Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Covertness and timeliness of data collection in UAV-aided wireless-powered IoT

X Lu, W Yang, S Yan, Z Li… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this work, we aim to maximize the timeliness of data collection subject to a covertness
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …

Covert communication in downlink NOMA systems with channel uncertainty

Y Zhang, W He, X Li, H Peng, K Rabie… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
With the gradual promotion of the fifth generation (5G) mobile communication and Internet of
Things (IoT) applications, wireless communication transmission will be more vulnerable to …

MD-GAN-based UAV trajectory and power optimization for cognitive covert communications

Z Li, X Liao, J Shi, L Li, P Xiao - IEEE internet of things journal, 2021 - ieeexplore.ieee.org
This article investigates the covert performance of an unmanned aerial vehicle (UAV)
jammer-assisted cognitive radio (CR) network. In particular, the covert transmission of …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Covert communication with a spectrum sharing relay in the finite blocklength regime

R Ma, W Yang, H Shi, X Lu, J Liu - China Communications, 2023 - ieeexplore.ieee.org
In this paper, we investigate the feasibility and performance of the covert communication
with a spectrum sharing relay in the finite blocklength regime. Specifically, the relay …

Physical layer security techniques for data transmission for future wireless networks

W Shi, X Jiang, J Hu, AMS Abdelgader… - Security and …, 2022 - sands.edpsciences.org
The broadcast nature of wireless communication systems makes wireless transmission
extremely susceptible to eavesdropping and even malicious interference. Physical layer …

On covert communication performance with outdated CSI in wireless greedy relay systems

J Bai, J He, Y Chen, Y Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Communication performance relies largely on the availability of channel state information
(CSI). This paper investigates the impact of outdated CSI on the achievable covert …

Covert mmWave communications with finite blocklength against spatially random wardens

R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …

Practical covert wireless unidirectional communication in IEEE 802.11 environment

H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …