Abstract | ||
---|---|---|
Covert communication aims to hide the existence of the transmissions to guarantee the security in wireless communications. In this letter, channel uncertainty is exploited to achieve covert communication in relay networks. The transmitter Alice sends messages to the legitimate receiver Bob with the help of a relay, while the warden Willie wants to detect the existence of the transmission. The channel uncertainty introduces confusions to degrade the performance of Willie’s detection. We show that Alice can transmit
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${O}$ </tex-math></inline-formula>
(
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${n}$ </tex-math></inline-formula>
) bits in
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${n}$ </tex-math></inline-formula>
channel uses covertly with the help of relay and channel uncertainty. Numerical results are shown to illustrate the achievability and the performance of the considered scenario. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/LWC.2018.2872058 | IEEE Wireless Communications Letters |
Keywords | Field | DocType |
Relays,Uncertainty,Detectors,Jamming,Receivers,Rayleigh channels | Transmitter,Wireless,Rayleigh channels,Computer network,Communication channel,Detector,Jamming,Mathematics,Relay,Covert communication | Journal |
Volume | Issue | ISSN |
8 | 1 | 2162-2337 |
Citations | PageRank | References |
13 | 0.54 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jianquan Wang | 1 | 56 | 10.52 |
Wanbin Tang | 2 | 138 | 19.42 |
Qiangqiang Zhu | 3 | 13 | 0.54 |
Xiaoping Li | 4 | 32 | 3.62 |
Hangmei Rao | 5 | 14 | 0.89 |
Shaoqian Li | 6 | 2276 | 195.05 |