Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… For secure transmission, our aim is to prevent the untrusted user from decoding Bob’s
message from Alice. Additionally, for covert communication, our goal is to avoid the warden from …

Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens

M Forouzesh, P Azmi, A Kuhestani… - … on Communications, 2020 - ieeexplore.ieee.org
… We first consider a system model consisting of one source, one untrusted … For covert
communications, our aim is to prevent the warden from detecting the presence of communications

Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Communications …, 2023 - ieeexplore.ieee.org
covert techniques in the existing literature are reviewed. We also discuss the potential
implementation of covert communications in … , where they also prevented the untrusted relays from …

Covert Communication for Untrusted UAV-Assisted Wireless Systems

C Gao, L Tian, D Zheng - arXiv preprint arXiv:2403.09475, 2024 - arxiv.org
… source transmits the covert message to a destination with the help of an untrusted UAV. We
… such that use UAVs to assist in covert communications while ensuring the security of covert

Secure transmission with covert requirement in untrusted relaying networks

M Forouzesh, P Azmi… - 2018 9th International …, 2018 - ieeexplore.ieee.org
… problem of secure communication with covert requirement in untrusted relaying networks. …
, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
… For the covertness, its goal is to hide the existing of wireless communications from a warden,
ie, covert communications, which can provide enhanced privacy protection for supporting …

Robust beamforming design for covert communications

S Ma, Y Zhang, H Li, S Lu, N Al-Dhahir… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… To be more specific, in [25], the authors proposed a power allocation strategy to maximize
the secrecy rate under the covert requirements with multiple untrusted relays. Based on the …

Achieving covert communication in overlay cognitive radio networks

R Chen, Z Li, J Shi, L Yang, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… RATE In this section, we analyze the achievable covert rate of the proposed joint user-…
we analyze covert rate of our presented joint user-jammer scheduling schemes. First, covert

Covert communication with uninformed backscatters in hybrid active/passive wireless networks: Modeling and performance analysis

W Ma, Z Niu, W Wang, S He… - … on Communications, 2022 - ieeexplore.ieee.org
covert throughput. Particularly, we investigate the worst-case scenario of covert communication
… , we investigate the covert communication of a legitimate active communicating pair, that …

Covert and Secure Communications in NOMA Networks with Internal Eavesdropping

Q Li, D Xu, K Navaie, Z Ding - IEEE Wireless Communications …, 2023 - ieeexplore.ieee.org
… to confuse the adversary, which enhanced the covert rate of the NOMA user [12]. Even more
… based covert communication scheme was proposed in the networks with an untrusted relay …