Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we investigate joint information-theoretic secrecy and covert communication in
a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with …

Simultaneous secure and covert transmissions against two attacks under practical assumptions

M Forouzesh, FS Khodadad, P Azmi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In practice, Internet of Things (IoT) applications may face two different hostile attacks, ie,
overhearing the broadcasted data and detecting the presence of data communication …

[PDF][PDF] Covert communications versus physical layer security

M Forouzesh, P Azmi, N Mokari… - arXiv preprint arXiv …, 1803 - academia.edu
This letter studies and compares the physical-layer security approach and the covert
communication approach for a wiretap channel with a transmitter, an intended receiver and …

Strategies in covert communication with imperfect channel state information

X Peng, J Wang, S Xiao, W Tang - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
This paper considers the problem of covert communication over a multiple-input single-
output channel (MISO) in the case of the imperfect channel state information. The transmitter …

Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens

M Forouzesh, P Azmi, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we address the problem of joint covert communication and secure
transmission in untrusted relaying networks when multiple wardens exist in the network. We …

Covert communications without channel state information at receiver in IoT systems

J Hu, S Yan, X Zhou, F Shu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Covert communications can hide the very existence of wireless transmissions and thus are
able to address privacy issues in numerous applications of the emerging Internet of Things …

Joint Information-Theoretic Secrecy and Covertness for UAV-assisted Wireless Transmission With Finite Blocklength

P Liu, Z Li, J Si, N Al-Dhahir… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we study a novel joint information-theoretic secrecy and covertness model for
an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which …

Covert communication with the help of relay and channel uncertainty

J Wang, W Tang, Q Zhu, X Li, H Rao… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Covert communication aims to hide the existence of the transmissions to guarantee the
security in wireless communications. In this letter, channel uncertainty is exploited to achieve …

Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations

X Chen, W Sun, C Xing, N Zhao, Y Chen… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Covert communication can hide the information transmission process from the warden to
prevent adversarial eavesdropping. However, it becomes challenging when the location of …

Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks

H Wu, Y Zhang, Y Shen, X Jiang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
This article explores a new secure wireless communication scenario for the data collection
in the Internet of Things (IoT) where the physical layer security technology is applied to …