Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Low probability of detection communication: Opportunities and challenges

S Yan, X Zhou, J Hu, SV Hanly - IEEE Wireless …, 2019 - ieeexplore.ieee.org
LPD communication has recently emerged as a new transmission technology to address
privacy and security in wireless networks. Recent studies have established the fundamental …

Covert communication in the presence of an uninformed jammer

TV Sobers, BA Bash, S Guha… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

Covert communication over noisy channels: A resolvability perspective

MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Delay-intolerant covert communications with either fixed or random transmit power

S Yan, B He, X Zhou, Y Cong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study delay-intolerant covert communications in additive white Gaussian
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …

Wireless covert communications aided by distributed cooperative jamming over slow fading channels

TX Zheng, Z Yang, C Wang, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …

Multi-antenna covert communications in random wireless networks

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …

Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …