Delay-Constrained Covert Communications With a Full-Duplex Receiver

被引:108
作者
Shu, Feng [1 ,2 ]
Xu, Tingzhen [1 ]
Hu, Jinsong [1 ,2 ]
Yan, Shihao [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210000, Jiangsu, Peoples R China
[2] Fuzhou Univ, Coll Phys & Informat, Fuzhou 350116, Fujian, Peoples R China
[3] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
基金
中国国家自然科学基金;
关键词
Covert communication; full-duplex; artificial noise; delay constraint; transmit power;
D O I
10.1109/LWC.2019.2894617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we consider delay-constrained covert communications with the aid of a full-duplex (FD) receiver. Without delay constraints, it has been shown that the transmit power of artificial noise (AN) at the FD receiver should be random in order to enhance covert communications. In this letter, we show that transmitting AN with a fixed power indeed improve covert communications with delay constraints, since in a limited time period the warden cannot exactly learn its received power. This explicitly shows one benefit of considering practical delay constraints in the context of covert communications. We analyze the optimal transmit power of AN for either fixed or globally optimized transmit power of covert information, based on which we also determine the specific condition under which transmitting AN by the FD receiver can aid covert communications and a larger transmit power of AN always leads to better covert communication performance.
引用
收藏
页码:813 / 816
页数:4
相关论文
共 13 条
[1]  
3rd Generation Partnership Project (3GPP), 2017, Technical Report (TR) 38.802
[2]   All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems [J].
Ahmed, Elsayed ;
Eltawil, Ahmed M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (07) :3519-3532
[3]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[4]   Covert Wireless Communication With a Poisson Field of Interferers [J].
He, Biao ;
Yan, Shihao ;
Zhou, Xiangyun ;
Jafarkhani, Hamid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) :6005-6017
[5]   Covert Communication Achieved by a Greedy Relay in Wireless Networks [J].
Hu, Jinsong ;
Yan, Shihao ;
Zhou, Xiangyun ;
Shu, Feng ;
Li, Jun ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4766-4779
[6]  
Li SY, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA)
[7]   A Unified Cross-entropy Based Task Scheduling Algorithm for Heterogeneous Fog Networks [J].
Liu, Zening ;
Yang, Yang ;
Zhou, Ming-Tuo ;
Li, Ziqin .
PROCEEDINGS OF THE FIRST WORKSHOP ON SMART CITIES AND FOG COMPUTING (CITIFOG '18), 2018, :1-6
[8]   Finite Block-Length Analysis of Spectrum Sharing Networks Using Rate Adaptation [J].
Makki, Behrooz ;
Svensson, Tommy ;
Zorzi, Michele .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (08) :2823-2835
[9]   Multi-Hop Routing in Covert Wireless Networks [J].
Sheikholeslami, Azadeh ;
Ghaderi, Majid ;
Towsley, Don ;
Bash, Boulat A. ;
Guha, Saikat ;
Goeckel, Dennis .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :3656-3669
[10]   Short-Packet Downlink Transmission With Non-Orthogonal Multiple Access [J].
Sun, Xiaofang ;
Yan, Shihao ;
Yang, Nan ;
Ding, Zhiguo ;
Shen, Chao ;
Zhong, Zhangdui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4550-4564