A game-theoretic approach to covert communications

AS Leong, DE Quevedo, S Dey - 2020 IEEE 31st Annual …, 2020 - ieeexplore.ieee.org
This paper considers a game-theoretic formulation of the covert communications problem
with finite blocklength, where the transmitter (Alice) can randomly vary her transmit power in …

Artificial noise: Transmission optimization in multi-input single-output wiretap channels

N Yang, S Yan, J Yuan, R Malaney… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input
single-output wiretap channels with multiple antennas at the transmitter and a single …

Time-division is optimal for covert communication over some broadcast channels

VYF Tan, SH Lee - IEEE Transactions on Information forensics …, 2018 - ieeexplore.ieee.org
We consider a covert communication scenario where a transmitter wishes to communicate
simultaneously to two legitimate receivers while ensuring that the communication is not …

[PDF][PDF] Physical layer security game: interaction between source, eavesdropper, and friendly jammer

Z Han, N Marina, M Debbah, A Hjørungnes - EURASIP Journal on …, 2010 - Springer
Physical layer security is an emerging security area that achieves perfect secrecy data
transmission between intended network nodes, while malicious nodes that eavesdrop the …

Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Covert communication with a full-duplex receiver based on channel distribution information

T Xu, L Xu, X Liu, Z Lu - 2018 12th International Symposium on …, 2018 - ieeexplore.ieee.org
In this work, we consider a system of covert communication with the aid of a full-duplex (FD)
receiver to enhance the performance in a more realistic scenario, ie, only the channel …

Robust power allocation in covert communication: Imperfect CDI

M Forouzesh, P Azmi, N Mokari… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The study of the fundamental limits of covert communications, where a transmitter Alice
wants to send information to a desired recipient Bob without detection of that transmission by …

Secure on-off transmission design with channel estimation errors

B He, X Zhou - IEEE Transactions on Information Forensics …, 2013 - ieeexplore.ieee.org
Physical layer security has recently been regarded as an emerging technique to
complement and improve the communication security in future wireless networks. The …

Achieving covert wireless communications using a full-duplex multi-antenna receiver

L Yang, W Yang, S Xu, L Tang… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Covert communication can prevent adversary from knowing the existence of the
transmissions while guaranteeing the security in wireless communications. In this paper …

Secrecy rate region of the broadcast channel with an eavesdropper

G Bagherikaram, AS Motahari, AK Khandani - arXiv preprint arXiv …, 2009 - arxiv.org
In this paper, we consider a scenario where a source node wishes to broadcast two
confidential messages to two receivers, while a wire-tapper also receives the transmitted …