Covert Transmission With a Self-Sustained Relay

被引:77
作者
Hu, Jinsong [1 ,2 ]
Yan, Shihao [3 ]
Shu, Feng [1 ,2 ]
Wang, Jiangzhou [4 ]
机构
[1] Fuzhou Univ, Coll Phys & Informat, Fuzhou 350116, Fujian, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Jiangsu, Peoples R China
[3] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
[4] Univ Kent, Sch Engn & Digital Arts, Canterbury CT2 7NT, Kent, England
基金
中国国家自然科学基金;
关键词
Covert communications; energy harvesting; relay networks; time switching; power splitting; WIRELESS; COMMUNICATION; INFORMATION; SECRECY; ENERGY; DESIGN; LIMITS;
D O I
10.1109/TWC.2019.2920961
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper examines the passibility, performance limits, and associated costs for a self-sustained relay to transmit its own covert information to a destination on top of forwarding the source's information. Since the source provides energy to the relay for forwarding its information, the source does not allow the relay's covert transmission and to detect it. Considering the time switching (TS) and power splitting (PS) schemes for energy harvesting, where all the harvested energy is used for transmission at the self-sustained relay, we derive the minimum detection error probability xi* at the source based on which we determine the maximum effective covert rate Psi* subject to a given covertness constraint on xi*. Our analysis shows that xi* is the same for the TS and PS schemes, which leads to the fact that the cost of achieving Psi* in both the two schemes in terms of the required increase in the energy conversion efficiency at the relay is the same, although the values of Psi* in these two schemes can be different in specific scenarios. For example, the TS scheme outperforms the PS scheme in terms of achieving a higher Psi* when the transmit power at the source is relatively low. If the covertness constraint is tighter than a specific value, it is the covertness constraint that limits Psi*, and otherwise, it is upper hound on the energy conversion efficiency that limits Psi*.
引用
收藏
页码:4089 / 4102
页数:14
相关论文
共 38 条
[1]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[2]  
[Anonymous], 2016, TRUSTED COMMUNICATIO
[3]   Covert Communication Gains From Adversary's Ignorance of Transmission Time [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) :8394-8405
[4]   Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don ;
Guha, Saikat .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :26-+
[5]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[6]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[7]   Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks [J].
Cai, Chunxiao ;
Cai, Yueming ;
Yang, Weiwei ;
Yang, Wendong .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) :1340-1343
[8]   Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications [J].
Chen, He ;
Li, Yonghui ;
Rebelatto, Joao Luiz ;
Uchoa-Filho, Bartolomeu F. ;
Vucetic, Branka .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (07) :1700-1711
[9]   SECRECY WIRELESS INFORMATION AND POWER TRANSFER: CHALLENGES AND OPPORTUNITIES [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (02) :54-61
[10]   TAS-Based Incremental Hybrid Decode-Amplify-Forward Relaying for Physical Layer Security Enhancement [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Zhu, Wei-Ping .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (09) :3876-3891