Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Optimal transmit power and flying location for UAV covert wireless communications

S Yan, SV Hanly, IB Collings - IEEE Journal on Selected Areas …, 2021 - ieeexplore.ieee.org
This paper jointly optimizes the flying location and wireless communication transmit power
for an unmanned aerial vehicle (UAV) conducting covert operations. This is motivated by …

On covert communication performance with outdated CSI in wireless greedy relay systems

J Bai, J He, Y Chen, Y Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Communication performance relies largely on the availability of channel state information
(CSI). This paper investigates the impact of outdated CSI on the achievable covert …

Covert MIMO communications under variational distance constraint

SY Wang, MR Bloch - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The problem of covert communication over Multiple-Input Multiple-Output (MIMO) Additive
White Gaussian Noise (AWGN) channels is investigated, in which a transmitter attempts to …

Covert communication gains from adversary's uncertainty of phase angles

S Qiao, D Cao, Q Zhang, Y Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This work investigates the phase gain of intelligent reflecting surface (IRS) covert
communication over complex-valued additive white Gaussian noise (AWGN) channels. The …

Channel correlation in multi-user covert communication: friend or foe?

J Lee, H Yeom, SH Lee, J Ha - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this work, we study a covert communication scheme in which some users are
opportunistically selected to emit interference signals for the purpose of hiding the …

Optimal probabilistic constellation shaping for covert communications

S Ma, Y Zhang, H Sheng, H Li, J Shi… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the optimal probabilistic constellation shaping design for covert
communication systems from a practical view. Different from conventional covert …

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial

L Lv, D Xu, RQ Hu, Y Ye, L Yang, X Lei, X Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low
latency, and massive connectivity, the forefront of wireless research calls for the design of …

Mobility-assisted covert communication over wireless ad hoc networks

HS Im, SH Lee - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
We study the effect of node mobility on the throughput scaling of the covert communication
over a wireless adhoc network. It is assumed that n mobile nodes want to communicate each …

[HTML][HTML] Optimization of covert communication in multi-sensor asymmetric Noise systems

S Qiao, R Zhu, X Ji, J Zhao, H Ding - Sensors, 2024 - mdpi.com
This work investigates wireless covert communication in a multi-sensor asymmetric noise
scenario. We adopt KL (Kullback–Leibler) divergence as the covertness constraint metric …