Covert Transmission With a Self-Sustained Relay

被引:72
作者
Hu, Jinsong [1 ,2 ]
Yan, Shihao [3 ]
Shu, Feng [1 ,2 ]
Wang, Jiangzhou [4 ]
机构
[1] Fuzhou Univ, Coll Phys & Informat, Fuzhou 350116, Fujian, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Jiangsu, Peoples R China
[3] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
[4] Univ Kent, Sch Engn & Digital Arts, Canterbury CT2 7NT, Kent, England
基金
中国国家自然科学基金;
关键词
Covert communications; energy harvesting; relay networks; time switching; power splitting; WIRELESS; COMMUNICATION; INFORMATION; SECRECY; ENERGY; DESIGN; LIMITS;
D O I
10.1109/TWC.2019.2920961
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper examines the passibility, performance limits, and associated costs for a self-sustained relay to transmit its own covert information to a destination on top of forwarding the source's information. Since the source provides energy to the relay for forwarding its information, the source does not allow the relay's covert transmission and to detect it. Considering the time switching (TS) and power splitting (PS) schemes for energy harvesting, where all the harvested energy is used for transmission at the self-sustained relay, we derive the minimum detection error probability xi* at the source based on which we determine the maximum effective covert rate Psi* subject to a given covertness constraint on xi*. Our analysis shows that xi* is the same for the TS and PS schemes, which leads to the fact that the cost of achieving Psi* in both the two schemes in terms of the required increase in the energy conversion efficiency at the relay is the same, although the values of Psi* in these two schemes can be different in specific scenarios. For example, the TS scheme outperforms the PS scheme in terms of achieving a higher Psi* when the transmit power at the source is relatively low. If the covertness constraint is tighter than a specific value, it is the covertness constraint that limits Psi*, and otherwise, it is upper hound on the energy conversion efficiency that limits Psi*.
引用
收藏
页码:4089 / 4102
页数:14
相关论文
共 38 条
  • [21] Menezes AJ, 1997, Handbook of Applied Cryptography
  • [22] Relaying Protocols for Wireless Energy Harvesting and Information Processing
    Nasir, Ali A.
    Zhou, Xiangyun
    Durrani, Salman
    Kennedy, Rodney A.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (07) : 3622 - 3636
  • [23] Shahzad K., 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), P1, DOI 10.1109/vtcspring.2017.8108525
  • [24] Achieving Covert Wireless Communications Using a Full-Duplex Receiver
    Shahzad, Khurram
    Zhou, Xiangyun
    Yan, Shihao
    Hu, Jinsong
    Shu, Feng
    Li, Jun
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (12) : 8517 - 8530
  • [25] Multi-Hop Routing in Covert Wireless Networks
    Sheikholeslami, Azadeh
    Ghaderi, Majid
    Towsley, Don
    Bash, Boulat A.
    Guha, Saikat
    Goeckel, Dennis
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) : 3656 - 3669
  • [26] Covert Communication in the Presence of an Uninformed Jammer
    Sobers, Tamara V.
    Bash, Boulat A.
    Guha, Saikat
    Towsley, Don
    Goeckel, Dennis
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (09) : 6193 - 6206
  • [27] Sobers TV, 2015, 2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, P625, DOI 10.1109/ACSSC.2015.7421206
  • [28] Talbot John., 2006, COMPLEXITY CRYPTOGRA
  • [29] Wireless Powered Dense Cellular Networks: How Many Small Cells Do We Need?
    Wang, Lifeng
    Wong, Kai-Kit
    Heath, Robert W., Jr.
    Yuan, Jinhong
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (09) : 2010 - 2024
  • [30] Fundamental Limits of Communication With Low Probability of Detection
    Wang, Ligong
    Wornell, Gregory W.
    Zheng, Lizhong
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (06) : 3493 - 3503