertain locations, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the limit of covert outage probability (the probability of the transmission found by the warden). First, we analyze the monotonicity of the covert outage probability to obtain the optimal location for the warden. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This problem is solved in two stages. First, we derive the transmit-to-jamming power ratio limit from the maximum allowed covert outage probability. With this constraint, the connection probability is maximized over the transmit-to-jamming power ratio for a fixed transmission rate. Since the connection probability and the transmission rate are coupled, the bisection method is applied to maximize the connectivity throughput via optimizing the transmission rate iteratively. Simulation results are presented to evaluate the effectiveness of the proposed scheme.

Item Type: Journal Article
Subjects: Q Science > QA Mathematics
Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Science, Engineering and Medicine > Engineering > Engineering
Library of Congress Subject Headings (LCSH): Data encryption (Computer science), Computer networks -- Security measures, Computer security, Wireless communication systems -- Security measures
Journal or Publication Title: IEEE Transactions on Wireless Communications
Publisher: IEEE
ISSN: 1536-1276
Official Date: August 2021
Dates:
DateEvent
August 2021Published
30 March 2021Available
18 March 2021Accepted
Volume: 20
Number: 8
Page Range: pp. 5467-5480
DOI: 10.1109/TWC.2021.3068096
Status: Peer Reviewed
Publication Status: Published
Reuse Statement (publisher, data, author rights): © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Access rights to Published version: Restricted or Subscription Access
Date of first compliant deposit: 16 June 2022
Date of first compliant Open Access: 16 June 2022
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
2020YFB1807002National Key Research and Development Program of ChinaUNSPECIFIED
61871065[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809
Related URLs:
  • Publisher
  • Other Repository

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us