
The Library
Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations
Tools
Cao, Y., Sun, W., Zhao, N., Chen, Yunfei, Yu, R. F. and Nallanathan, A. (2021) Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations. IEEE Transactions on Wireless Communications, 20 (8). pp. 5467-5480. doi:10.1109/TWC.2021.3068096 ISSN 1536-1276.
|
PDF
WRAP-multi-antenna-covert-communication-via-full-duplex-jamming-against-warden-uncertain-locations-Chen-2021.pdf - Accepted Version - Requires a PDF viewer. Download (1594Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/TWC.2021.3068096
Abstract
Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the location of warden is uncertain. In this paper, we propose a covert communication scheme against a warden with uncertain locations, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the limit of covert outage probability (the probability of the transmission found by the warden). First, we analyze the monotonicity of the covert outage probability to obtain the optimal location for the warden. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This problem is solved in two stages. First, we derive the transmit-to-jamming power ratio limit from the maximum allowed covert outage probability. With this constraint, the connection probability is maximized over the transmit-to-jamming power ratio for a fixed transmission rate. Since the connection probability and the transmission rate are coupled, the bisection method is applied to maximize the connectivity throughput via optimizing the transmission rate iteratively. Simulation results are presented to evaluate the effectiveness of the proposed scheme.
Item Type: | Journal Article | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
|||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > Engineering | |||||||||
Library of Congress Subject Headings (LCSH): | Data encryption (Computer science), Computer networks -- Security measures, Computer security, Wireless communication systems -- Security measures | |||||||||
Journal or Publication Title: | IEEE Transactions on Wireless Communications | |||||||||
Publisher: | IEEE | |||||||||
ISSN: | 1536-1276 | |||||||||
Official Date: | August 2021 | |||||||||
Dates: |
|
|||||||||
Volume: | 20 | |||||||||
Number: | 8 | |||||||||
Page Range: | pp. 5467-5480 | |||||||||
DOI: | 10.1109/TWC.2021.3068096 | |||||||||
Status: | Peer Reviewed | |||||||||
Publication Status: | Published | |||||||||
Reuse Statement (publisher, data, author rights): | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||
Access rights to Published version: | Restricted or Subscription Access | |||||||||
Date of first compliant deposit: | 16 June 2022 | |||||||||
Date of first compliant Open Access: | 16 June 2022 | |||||||||
RIOXX Funder/Project Grant: |
|
|||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year