A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Covert communications over multiple overt channels

SW Kim, HQ Ta - IEEE Transactions on Communications, 2021 - ieeexplore.ieee.org
We explore leveraging the multiplicity of overt (public) messages, destined for different
receivers through different channels, for hiding the transmission of a covert (private) …

Covert communication with noise and channel uncertainties

HQ Ta, QV Pham, K Ho-Van, SW Kim - Wireless Networks, 2022 - Springer
Covert communication is critical to guarantee a strong security and secure user privacy. In
this work, we consider adversary's noise and channel uncertainties and analyze their impact …

Gaussian-Distributed Spread-Spectrum for Covert Communications

I Shakeel, J Hilliard, W Zhang, M Rice - Sensors, 2023 - mdpi.com
Covert communication techniques play a crucial role in military and commercial applications
to maintain the privacy and security of wireless transmissions from prying eyes. These …

Hiding Messages into Secure Connection Transmissions with Full-Duplex Receiver

H Ta, LL Nguyen, TT Nguyen, A Fiche, R Gautier - Authorea Preprints, 2023 - techrxiv.org
This letter considers hiding messages into overt transmissions with a Full-Duplex receiver,
which emits Artificial Noise to secure its transmission connection while a transmitter …

[PDF][PDF] Hiding Messages into Secure Connection Transmissions with Full-Duplex Receiver

LL Nguyen, TT Nguyen, A Fiche, R Gautier, HQ Ta - academia.edu
This letter considers hiding messages into overt transmissions with a Full-Duplex receiver,
which emits Artificial Noise to secure its transmission connection while a transmitter …

[引用][C] Use of Non-Orthogonal Multiple Access to Improve Latency and Authentication Error Rate in Wireless Communication Channels

J Knight - 2022