Active RIS Aided Covert Communications for MISO-NOMA Systems

M Zhu, K Guo, Y Ye, L Yang… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
In this letter, we investigate covert communications in an active reconfigure intelligent
surface (RIS) aided multiple-input single-output non-orthogonal multiple access system. To …

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial

L Lv, D Xu, RQ Hu, Y Ye, L Yang, X Lei, X Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low
latency, and massive connectivity, the forefront of wireless research calls for the design of …

On joint optimization of UAV-assisted covert communication systems with NOMA for hydropower Internet of Things

Z Le, Q Xu, Y Wang, G Hao, W Pan, Y Sun, Y Qian - Drones, 2023 - mdpi.com
The intelligent terminals deployed in hydropower IoT can quickly sense the status of
hydropower equipment, thus improving the efficiency of system control and operation …

Covert Communications in STAR-RIS Assisted NOMA IoT Networks over Nakagami-m Fading Channels

Q Li, D Xu, K Zhang, K Navaie… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The combination of simultaneously transmitting and reflecting-reconfigurable intelligent
surface (STAR-RIS) and nonorthogonal multiple access (NOMA) brings the necessary full …

Covert Transmission in Water-to-Air Optical Wireless Communication Systems

Q Hu, T Lin, T Wei, N Huang, YJ Zhu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Covert communications hide the information transmission from a watchful adversary (Willie)
while ensuring a satisfactory decoding performance at a legitimate receiver (Bob). In this …

RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks

J Bai, J He, Y Chen, Y Shen, X Jiang - IEEE Systems Journal, 2024 - ieeexplore.ieee.org
This article focuses on covert communication in a distributed network with multiple
nonorthogonal multiple access (NOMA) systems, where each NOMA system is consisted of …

A generalized detection framework for covert timing channels based on perceptual hashing

X Zhuang, Y Chen, H Tian - Transactions on Emerging …, 2024 - Wiley Online Library
Network covert channels use network resources to transmit data covertly, and their existence
will seriously threaten network security. Therefore, an effective method is needed to prevent …

Pairing Inspired Covert Communication in Uplink NOMA Systems against SIC Warden

Y Song, Q Li, X Lu, X Jin - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
In this letter, we investigate the covert communication in uplink non-orthogonal multiple
access (NOMA) system against a warden who can also execute successive interference …

Two-Layer Game Based Covert Communication Strategy Against Jamming Attack Oriented Warden

Z Wang, Y Wang, S Sun - 2023 IEEE 98th Vehicular …, 2023 - ieeexplore.ieee.org
This paper considers the problem of covert communication threatened by jamming attacks.
The transmitter (T) randomly selects a portion of the available channels to transmit uplink …

GAN-Based Covert Communications Against an Adversary with Uncertain Detection Threshold in Federated Learning Networks

Y Feng, Y Wang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a promising distributed machine learning paradigm that can
address privacy and security issues in the Internet of Things, Beyond 5G and 6G, and so on …