Delay-constrained covert communications with a full-duplex receiver

F Shu, T Xu, J Hu, S Yan - IEEE Wireless Communications …, 2019 - ieeexplore.ieee.org
In this letter, we consider delay-constrained covert communications with the aid of a full-
duplex (FD) receiver. Without delay constraints, it has been shown that the transmit power of …

Optimal pulse-position modulation order and transmit power in covert communications

R Li, J Cui, T Huang, L Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This work tackles the joint optimization of the modulation order and transmit power of pulse-
position modulation (PPM) in covert communications. Specifically, we consider two …

Relaying via cooperative jamming in covert wireless communications

K Shahzad - 2018 12th International Conference on Signal …, 2018 - ieeexplore.ieee.org
In this work, a covert communication scheme under block-fading channels is proposed
where the relay, apart from forwarding source's information to the destination, also acts as a …

Covert communications with a full-duplex receiver in non-coherent Rayleigh fading

M Zheng, A Hamilton, C Ling - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In a majority of research on covert communications, knowledge about channel state
information (CSI) of main channel and/or warden channel is assumed to be known or …

Jamming aided covert communication with multiple receivers

KW Huang, H Deng, HM Wang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We consider that a transmitter covertly communicates with multiple receivers under the help
of a friendly jammer. The messages intended for different receivers are transmitted in …

Proactive eavesdropping with jamming and eavesdropping mode selection

J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …

A game-theoretic approach to covert communications in the presence of multiple colluding wardens

A Arghavani, A Ahlén, A Teixeira… - 2021 IEEE Wireless …, 2021 - ieeexplore.ieee.org
In this paper, we address the problem of covert communication under the presence of
multiple wardens with a finite blocklength. The system consists of Alice, who aims to covertly …

Optimal probabilistic constellation shaping for covert communications

S Ma, Y Zhang, H Sheng, H Li, J Shi… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the optimal probabilistic constellation shaping design for covert
communication systems from a practical view. Different from conventional covert …

Characterizing physical-layer secrecy with unknown eavesdropper locations and channels

M Ghogho, A Swami - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
We present a probabilistic framework for physical layer secrecy when the locations and
channels of the eavesdroppers are unknown. The locations are modeled by a Poisson point …

When the Warden Does Not Know Transmit Power: Detection Performance Analysis and Covertness Strategy Design

R He, G Li, J Chen, H Wang, R Ma… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
In this paper, we consider a novel covert communication scenario where the warden does
not have prior knowledge of the transmitter's power. In this scenario, the current widely …