Covert Communication Achieved by a Greedy Relay in Wireless Networks
-
Altmetric Citations
Hu, Jinsong; Yan, Shihao; Shu, Feng; Li, Jun; Wang, Jiangzhou; Zhou, Xiangyun
Description
Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source’s message, while the source tries to detect this covert...[Show more]
dc.contributor.author | Hu, Jinsong | |
---|---|---|
dc.contributor.author | Yan, Shihao | |
dc.contributor.author | Shu, Feng | |
dc.contributor.author | Li, Jun | |
dc.contributor.author | Wang, Jiangzhou | |
dc.contributor.author | Zhou, Xiangyun | |
dc.date.accessioned | 2018-09-17T05:51:14Z | |
dc.date.available | 2018-09-17T05:51:14Z | |
dc.date.created | 2018 | |
dc.identifier.issn | 1536-1276 | |
dc.identifier.uri | http://hdl.handle.net/1885/147638 | |
dc.description.abstract | Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source’s message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power, spectrum) allocated only for the purpose of forwarding the source’s information. We propose two strategies for the relay to transmit its covert information, namely rate-control and powercontrol the transmission schemes, for which the source’s detection limits are analysed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the powercontrol transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source’s message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmit power). | |
dc.description.sponsorship | ARC Discovery Projects Grant DP150103905 | |
dc.format.extent | 14 pages | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_AU | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.rights | IEEE | |
dc.source | IEEE Transactions on Wireless Communications | |
dc.title | Covert Communication Achieved by a Greedy Relay in Wireless Networks | |
dc.type | Journal article | |
local.identifier.citationvolume | 17 | |
local.identifier.ariespublication | a383154xPUB9826 | |
local.publisher.url | http://www.ieee.org/index.html | |
local.type.status | Accepted Version | |
local.contributor.affiliation | Zhou, Xiangyun, Research School of Engineering, The Australian National University | |
dc.relation | http://purl.org/au-research/grants/arc/DP150103905 | |
local.bibliographicCitation.issue | 7 | |
local.bibliographicCitation.startpage | 4766 | |
local.bibliographicCitation.lastpage | 4779 | |
local.identifier.doi | 10.1109/TWC.2018.2831217 | |
dcterms.accessRights | Open Access | |
dc.provenance | https://www.ieee.org/publications/rights/index.html#ieee-open-access..."The revised policy reaffirms the principle that authors are free to post the accepted version of their articles on their personal websites or those of their employers." from SHERPA/RoMEO site (as at 10/09/18). | |
Collections | ANU Research Publications |
Download
File | Description | Size | Format | Image |
---|---|---|---|---|
1708.00905.pdf | Author/s Accepted Manuscript (AAM) | 953.62 kB | Adobe PDF |
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.
Updated: 17 November 2022/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator