Contact Us Search Paper

Partial Relay Selection for Covert Communication in Two-Hop Relay Systems

Yan Liu1,*, Huihui Wu2

Corresponding Author:

Yan Liu

Affiliation(s):

1School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate, Hokkaido, 041-8655, Japan

2Department of Automation, Tsinghua University, Beijing, 100084, China

*Corresponding author

Abstract:

This paper investigates the impact of relay selection on covert communication performance in a two-hop wireless relay system, where a transmitter intends to transmit messages to a receiver via a selected relay, subjecting to detection from a warden. To this end, we first propose a partial relay selection scheme based on the signal-to-interference-plus-noise-ratio (SINR) at the relay. We then provide theoretical models for the detection error probability, transmission outage probability, and covert rate. We further explore the optimal designs of the transmit power and target transmission rate for the covert rate, subjecting to the constraints of covertness and the upper bound of transmit power. Finally, we provide extensive numerical results to illustrate the covert rate performance via the partial relay selection scheme in a two-hop relay system.

Keywords:

two-hop wireless networks, covert communication, relay selection, covert rate

Downloads: 43 Views: 181
Cite This Paper:

Yan Liu, Huihui Wu (2023). Partial Relay Selection for Covert Communication in Two-Hop Relay Systems. Journal of Networking and Network Applications, Volume 3, Issue 4, pp. 155–161. https://doi.org/10.33969/J-NaNA.2023.030402.

References:

[1] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable commu-nication with low probability of detection on AWGN channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1921–1930, 2013.

[2] B. He, S. Yan, X. Zhou, and H. Jafarkhani, “Covert wireless communi-cation with a poisson field of interferers,” IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 6005–6017, 2018.

[3] Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical layer security in cognitive radio inspired noma network,” IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 3, pp. 700–714, 2019.

[4] K. Cao, H. Ding, B. Wang, L. Lv, J. Tian, Q. Wei, and F. Gong, “Enhancing physical-layer security for iot with nonorthogonal multiple access assisted semi-grant-free transmission,” IEEE Internet of Things Journal, vol. 9, no. 24, pp. 24 669–24 681, 2022.

[5] L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted noma systems: Design, analysis, and optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1735–1750, 2021.

[6] H. Wu, Y. Zhang, X. Liao, Y. Shen, and X. Jiang, “On covert throughput performance of two-way relay covert wireless communications,” Wireless Networks, vol. 26, pp. 3275–3289, 2020.

[7] X. Jiang, X. Chen, J. Tang, N. Zhao, X. Y. Zhang, D. Niyato, and K.-

K. Wong, “Covert communication in uav-assisted air-ground networks,” IEEE Wireless Communications, vol. 28, no. 4, pp. 190–197, 2021.

[8] J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 4766–4779, 2018.

[9] J. Bai, J. He, Y. Chen, Y. Shen, and X. Jiang, “On covert communication performance with outdated csi in wireless greedy relay systems,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2920–2935, 2022.

[10] M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Covert commu-nication and secure transmission over untrusted relaying networks in the presence of multiple wardens,” IEEE Transactions on Communications, vol. 68, no. 6, pp. 3737–3749, 2020.

[11] R. Sun, B. Yang, S. Ma, Y. Shen, and X. Jiang, “Covert rate maximiza-tion in wireless full-duplex relaying systems with power control,” IEEE Transactions on Communications, vol. 69, no. 9, pp. 6198–6212, 2021. 

[12] L. Lv, Z. Li, H. Ding, N. Al-Dhahir, and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 760–773, 2022.

[13] M. Wang, Z. Xu, B. Xia, Y. Guo, and Z. Chen, “Df relay assisted covert communications: Analysis and optimization,” IEEE Transactions on Vehicular Technology, vol. 72, no. 3, pp. 4073–4078, 2022.

[14] Y. Su, H. Sun, Z. Zhang, Z. Lian, Z. Xie, and Y. Wang, “Covert communication with relay selection,” IEEE Wireless Communications Letters, vol. 10, no. 2, pp. 421–425, 2020.

[15] C. Gao, B. Yang, X. Jiang, H. Inamura, and M. Fukushi, “Covert communication in relay-assisted iot systems,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6313–6323, 2021.

[16] J. Jiang, W. Yang, and R. Ma, “Joint relay and jammer selection for covert communication,” in 2021 7th International Conference on Computer and Communications (ICCC). IEEE, 2021, pp. 131–135.

[17] C. Gao, B. Yang, D. Zheng, X. Jiang, and T. Taleb, “Cooperative jamming and relay selection for covert communications in wireless relay systems,” IEEE Transactions on Communications, 2023.

[18] L. Sun, T. Xu, S. Yan, J. Hu, X. Yu, and F. Shu, “On resource allocation in covert wireless communication with channel estimation,” IEEE Transactions on Communications, vol. 68, no. 10, pp. 6456–6469, 2020.

[19] X. Chen, N. Zhang, J. Tang, M. Liu, N. Zhao, and D. Niyato, “Uav-aided covert communication with a multi-antenna jammer,” IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 11 619–11 631, 2021.

[20] X. Jiang, P. Li, Y. Zou, B. Li, and R. Wang, “Secure transmission for wireless communication systems with friendly jammers,” IEEE Transac-tions on Vehicular Technology, 2023.

[21] H. Wu, Y. Zhang, Y. Shen, X. Jiang, and T. Taleb, “Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks,” IEEE Internet of Things Journal, 2023.

[22] S. S. Soliman and N. C. Beaulieu, “Exact analysis of dual-hop af maximum end-to-end snr relay selection,” IEEE Transactions on Com-munications, vol. 60, no. 8, pp. 2135–2145, 2012.

[23] A. Papoulis and S. Unnikrishna Pillai, Probability, random variables and stochastic processes, 2002.