Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

被引:0
作者
Chen, Xinying [1 ,2 ]
Chang, Zheng [2 ]
Zhao, Nan [1 ]
Chen, Yunfei [3 ]
Yu, F. Richard [4 ]
Hamalainen, Limo [2 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian 116024, Peoples R China
[2] Univ Jyvaskyla, Fac Informat Technol, POB 35, FIN-40014 Jyvaskyla, Finland
[3] Univ Warwick, Sch Engn, Coventry CV4 7AL, W Midlands, England
[4] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
来源
2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING) | 2021年
关键词
Active warden; artificial jamming; covert communication; full-duplex; low probability of detection;
D O I
10.1109/VTC2021-Spring51267.2021.9448800
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit.First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This problem is solved in two stages. Under this worst situation, we first maximize the connection probability over the transmit-to-jamming power ratio within the maximum allowed COP for a fixed transmission rate. Then, the Newton's method is applied to maximize the connection throughput via optimizing the transmission rate iteratively. Simulation results are presented to evaluate the effectiveness of the proposed scheme.
引用
收藏
页数:6
相关论文
共 10 条
  • [1] Anderson R. J., 1996, P SPRING VERL 1 INT
  • [2] Covert Communication Gains From Adversary's Ignorance of Transmission Time
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8394 - 8405
  • [3] Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1921 - 1930
  • [4] JIANG Y, IEEE T VEH TECHNOL
  • [5] Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
    Lu, Xingbo
    Yang, Weiwei
    Cai, Yueming
    Guan, Xinrong
    [J]. IEEE ACCESS, 2019, 7 : 151295 - 151306
  • [6] Shmuel O, 2019, IEEE INT SYMP INFO, P987, DOI [10.1109/isit.2019.8849607, 10.1109/ISIT.2019.8849607]
  • [7] Delay-Constrained Covert Communications With a Full-Duplex Receiver
    Shu, Feng
    Xu, Tingzhen
    Hu, Jinsong
    Yan, Shihao
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) : 813 - 816
  • [8] Soltani R, 2014, ANN ALLERTON CONF, P1078, DOI 10.1109/ALLERTON.2014.7028575
  • [9] Multi-Antenna Covert Communications in Random Wireless Networks
    Zheng, Tong-Xing
    Wang, Hui-Ming
    Ng, Derrick Wing Kwan
    Yuan, Jinhong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (03) : 1974 - 1987
  • [10] Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications
    Zhou, Xiaobo
    Yan, Shihao
    Hu, Jinsong
    Sun, Jiande
    Li, Jun
    Shu, Feng
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (16) : 4276 - 4290