Robust Power Allocation in Covert Communication: Imperfect CDI

被引:12
作者
Forouzesh, Moslem [1 ]
Azmi, Paeiz [1 ]
Mokari, Nader [1 ]
Goeckel, Dennis [2 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115, Iran
[2] Univ Massachusetts, Elect & Comp Engn Dept, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
Transmitters; Fading channels; Jamming; Uncertainty; Optimization; Resource management; Receivers; Covert communication; uncertain CDI; robust power allocation; WIRELESS COMMUNICATION; OPTIMIZATION; PROBABILITY; INFORMATION;
D O I
10.1109/TVT.2021.3076709
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Previous work has assumed that the distribution of the multipath fading on the channel, which we term the channel distribution information (CDI), is known to Alice, hence facilitating her characterization of Willie's capabilities to detect the signal. However, in practice, Willie tends to be passive and the environment heterogeneous, implying a lack of signaling interchange between the transmitter and Willie makes it difficult if not impossible for Alice to estimate the CDI exactly and provide covertness guarantees. In this paper, we address this issue by developing covert communication schemes for various assumptions on Alice's imperfect CDI: 1) when the transmitter knows the channel distribution is within some distance of a nominal distribution; 2) when only the mean and variance of the channel distribution are available; 3) when Alice knows the channel distribution is complex Gaussian but the variance is unknown. In each case, we formulate new optimization problems to find the power allocations that maximize covert rate subject to a covertness requirement under uncertain CDI. Moreover, Willie may be able to estimate CDI exactly or be faced with an error in estimation, and we investigate two these issues. Numerical results are presented to compare the proposed schemes from various aspects, for attaining desirable covert system performance.
引用
收藏
页码:5789 / 5802
页数:14
相关论文
共 45 条
[1]   Mesh adaptive direct search approach for D2D resource management [J].
Ahmad, Mushtaq ;
Naeem, Muhammad ;
Ahmed, Ashfaq ;
Iqbal, Muhammad ;
Anpalagan, Alagan .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (15) :2329-2339
[2]   Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints [J].
Alavi, Faezeh ;
Yamchi, Nader Mokari ;
Javan, Mohammad R. ;
Cumanan, Kanapathippillai .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) :8072-8085
[3]   Robust optimization of noisy blackbox problems using the Mesh Adaptive Direct Search algorithm [J].
Audet, Charles ;
Ihaddadene, Amina ;
Le Digabel, Sebastien ;
Tribes, Christophe .
OPTIMIZATION LETTERS, 2018, 12 (04) :675-689
[4]   Covert Communication Gains From Adversary's Ignorance of Transmission Time [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) :8394-8405
[5]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[6]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[7]  
Boyd S. P., 2004, Convex Optimization
[8]  
Browder A., 1996, MATH ANAL INTRO
[9]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[10]  
Cover T. M., 2012, ELEMENTS INFORM THEO