[PDF][PDF] Covert communications versus physical layer security

M Forouzesh, P Azmi, N Mokari… - arXiv preprint arXiv …, 1803 - academia.edu
This letter studies and compares the physical-layer security approach and the covert
communication approach for a wiretap channel with a transmitter, an intended receiver and …

Information-theoretic security or covert communication

M Forouzesh, P Azmi, N Mokari, KK Wong… - arXiv preprint arXiv …, 2018 - arxiv.org
Information-theoretic secrecy, in particular the wiretap channel formulation, provides
protection against interception of a message by adversary Eve and has been widely studied …

Simultaneous secure and covert transmissions against two attacks under practical assumptions

M Forouzesh, FS Khodadad, P Azmi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In practice, Internet of Things (IoT) applications may face two different hostile attacks, ie,
overhearing the broadcasted data and detecting the presence of data communication …

Channel state information based optimal strategy for covert communication

J Wang, Y Li, W Tang, X Li, S Li - 2019 11th International …, 2019 - ieeexplore.ieee.org
Covert communication aims at achieving a reliable communication while ensuring an
arbitrary small probability of being detected by the adversary. In this paper, we exploit the …

Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks

H Wu, Y Zhang, Y Shen, X Jiang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
This article explores a new secure wireless communication scenario for the data collection
in the Internet of Things (IoT) where the physical layer security technology is applied to …

Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we investigate joint information-theoretic secrecy and covert communication in
a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with …

Covert communications with channel inversion power control in the finite blocklength regime

R Ma, X Yang, G Pan, X Guan… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this letter, we investigate covert communications with finite blocklength under the channel
inversion power control (CIPC) scheme, where a transmitter is allowed to communicate with …

Covert communication in fading channels under channel uncertainty

K Shahzad, X Zhou, S Yan - 2017 IEEE 85th Vehicular …, 2017 - ieeexplore.ieee.org
A covert communication system under block fading channels is considered, where users
experience uncertainty about their channel knowledge. The transmitter seeks to hide the …

Covert communication with the help of relay and channel uncertainty

J Wang, W Tang, Q Zhu, X Li, H Rao… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Covert communication aims to hide the existence of the transmissions to guarantee the
security in wireless communications. In this letter, channel uncertainty is exploited to achieve …

Covert communications with extremely low power under finite block length over slow fading

H Tang, J Wang, YR Zheng - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
This paper investigates the achievable message transmission rate of covert communication
over slow fading channels where the channel coefficient remains unchanged over a finite …