Contact Us Search Paper

Zero-forcing Beamforming for Jamming Aided Covert Communication in MIMO Systems

He Zhu1,*, and Huihui Wu2

Corresponding Author:

He Zhu

Affiliation(s):

1School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate, Hokkaido, 041-8655, Japan

2Department of Automation, Tsinghua University, 100084, Beijing, China

*Corresponding author

Abstract:

This paper investigates covert wireless communication in a multi-input multi-output (MIMO) system, where a multi-antenna transmitter transmits covert signal to a multi-antenna receiver with the assistance of a multi-antenna jammer employing zero-forcing (ZF) beamforming to avoid detection by a warden equipped with single antenna. For the given scenario, we first provide theoretical modeling for the minimum detection error probability at warden and covert rate from transmitter to receiver. We then explore the optimal beamformer design of the jammer to maximize the covert rate, subjecting to the constraints of covertness, upper bounds of transmitter and jammer transmit power, and beamformer on jammer. We further devise an iterative algorithm to determine the related optimal precoding matrix for covert rate maximization. Finally, we provide extensive numerical results to illustrate the impact of system parameters on covert performance.

Keywords:

Covert communication, multi-input multi-output, zero-forcing beamforming, jamming

Downloads: 39 Views: 197
Cite This Paper:

He Zhu, and Huihui Wu (2023). Zero-forcing Beamforming for Jamming Aided Covert Communication in MIMO Systems. Journal of Networking and Network Applications, Volume 3, Issue 4, pp. 148–154. https://doi.org/10.33969/J-NaNA.2023.030401.

References:

[1] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, Sept. 2016.

[2] A. Hamlin, N. Schear, E. Shen, M. Varia, S. Yakoubov, and A. Yerukhi-movich, Cryptography for big data security. Taylor & Francis LLC, CRC Press, 2016.

[3] N. Kaaniche and M. Laurent, “Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms,” Computer Communications, vol. 111, pp. 120–141, Oct. 2017.

[4] Y. Cao, N. Zhao, Y. Chen, M. Jin, Z. Ding, Y. Li, and F. R. Yu, “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Communications, vol. 27, no. 1, pp. 193–199, Feb. 2019.

[5] X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Robust and secure wireless communications via intelligent reflecting surfaces,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 11, pp. 2637–2652, Nov. 2020.

[6] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable commu-nication with low probability of detection on AWGN channels,” IEEE journal on selected areas in communications, vol. 31, no. 9, pp. 1921–1930, Sept. 2013.

[7] G. Fr`eche, M. R. Bloch, and M. Barret, “Polar codes for covert com-munications over asynchronous discrete memoryless channels,” Entropy, vol. 20, no. 1, p. 3, Dec. 2017.

[8] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” in 2013 IEEE International Symposium on Information Theory. IEEE, Jul. 2013, pp. 2945–2949.

[9] K. S. K. Arumugam and M. R. Bloch, “Covert communication over a K-user multiple-access channel,” IEEE Transactions on Information Theory, vol. 65, no. 11, pp. 7020–7044, Nov. 2019.

[10] L. Wang, “Covert communication over the poisson channel,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 23–31, Jan. 2021.

[11] Z. Liu, J. Liu, Y. Zeng, J. Ma, and Q. Huang, “On covert communication with interference uncertainty,” in 2018 IEEE International Conference on Communications (ICC). IEEE, 2018, pp. 1–6.

[12] Y. Wang, S. Yan, W. Yang, and Y. Cai, “Covert communications with constrained age of information,” IEEE Wireless Communications Letters, vol. 10, no. 2, pp. 368–372, Feb. 2020.

[13] B. He, S. Yan, X. Zhou, and H. Jafarkhani, “Covert wireless communi-cation with a poisson field of interferers,” IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 6005–6017, Sept. 2018.

[14] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert wireless communica-tions with channel inversion power control in rayleigh fading,” IEEE Transactions on Vehicular Technology, vol. 68, no. 12, pp. 12 135–12 149, Dec. 2019.

[15] L. Yang, W. Yang, S. Xu, L. Tang, and Z. He, “Achieving covert wireless communications using a full-duplex multi-antenna receiver,” in 2019 IEEE 5th International Conference on Computer and Communications (ICCC). IEEE, Dec. 2019, pp. 912–916.

[16] K. Shahzad, X. Zhou, and S. Yan, “Covert communication in fading channels under channel uncertainty,” in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, Jun. 2017, pp. 1–5.

[17] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint optimization of a UAV’s trajectory and transmit power for covert communications,” IEEE Transactions on Signal Processing, vol. 67, no. 16, pp. 4276–4290, Aug. 2019.

[18] Y. Jiang, L. Wang, H. Zhao, and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with power domain NOMA,” IEEE Systems Journal, vol. 14, no. 3, pp. 3717–3728, Sept. 2020.

[19] A. Abdelaziz and C. E. Koksal, “Fundamental limits of covert commu-nication over MIMO AWGN channel,” in 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, Oct. 2017, pp. 1–9.

[20] S.-Y. Wang and M. R. Bloch, “Covert MIMO communications un-der variational distance constraint,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4605–4620, Sept. 2021.

[21] W. Xiang, J. Wang, S. Xiao, and W. Tang, “Achieving constant rate covert communication via multiple antennas,” in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, Jun. 2022, pp. 1–6.

[22] O. Shmuel, A. Cohen, and O. Gurewitz, “Multi-antenna jamming in covert communication,” IEEE Transactions on Communications, vol. 69, no. 7, pp. 4644–4658, Jul. 2021.

[23] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert communi-cation using null space and 3D beamforming: Uncertainty of willie’s location information,” IEEE Transactions on Vehicular Technology, vol. 69, no. 8, pp. 8568–8576, Aug. 2020.

[24] C. Liu, G. Geraci, N. Yang, J. Yuan, and R. Malaney, “Beamforming for MIMO gaussian wiretap channels with imperfect channel state infor-mation,” in 2013 IEEE Global Communications Conference (GLOBE-COM), Dec. 2013, pp. 3253–3258.

[25] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert commu-nications with a full-duplex receiver over wireless fading channels,” in 2018 IEEE International Conference on Communications (ICC). IEEE, May 2018, pp. 1–6.

[26] J. Bai, J. He, Y. Chen, Y. Shen, and X. Jiang, “On covert communication performance with outdated csi in wireless greedy relay systems,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2920–2935, Aug. 2022.

[27] D. B. Cheikh, J.-M. Kelif, M. Coupechoux, and P. Godlewski, “Mul-ticellular zero forcing precoding performance in rayleigh and shadow fading,” in 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring). IEEE, May 2011, pp. 1–5.

[28] G. Tsoulos, MIMO system technology for wireless communications. CRC press, 2018.

[29] Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, “Algorithms for secrecy guarantee with null space beamforming in two-way relay networks,” IEEE transactions on signal processing, vol. 62, no. 8, pp. 2111–2126, Jan. 2014.

[30] S. Ma, Y. Zhang, H. Li, S. Lu, N. Al-Dhahir, S. Zhang, and S. Li, “Robust beamforming design for covert communications,” IEEE Trans-actions on Information Forensics and Security, vol. 16, pp. 3026–3038, Apr. 2021.

[31] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20–34, May 2010.