On the limits of covert backscatter communication over undecodable ambient signals

W Chen, H Ding, S Wang, F Gong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the limit covert rate of the backscatter communication systems based
on undecodable ambient radio frequency (RF) signals over additive white Gaussian noise …

Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks

Y Jiang, L Wang, HH Chen - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Wireless energy harvesting (WEH) enabled Device-to-Device (D2D) communication
emerges as an effective technique to improve spectral and energy efficiencies. However …

Joint Information-Theoretic Secrecy and Covertness for UAV-assisted Wireless Transmission With Finite Blocklength

P Liu, Z Li, J Si, N Al-Dhahir… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we study a novel joint information-theoretic secrecy and covertness model for
an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which …

A scalable communication model to realize integrated access and backhaul (iab) in 5g

M Shokrnezhad, S Khorsandi… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Our vision of the future world is one wherein everything, anywhere and at any time, can
reliably communicate in real time. 5G, the fifth generation of cellular networks, is anticipated …

Multi-User Cooperation for Covert Communication Under Quasi-Static Fading

J Lee, DT Dinh, H Yeom, SH Lee… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This work studies a covert communication scheme for an uplink multi-user scenario in which
some users are opportunistically selected to help a covert user. In particular, the selected …

Covert and Secure Communications in NOMA Networks with Internal Eavesdropping

Q Li, D Xu, K Navaie, Z Ding - IEEE Wireless Communications …, 2023 - ieeexplore.ieee.org
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal
multiple access (NOMA) networks against internal eavesdropping and external monitoring …

Disguised Full-Duplex Covert Communications

J Moon - Sensors, 2023 - mdpi.com
Covert communications have arisen as an effective communications security measure that
overcomes some of the limitations of cryptography and physical layer security. The main …

Reliable and secure short-packet communications in untrusted diamond relay networks

S Qian - IEEE Access, 2023 - ieeexplore.ieee.org
This paper investigates short-packet communications over a diamond relay network with two
untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and …

Joint Optimization of Beamforming and Noise Injection for Covert Downlink Transmissions in Cell-Free Internet-of-Things Networks

J Xing, T Lv, W Li, W Ni… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The development of Internet-of-Things (IoT) systems has given rise to security concerns
stemming from the exposure of wireless channels and the exponential growth of connected …

Channel Correlation in Multi-User Covert Communication: Friend or Foe?

J Lee, H Yeom, SH Lee, J Ha - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this work, we study a covert communication scheme in which some users are
opportunistically selected to emit interference signals for the purpose of hiding the …