Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Wireless covert communications aided by distributed cooperative jamming over slow fading channels

TX Zheng, Z Yang, C Wang, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …

Covert wireless communications under quasi-static fading with channel uncertainty

K Shahzad, X Zhou - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Covert communications enable a transmitter to send information reliably in the presence of
an adversary, who looks to detect whether the transmission took place or not. We consider …

Covertness and timeliness of data collection in UAV-aided wireless-powered IoT

X Lu, W Yang, S Yan, Z Li… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this work, we aim to maximize the timeliness of data collection subject to a covertness
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …

Covert communication in downlink NOMA systems with channel uncertainty

Y Zhang, W He, X Li, H Peng, K Rabie… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
With the gradual promotion of the fifth generation (5G) mobile communication and Internet of
Things (IoT) applications, wireless communication transmission will be more vulnerable to …

Achieving covertness and security in broadcast channels with finite blocklength

C Wang, Z Li, H Zhang, DWK Ng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Considering multi-user downlink ultra-high reliability and low latency communications
(URLLC), this paper employs the artificial noise (AN) technique to establish a secure and …

UAV-aided covert communication with a multi-antenna jammer

X Chen, N Zhang, J Tang, M Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Owing to the flexible mobility and convenient deployment, unmanned aerial vehicle (UAV)
aided networks can facilitate many applications. However, the open accessibility of wireless …

Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations

X Chen, W Sun, C Xing, N Zhao, Y Chen… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Covert communication can hide the information transmission process from the warden to
prevent adversarial eavesdropping. However, it becomes challenging when the location of …

Covert communication in relay-assisted IoT systems

C Gao, B Yang, X Jiang, H Inamura… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems are of paramount importance to provide ubiquitous wireless
connectivity for smart cities. However, such systems are facing security challenges due to …

UAV-enabled covert wireless data collection

X Zhou, S Yan, F Shu, R Chen… - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
This work considers unmanned aerial vehicle (UAV) networks for collecting data covertly
from ground users. The full-duplex (FD) UAV intends to gather critical information from a …