ترغب بنشر مسار تعليمي؟ اضغط هنا

Covert Wireless Communications under Quasi-Static Fading with Channel Uncertainty

90   0   0.0 ( 0 )
 نشر من قبل Khurram Shahzad
 تاريخ النشر 2020
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Covert communications enable a transmitter to send information reliably in the presence of an adversary, who looks to detect whether the transmission took place or not. We consider covert communications over quasi-static block fading channels, where users suffer from channel uncertainty. We investigate the adversary Willies optimal detection performance in two extreme cases, i.e., the case of perfect channel state information (CSI) and the case of channel distribution information (CDI) only. It is shown that in the large detection error regime, Willies detection performances of these two cases are essentially indistinguishable, which implies that the quality of CSI does not help Willie in improving his detection performance. This result enables us to study the covert transmission design without the need to factor in the exact amount of channel uncertainty at Willie. We then obtain the optimal and suboptimal closed-form solution to the covert transmission design. Our result reveals fundamental difference in the design between the case of quasi-static fading channel and the previously studied case of non-fading AWGN channel.



قيم البحث

اقرأ أيضاً

In this paper, we study covert communications between {a pair of} legitimate transmitter-receiver against a watchful warden over slow fading channels. There coexist multiple friendly helper nodes who are willing to protect the covert communication fr om being detected by the warden. We propose an uncoordinated jammer selection scheme where those helpers whose instantaneous channel gains to the legitimate receiver fall below a pre-established selection threshold will be chosen as jammers radiating jamming signals to defeat the warden. By doing so, the detection accuracy of the warden is expected to be severely degraded while the desired covert communication is rarely affected. We then jointly design the optimal selection threshold and message transmission rate for maximizing covert throughput under the premise that the detection error of the warden exceeds a certain level. Numerical results are presented to validate our theoretical analyses. It is shown that the multi-jammer assisted covert communication outperforms the conventional single-jammer method in terms of covert throughput, and the maximal covert throughput improves significantly as the total number of helpers increases, which demonstrates the validity and superiority of our proposed scheme.
In this paper, we investigate the optimal design of a wireless-powered covert communication (WP-CC) system, in which a probabilistic accumulate-then-transmit (ATT) protocol is proposed to maximize the communication covertness subject to a quality-of- service (QoS) requirement on communication. Specifically, in the considered WP-CC system, a full-duplex (FD) receiver transmits artificial noise (AN) to simultaneously charge an energy-constrained transmitter and to confuse a wardens detection on the transmitters communication activity. With the probabilistic ATT protocol, the transmitter sends its information with a prior probability, i.e., $p$, conditioned on the available energy being sufficient. Our analysis shows that the probabilistic ATT protocol can achieve higher covertness than the traditional ATT protocol with $p=1$. In order to facilitate the optimal design of the WP-CC system, we also derive the wardens minimum detection error probability and characterize the effective covert rate from the transmitter to the receiver to quantify the communication covertness and quality, respectively. The derived analytical results facilitate the joint optimization of the probability $p$ and the information transmit power. We further present the optimal design of a cable-powered covert communication (CP-CC) system as a benchmark for comparison. Our simulation shows that the proposed probabilistic ATT protocol (with a varying $p$) can achieve the covertness upper bound determined by the CP-CC system, while the traditional ATT protocol (with $p=1$) cannot, which again confirms the benefits brought by the proposed probabilistic ATT in covert communications.
We present a novel relationship between the distribution of circular and non-circular complex Gaussian random variables. Specifically, we show that the distribution of the squared norm of a non-circular complex Gaussian random variable, usually refer red to as squared Hoyt distribution, can be constructed from a conditional exponential distribution. From this fundamental connection we introduce a new approach, the Hoyt transform method, that allows to analyze the performance of a wireless link under Hoyt (Nakagami-q) fading in a very simple way. We illustrate that many performance metrics for Hoyt fading can be calculated by leveraging well-known results for Rayleigh fading and only performing a finite-range integral. We use this technique to obtain novel results for some information and communication-theoretic metrics in Hoyt fading channels.
155 - Shihao Yan , Stephen V. Hanly , 2020
This paper jointly optimizes the flying location and wireless communication transmit power for an unmanned aerial vehicle (UAV) conducting covert operations. This is motivated by application scenarios such as military ground surveillance from airborn e platforms, where it is vital for a UAVs signal transmission to be undetectable by those within the surveillance region. Specifically, we maximize the communication quality to a legitimate ground receiver outside the surveillance region, subject to: a covertness constraint, a maximum transmit power constraint, and a physical location constraint determined by the required surveillance quality. We provide an explicit solution to the optimization problem for one of the most practical constraint combinations. For other constraint combinations, we determine feasible regions for flight, that can then be searched to establish the UAVs optimal location. In many cases, the 2-dimensional optimal location is achieved by a 1-dimensional search. We discuss two heuristic approaches to UAV placement, and show that in some cases they are able to achieve close to optimal, but that in other cases significant gains can be achieved by employing our developed solutions.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا