Contact Us Search Paper

On Covert Communication Performance in Multi-relay Systems with Outdated CSI

Jiaqing Bai1

Corresponding Author:

Jiaqing Bai

Affiliation(s):

1School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate, Hokkaido, 041-8655, Japan

Abstract:

Communication performance significantly depends on the availability of Channel State Information (CSI). This paper investigates the impact of outdated CSI on achievable covert communication performance in a multiple-relay system under a power control scheme. Considering the feedback delay of all links, we first develop an accurate characterization of outdated CSI. Based on this, we formulate theoretical models to depict the inherent relationship between outdated CSI and fundamental covert performance metrics, namely detection error probability (DEP) and covert rate (CR). Utilizing these models, we delve into optimizing CR subject to the DEP constraint, unveiling the maximal CR performance achievable with outdated CSI. Extensive numerical results illustrate the impact of outdated CSI on covert communication performance, also indicating that an increase in the number of relays can mitigate the negative effects of outdated CSI.

Keywords:

Covert Communication, Outdated CSI, Multiple-relay, Detection Error Probability, Maximal CR

Downloads: 31 Views: 168
Cite This Paper:

Jiaqing Bai (2023). On Covert Communication Performance in Multi-relay Systems with Outdated CSI. Journal of Networking and Network Applications, Volume 3, Issue 4, pp. 182–188. https://doi.org/10.33969/J-NaNA.2023.030405.

References:

[1] X. Chen et al., ”Covert communications: A comprehensive survey”, IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173-1198, 2nd Quart. 2023.

[2] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26–31, Dec. 2015.

[3] B. A. Bash, D. Goeckel and D. Towsley, “Square root law for commu-nication with low probability of detection on AWGN channels,” in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 448-452.

[4] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 2945–2949.

[5] L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits of commu-nication with low probability of detection,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3493–3503, Jun. 2016.

[6] K. S. K. Arumugam and M. R. Bloch, “Keyless covert communication over multiple-access channels,” in Proc. IEEE Int. Symp. Inf. Theory, Barcelona, Spain, Jul. 2016, pp. 2229-2233.

[7] L. Wang, “The continuous-time Poisson channel has infinite covert communication capacity,” in Proc. IEEE Int. Symp. Inf. Theory, Vail, CO, USA, Jun. 2018, pp. 756-760.

[8] L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, D. Chen, “Covert communi-cation in downlink NOMA systems with random transmit power,” IEEE Wirel. Commun. Lett., vol. 9, no. 11, pp. 2000-2004, Nov. 2020.

[9] Y. Jiang, L. Wang, H. Zhao and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with power domain NOMA,” IEEE Syst. J., vol. 14, no. 3, pp. 3717-3728, Sept. 2020.

[10] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li and F. Shu, “Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications,” IEEE Trans. Signal Process., vol. 67, no. 16, pp. 4276-4290, 15 Aug. 2019.

[11] X. Jiang, Z. Yang, N. Zhao, Y. Chen, Z. Ding and X. Wang, “Resource allocation and trajectory optimization for UAV-enabled multi-user covert communications,” IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 1989-1994, Feb. 2021.

[12] B. Yang, T. Taleb, Y. Fan and S. Shen, “Mode selection and cooperative jamming for covert communication in D2D underlaid UAV networks,” IEEE Netw., vol. 35, no. 2, pp. 104-111, Mar. 2021.

[13] S. Yan, S. V. Hanly and I. B. Collings, “Optimal Transmit Power and Flying Location for UAV Covert Wireless Communications,” IEEE J. Sel. Area. Commun., vol. 39, no. 11, pp. 3321-3333, Nov. 2021.

[14] Y. Jiang, L. Wang, and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with antenna array assisted artificial noise transmission,” IEEE Trans. Veh. Technol., vol. 69, no. 3, pp. 2980–2992, Mar. 2020.

[15] H. Rao, M. Wu, J. Wang, W. Tang, S. Xiao, and S. Li, “D2D covert communications with safety area,” IEEE Syst. J., vol. 15, no. 2, pp. 2331–2341, Jun. 2021.

[16] R. Sun, B. Yang, Y. Shen, X. Jiang and T. Taleb, “Covertness and secrecy study in untrusted relay-assisted D2D networks,” IEEE Internet Things J., vol. 10, no. 1, pp. 17-30, Jan. 2023.

[17] S. Qiao, D. Cao, Q. Zhang, Y. Xu and G. Liu,, “Covert communication gains from adversary’s uncertainty of phase angles,” IEEE Trans. Inf. Forensics Security, vol. 18, pp. 2899-2912, 2023.

