Covert Wireless Communication With a Poisson Field of Interferers

被引:119
作者
He, Biao [1 ]
Yan, Shihao [2 ]
Zhou, Xiangyun [3 ]
Jafarkhani, Hamid [1 ]
机构
[1] Univ Calif Irvine, Ctr Pervas Commun & Comp, Irvine, CA 92697 USA
[2] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
[3] Australian Natl Univ, Res Sch Engn, Canberra, ACT 2601, Australia
基金
澳大利亚研究理事会;
关键词
Physical layer security; covert wireless communication; stochastic geometry; signal processing; NETWORK SECRECY; NOISE; PERFORMANCE;
D O I
10.1109/TWC.2018.2854540
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers. Bob and Willie are subject to uncertain shot noise due to the ambient signals from interferers in the network. With the aid of stochastic geometry, we analyze the throughput of the covert communication between Alice and Bob subject to given requirements on the covertness against Willie and the reliability of decoding at Bob. We consider non-fading and fading channels. We analytically obtain interesting findings on the impacts of the density and the transmit power of the concurrent interferers on the covert throughput. That is, the density and the transmit power of the interferers have no impact on the covert throughput as long as the network stays in the interference-limited regime, for both the non-fading and the fading cases. When the interference is sufficiently small and comparable with the receiver noise, the covert throughput increases as the density or the transmit power of the concurrent interferers increases.
引用
收藏
页码:6005 / 6017
页数:13
相关论文
共 44 条
[1]   The Effect of Spatial Interference Correlation and Jamming on Secrecy in Cellular Networks [J].
Ali, Konpal Shaukat ;
ElSawy, Hesham ;
Haenggi, Martin ;
Alouini, Mohamed-Slim .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (04) :530-533
[2]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[3]  
[Anonymous], P IEEE GLOBECOM
[4]  
Arumugam KSK, 2016, IEEE INT SYMP INFO, P2229, DOI 10.1109/ISIT.2016.7541695
[5]   A Mathematical Model for Wideband Ranging [J].
Bartoletti, Stefania ;
Dai, Wenhan ;
Conti, Andrea ;
Win, Moe Z. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (02) :216-228
[6]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[7]  
Bentley J. L., 1976, Information Processing Letters, V5, P82, DOI 10.1016/0020-0190(76)90071-5
[8]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628
[9]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[10]   On the down-link performance of multi-carrier CDMA systems with partial equalization [J].
Conti, Andrea ;
Masini, Barbara ;
Zabini, Flavio ;
Andrisano, Oreste .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (01) :230-239