The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems

被引:0
作者
Qiao, Sen [1 ]
Zhu, Ruizhi [1 ]
Ji, Xiaopeng [1 ]
Zhao, Junjie [1 ]
Ding, Huihui [1 ]
Ferrari, Gianluigi
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Elect & Informat Engn, Nanjing 210044, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
covertcommunication; asymmetric jammer; binary phase shift keying; Taylor series expansion; LOW PROBABILITY; NOISE; ENERGY; LIMITS;
D O I
10.3390/app14020483
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This research investigates the feasibility of covert and reliable communication between Alice and Bob in the presence of a vigilant adversary, Willie, employing a jammer in a complex Gaussian channel. Alice strategically manipulates the noise-power ratio along the real and imaginary axes to disrupt Willie's detection capabilities. Covertness constraints are quantified using KL divergence, and transmission performance is assessed through mutual information. Additionally, an optimization method is introduced to enhance covert communication by fine-tuning the amplitude gain and noise-power ratio. Numerical results confirm the effectiveness and superiority of the proposed method, showcasing its ability to maximize covert transmission rates.
引用
收藏
页数:14
相关论文
共 34 条
  • [1] Abdelaziz Amr, 2017, 2017 IEEE Conference on Communications and Network Security (CNS), P1, DOI 10.1109/CNS.2017.8228657
  • [2] Covert Communication Over a K-User Multiple-Access Channel
    Arumugam, Keerthi Suria Kumar
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) : 7020 - 7044
  • [3] Embedding Covert Information in Broadcast Communications
    Arumugam, Keerthi Suria Kumar
    Bloch, Mathieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2787 - 2801
  • [4] Covert Communication Gains From Adversary's Ignorance of Transmission Time
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8394 - 8405
  • [5] Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 26 - +
  • [6] Quantum-secure covert communication on bosonic channels
    Bash, Boulat A.
    Gheorghe, Andrei H.
    Patel, Monika
    Habif, Jonathan L.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    [J]. NATURE COMMUNICATIONS, 2015, 6
  • [7] Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1921 - 1930
  • [8] Bash BA, 2012, IEEE INT SYMP INFO, P448, DOI 10.1109/ISIT.2012.6284228
  • [9] Covert Communication Over Noisy Channels: A Resolvability Perspective
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) : 2334 - 2354
  • [10] Stable non-Gaussian noise parameter modulation in digital communication
    Cek, M. E.
    Savaci, F. A.
    [J]. ELECTRONICS LETTERS, 2009, 45 (24) : 1256 - 1257