[18] S.-Y. Wang and M. R. Bloch, “Covert MIMO communications under variational distance constraint,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 4605-4620, 2021.

[19] M. Forouzesh, P. Azmi, N. Mokari and D. Goeckel, “Covert Commu-nication Using Null Space and 3D Beamforming Uncertainty of Willie’s Location Information,” IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8568-8576, Aug. 2020.

[20] S. Ma et al., “Robust Beamforming Design for Covert Communica-tions,”IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3026-3038, 2021.

[21] A. Sheikholeslami, M. Ghaderi, D. Towsley, B. A. Bash, S. Guha and D. Goeckel, “Multi-Hop Routing in Covert Wireless Networks,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 3656-3669, June 2018.

[22] H. Wang, Y. Zhang, X. Zhang and Z. Li, “Secrecy and covert commu-nications against UAV surveillance via multi-hop networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 389-401, Jan. 2020.

[23] J. Hu, S. Y an, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4766–4779, Jul. 2018.

[24] L. Lv, Z. Li, H. Ding, N. Al-Dhahir and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 760-773, 2022.

[25] H. Wu, Y. Zhang, X. Liao, Y. Shen, X. Jiang, “On covert throughput performance of two-way relay covert wireless communications,” Wirel. Netw., vol. 26, no. 5, pp. 3275-3289, Jan. 2020.

[26] D. Deng, X. Li, S. Dang, M. C. Gursoy and A. Nallanathan, ”Covert communications in intelligent reflecting surface-assisted two-way relaying networks”, IEEE Trans. Veh. Technol., vol. 71, no. 11, pp. 12380-12385, Nov. 2022.

[27] X. Zhou, S. Yan, Q. Wu, F. Shu and D. W. K. Ng, “Intelligent Reflecting Surface (IRS)-Aided Covert Wireless Communications With Delay Constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532- 547, Jan. 2022.

[28] X. Chen, T. -X. Zheng, L. Dong, M. Lin and J. Yuan, “Enhancing MIMO Covert Communications via Intelligent Reflecting Surface,” IEEE Wireless Commun. Lett., vol. 11, no. 1, pp. 33-37, Jan. 2022.

[29] Y. Su, H. Sun, Z. Zhang, Z. Lian, Z. Xie and Y. Wang, “Covert communication with relay selection,” IEEE Wirel. Commun. Lett., vol. 10, no. 2, pp. 421-425, Feb. 2021.

[30] C. Gao, B. Yang, D. Zheng, X. Jiang and T. Taleb, “Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems,” IEEE Trans. Commun., Oct. 2023.

[31] Y. Liu, H. Wu, X. Jiang, “Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems,” Ad Hoc Networks., Vol. 148, pp. 103207, Jun. 2023.

[32] C. Gao, B. Yang, X. Jiang, H. Inamura and M. Fukushi, “Covert communication in relay-assisted IoT systems,” IEEE Internet Things J., vol. 8, no. 8, pp. 6313-6323, 15 Apr. 2021.

[33] D. Song, Z. Yang, G. Pan, S. Wang and J. An, “RIS-Assisted Covert Transmission in Satellite-Terrestrial Communication Systems,” IEEE In-ternet Things J., vol. 10, no. 22, pp. 19415-19426, 15 Nov.15, 2023.

[34] J. Bai, J. He, Y. Chen, Y. Shen and X. Jiang, “On Covert Communication Performance with Outdated CSI in Wireless Greedy Relay Systems,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 2920-2935, Aug. 2022.

[35] S. Zhou and G. B. Giannakis, “Adaptive modulation for multiantenna transmissions with channel mean feedback,” IEEE Trans. Wireless Com-mun., vol. 3, no. 5, pp. 1626-1636, Sept. 2004.

[36] J. L. Vicario, A. Bel, J. A. Lopez-salcedo and G. Seco, “Opportunistic relay selection with outdated CSI: outage probability and diversity anal-ysis,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2872-2876, Jun. 2009.

[37] D. S. Michalopoulos, H. A. Suraweera, G. K. Karagiannidis and R. Schober, “Amplify-and-forward relay selection with outdated channel estimates,” IEEE Trans. Commun., vol. 60, no. 5, pp. 1278-1290, May 2012.

[38] P. Dent, G. E. Bottomley, and T. Croft, “Jakes fading model revisited,” Electron. Lett., vol. 29, no. 13, pp. 1162–1163, Jun. 1993.

[39] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 7th edition. Academic, 2007.

[40] L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, D. Chen, “Covert communi-cation in downlink NOMA systems with random transmit power,” IEEE Wirel. Commun. Lett., vol. 9, no. 11, pp. 2000-2004, Nov. 2020.