Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Low probability of detection communication: Opportunities and challenges

S Yan, X Zhou, J Hu, SV Hanly - IEEE Wireless …, 2019 - ieeexplore.ieee.org
LPD communication has recently emerged as a new transmission technology to address
privacy and security in wireless networks. Recent studies have established the fundamental …

Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint

X Zhou, S Yan, Q Wu, F Shu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines the performance gain achieved by deploying an intelligent reflecting
surface (IRS) in covert communications. To this end, we formulate the joint design of the …

Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization

L Lv, Q Wu, Z Li, Z Ding, N Al-Dhahir… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we investigate covert communication in an intelligent reflecting surface (IRS)-
assisted non-orthogonal multiple access (NOMA) system, where a legitimate transmitter …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

Covert mmWave communications with finite blocklength against spatially random wardens

R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …

Joint optimization of a UAV's trajectory and transmit power for covert communications

X Zhou, S Yan, J Hu, J Sun, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper considers covert communications in the context of unmanned aerial vehicle
(UAV) networks, aiming to hide a UAV for transmitting critical information out of an area that …

Wireless covert communications aided by distributed cooperative jamming over slow fading channels

TX Zheng, Z Yang, C Wang, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …

Aerial intelligent reflecting surface-enabled terahertz covert communications in beyond-5G Internet of Things

MT Mamaghani, Y Hong - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are envisioned to be extensively employed for assisting
wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz) …

Age of information for short-packet covert communication

W Yang, X Lu, S Yan, F Shu, Z Li - IEEE Wireless …, 2021 - ieeexplore.ieee.org
In this letter, we develop a new framework to jointly characterize covertness and timeliness
of short-packet communications, in which a new metric named covert age of information …