Robust power allocation in covert communication: Imperfect CDI

M Forouzesh, P Azmi, N Mokari… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The study of the fundamental limits of covert communications, where a transmitter Alice
wants to send information to a desired recipient Bob without detection of that transmission by …

Covert localization in wireless networks: Feasibility and performance analysis

Y Zhao, Z Li, N Cheng, W Wang, C Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose covert localization to improve the security of wireless localization
networks, which can prevent the legitimate transmission of localization signals between …

Covert relay communications with finite block-length against combining detection

J Jiang, J Jing, R Ma, B Che… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In this letter, we investigate covert relay communications with finite block-length against
combining detection, in which two-hop signals received by the warden can be combined to …

Covert Communication for Wireless Networks with Full‐Duplex Multiantenna Relay

L Yang, W Yang, L Tang, L Tao, X Lu, Z He - Complexity, 2022 - Wiley Online Library
In this work, we investigated a covert communication method in wireless networks, which is
realized by multiantenna full‐duplex single relay. In the first stage, the source node sends …

Hybrid relay-reflecting intelligent surface-aided covert communications

J Hu, X Shi, S Yan, Y Chen, T Zhao, F Shu - arXiv preprint arXiv …, 2022 - arxiv.org
In this paper, we propose to use a hybrid relay-reflecting intelligent surface (HR-RIS) to
enhance the performance of a covert communication system. Specifically, the HR-RIS …

Harvest-and-opportunistically-relay: Analyses on transmission outage and covertness

Y Li, R Zhao, Y Deng, F Shu, Z Nie… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To enhance transmission performance, privacy level, and energy manipulating efficiency of
wireless networks, this article initiates a novel simultaneous wireless information and power …

Physical layer security techniques for data transmission for future wireless networks

W Shi, X Jiang, J Hu, AMS Abdelgader… - Security and …, 2022 - sands.edpsciences.org
The broadcast nature of wireless communication systems makes wireless transmission
extremely susceptible to eavesdropping and even malicious interference. Physical layer …

Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems

X Lu, W Yang, Y Cai, X Guan - IEEE Access, 2019 - ieeexplore.ieee.org
Proactive eavesdropping is an effective method for government to monitor suspicious users
who are deemed to misuse communication systems for illegal activities. In this paper …

Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges

Y Jiang, L Wang, HH Chen, X Shen - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …

Antenna coding and rate optimization for covert wireless communications

Y Qian, W Li, Y Lin, L Shi, X Zhou, J Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The covert communication technology has emerged as a novel method for network
authentication, copyright protection, and providing the evidence of cybercrimes. However …