Covert Communications: A Comprehensive Survey

被引:75
作者
Chen, Xinying [1 ]
An, Jianping [2 ]
Xiong, Zehui [3 ]
Xing, Chengwen [4 ]
Zhao, Nan [1 ]
Yu, F. Richard [5 ]
Nallanathan, Arumugam [6 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian 116024, Peoples R China
[2] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
[4] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[5] Shenzhen Univ, Shenzhen Key Lab Digital & Intelligent Technol & S, Shenzhen 518060, Peoples R China
[6] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 02期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Security; Uncertainty; Transmitters; Encryption; Communication system security; Fading channels; Working environment noise; Surveys; Covert communication; information hiding; low probability of detection; physical layer security; square root law; UNDERLAYING CELLULAR NETWORKS; PHYSICAL LAYER SECURITY; INVERSION POWER-CONTROL; WIRELESS COMMUNICATION; RESOURCE-ALLOCATION; ARTIFICIAL NOISE; TRANSMIT POWER; HIDING INFORMATION; BEAMFORMING DESIGN; FUNDAMENTAL LIMITS;
D O I
10.1109/COMST.2023.3263921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
引用
收藏
页码:1173 / 1198
页数:26
相关论文
共 220 条
  • [91] A Unified Cross-entropy Based Task Scheduling Algorithm for Heterogeneous Fog Networks
    Liu, Zening
    Yang, Yang
    Zhou, Ming-Tuo
    Li, Ziqin
    [J]. PROCEEDINGS OF THE FIRST WORKSHOP ON SMART CITIES AND FOG COMPUTING (CITIFOG '18), 2018, : 1 - 6
  • [92] Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band
    Liu, Zhihong
    Liu, Jiajia
    Zeng, Yong
    Ma, Jianfeng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3378 - 3388
  • [93] COVERT WIRELESS COMMUNICATIONS IN IOT SYSTEMS: HIDING INFORMATION IN INTERFERENCE
    Liu, Zhihong
    Liu, Jiajia
    Zeng, Yong
    Ma, Jianfeng
    [J]. IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 46 - 52
  • [94] Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks
    Lu, Xiao
    Hossain, Ekram
    Shafique, Taniya
    Feng, Shaohan
    Jiang, Hai
    Niyato, Dusit
    [J]. IEEE NETWORK, 2020, 34 (05): : 148 - 155
  • [95] Short-Packet Covert Communication in Interweave Cognitive Radio Networks
    Lu, Xingbo
    Yan, Shihao
    Yang, Weiwei
    Liu, Chang
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (02) : 2649 - 2654
  • [96] Joint Packet Generation and Covert Communication in Delay-Intolerant Status Update Systems
    Lu, Xingbo
    Yang, Weiwei
    Yan, Shihao
    Tao, Liwei
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (02) : 2170 - 2175
  • [97] Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
    Lu, Xingbo
    Yang, Weiwei
    Cai, Yueming
    Guan, Xinrong
    [J]. IEEE ACCESS, 2019, 7 : 151295 - 151306
  • [98] A Novel Covert Communication Method Based on Bitcoin Transaction
    Luo, Xiangyang
    Zhang, Pei
    Zhang, Mingliang
    Li, Hao
    Cheng, Qingfeng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2830 - 2839
  • [99] Achieving Covert Wireless Communication With a Multi-Antenna Relay
    Lv, Lu
    Li, Zan
    Ding, Haiyang
    Al-Dhahir, Naofal
    Chen, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 760 - 773
  • [100] Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization
    Lv, Lu
    Wu, Qingqing
    Li, Zan
    Ding, Zhiguo
    Al-Dhahir, Naofal
    Chen, Jian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (03) : 1735 - 1750