Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Covert communication in the presence of an uninformed jammer

TV Sobers, BA Bash, S Guha… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …

Covert communication over noisy channels: A resolvability perspective

MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …

Intelligent covert communication design for cooperative cognitive radio network

Z Li, J Shi, C Wang, D Wang, X Li… - China …, 2023 - ieeexplore.ieee.org
Extensive research attentions have been devoted to studying cooperative cognitive radio
networks (CCRNs), where secondary users (SU) providing cooperative transmissions can …

MD-GAN-based UAV trajectory and power optimization for cognitive covert communications

Z Li, X Liao, J Shi, L Li, P Xiao - IEEE internet of things journal, 2021 - ieeexplore.ieee.org
This article investigates the covert performance of an unmanned aerial vehicle (UAV)
jammer-assisted cognitive radio (CR) network. In particular, the covert transmission of …

Covert communications when the warden does not know the background noise power

D Goeckel, B Bash, S Guha… - IEEE Communications …, 2015 - ieeexplore.ieee.org
If the warden Willie attempting to detect the transmission knows the statistics of his receiver
noise, Alice can transmit no more than covert bits reliably to Bob in channel uses of an …

Covert rate maximization in wireless full-duplex relaying systems with power control

R Sun, B Yang, S Ma, Y Shen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the fundamental covert rate performance in a wireless relaying
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Keyless covert communication over multiple-access channels

KSK Arumugam, MR Bloch - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We consider a scenario in which two legitimate transmitters attempt to communicate with a
legitimate receiver over a discrete memoryless Multiple-Access Channel (MAC), while …

[HTML][HTML] Covert communication for cooperative NOMA with two phases detection

H Peng, Z Tian, X Li, W Wang, G Nauryzbayev… - Alexandria Engineering …, 2023 - Elsevier
This paper investigates the covert communication of cooperative non-orthogonal multiple
access (NOMA) systems, where the near user serves as a decode-and-forward (DF) relay …