Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Applications and prospects of artificial intelligence in covert satellite communication: a review

K Lu, H Liu, L Zeng, J Wang, Z Zhang, J An - Science China Information …, 2023 - Springer
Satellite communication has the characteristics of wide coverage and large communication
capacity, and is not easily affected by land disasters. It is quite suitable as a supplement to …

Aerial intelligent reflecting surface-enabled terahertz covert communications in beyond-5G Internet of Things

MT Mamaghani, Y Hong - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are envisioned to be extensively employed for assisting
wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz) …

Covert rate maximization in wireless full-duplex relaying systems with power control

R Sun, B Yang, S Ma, Y Shen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the fundamental covert rate performance in a wireless relaying
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …

Covert communications with randomly distributed wardens in the finite blocklength regime

R Ma, W Yang, L Tao, X Lu, Z Xiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates covert communications with finite blocklength in the presence of
multiple randomly distributed wardens, which are modeled as a Poisson point process …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Covert communication with a spectrum sharing relay in the finite blocklength regime

R Ma, W Yang, H Shi, X Lu, J Liu - China Communications, 2023 - ieeexplore.ieee.org
In this paper, we investigate the feasibility and performance of the covert communication
with a spectrum sharing relay in the finite blocklength regime. Specifically, the relay …

Channel inversion power control aided covert communications in uplink NOMA systems

M Wang, W Yang, X Lu, C Hu, B Liu… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In this letter, we investigate covert communications in uplink non-orthogonal multiple access
(NOMA) systems, where a covert user tries to transmit private information to a legitimate …

Covert mmWave communications with finite blocklength against spatially random wardens

R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …

Covert communications with channel inversion power control in the finite blocklength regime

R Ma, X Yang, G Pan, X Guan… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this letter, we investigate covert communications with finite blocklength under the channel
inversion power control (CIPC) scheme, where a transmitter is allowed to communicate with …