Covert Communication in Downlink NOMA Systems With Random Transmit Power

被引:92
作者
Tao, Liwei [1 ]
Yang, Weiwei [1 ]
Yan, Shihao [2 ]
Wu, Dan [1 ]
Guan, Xinrong [1 ]
Chen, Dechuan [3 ,4 ]
机构
[1] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[2] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
[3] Wuhan Zhongyuan Elect Grp Co Ltd, Res & Dev Ctr, Wuhan 430205, Peoples R China
[4] Wuhan Zhongyuan Commun Co Ltd, Wuhan 430205, Peoples R China
基金
中国国家自然科学基金;
关键词
NOMA; Resource management; Error probability; Receivers; Gold; Signal to noise ratio; Downlink; Covert communication; random transmit power; power allocation;
D O I
10.1109/LWC.2020.3011191
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter considers covert communication in downlink NOMA systems, where a public action (communication from Alice to the NOMA-weak user U1) is used to provide a cover for a secret action (communication from Alice to the NOMA-strong user U2). To aid system design, we first derive the detection error probability (DEP) at Willie and the connect outage probabilities (COPs) at U1 and U2. Then, considering the covertness and outage constraints, the optimization of power allocation factor ratio between U1 and U2 is tackled in order to maximize the effective covert rate. The results demonstrate that the minimum DEP is the power allocation factor for U1. In addition, for a given covert constraint, relaxing the outage constraint will effectively increase the maximum effective covert rate within a certain range of the maximum transmit power of U1.
引用
收藏
页码:2000 / 2004
页数:5
相关论文
共 16 条
[1]   Embedding Covert Information in Broadcast Communications [J].
Arumugam, Keerthi Suria Kumar ;
Bloch, Mathieu R. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) :2787-2801
[2]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[3]   Beamforming Design and Power Allocation for Secure Transmission With NOMA [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (05) :2639-2651
[4]  
Furqan H. M., IEEE COMMUN MAG
[5]   Optimal Detection of UAV's Transmission With Beam Sweeping in Covert Wireless Networks [J].
Hu, Jinsong ;
Wu, Yongpeng ;
Chen, Riqing ;
Shu, Feng ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) :1080-1085
[6]   Covert Communication Achieved by a Greedy Relay in Wireless Networks [J].
Hu, Jinsong ;
Yan, Shihao ;
Zhou, Xiangyun ;
Shu, Feng ;
Li, Jun ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4766-4779
[7]   Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges [J].
Islam, S. M. Riazul ;
Avazov, Nurilla ;
Dobre, Octavia A. ;
Kwak, Kyung-Sup .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :721-742
[8]  
Jeffrey A., 2007, TABLE INTEGRALS SERI
[9]  
Kibloff D, 2019, IEEE INT SYMP INFO, P2169, DOI [10.1109/ISIT.2019.8849435, 10.1109/isit.2019.8849435]
[10]   Achieving Covert Wireless Communications Using a Full-Duplex Receiver [J].
Shahzad, Khurram ;
Zhou, Xiangyun ;
Yan, Shihao ;
Hu, Jinsong ;
Shu, Feng ;
Li, Jun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (12) :8517-8530