Contact Us Search Paper

Covert Communication with a Multi-Antenna Warden in Noise Uncertainty UAV-Assisted Wireless Systems

Xiaomeng Xue, Chan Gao*, Linying Tian, and Bingbing Xiao

Corresponding Author:

Chan Gao

Affiliation(s):

School of Cybersecurity, Xi’an University of Posts and Telecommunications, Xi’an , Shaanxi, 710121, China

*Corresponding author

Abstract:

Covert communication ensures the security of information transmission mainly by hiding the existence of the wireless communication process. In this paper, we investigate the covert performance of wireless communication systems in amplify-and-forward unidirectional networks by using unmanned aerial vehicles (UAV) as a relay under the detection from a multi-antenna warden. We propose a cooperative jamming transmission scheme to counteract the detection of a multi-antenna warden that transmits artificial noise of variable power to all participants in a communication system. Based on the transmission scheme, we first develop a theoretical model to derive the expressions for the detection error probability and the optimal detection threshold of the warden. Then, we derive the expressions for the transmission rate to explore the optimal covert performance under a given covertness condition. Finally, the simulation results show the impact of the artificial noise and the noise uncertainty on the covert performance while validating the effectiveness of the scheme.

Keywords:

Covert communication, multi-antenna warden, UAV-assisted system, noise uncertainty

Downloads: 35 Views: 372
Cite This Paper:

Xiaomeng Xue, Chan Gao, Linying Tian, and Bingbing Xiao (2024). Covert Communication with a Multi-Antenna Warden in Noise Uncertainty UAV-Assisted Wireless Systems. Journal of Networking and Network Applications, Volume 4, Issue 3, pp. 129–136. https://doi.org/10.33969/J-NaNA.2024.040304.

References:

[1] W. Yang, X. Lu, S. Yan, F. Shu, and Z. Li, “Age of information for short-packet covert communication,” IEEE Wireless Communications Letters, vol. 10, no. 9, pp. 1890–1894, 2021.

[2] S. K. Sakib, G. T. Amariucai, and Y. Guan, “Variations and extensions of information leakage metrics with ap-plications to privacy problems with imperfect statistical information,” 2023 IEEE 36th Computer Security Foun-dations Symposium (CSF), pp. 407–422, 2023.

[3] T. Nazzal and H. Mukhtar, “Evaluation of key-based physical layer security systems,” 2021 4th International Conference on Signal Processing and Information Security (ICSPIS), pp. 84–87, 2021.

[4] H. Wei, B. Zheng, and X. Hou, “Compressive channel sensing based on random pilot for physical layer com-munication security,” 2013 22nd Wireless and Optical Communication Conference, pp. 693–698, 2013.

[5] S. Yan, X. Zhou, J. Hu, and S. V. Hanly, “Low probabil-ity of detection communication: Opportunities and chal-lenges,” IEEE Wireless Communications, vol. 26, no. 5, pp. 19–25, 2019.

[6] L. Huang, J. Lei, and Y. Huang, “Spatial modulation covert communication assisted by artificial noise,” 2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops), pp. 1–6, 2023.

[7] M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via intelligent reflecting surface,” IEEE Wireless Communications Letters, vol. 8, no. 5, pp. 1410–1414, 2019.

[8] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint optimization of a uav’s trajectory and transmit power for covert communications,” IEEE Transactions on Signal Processing, vol. 67, no. 16, pp. 4276–4290, 2019.

[9] Y. Yang, S. Shen, Y. She, W. Wang, B. Yang, and Y. Gao, “Joint covert and secure communications for intelligent reflecting surface (irs)-aided wireless networks,” 2023 International Conference on Networking and Network Applications (NaNA), pp. 138–142, 2023.

[10] C. Chen, M. Wang, B. Xia, Y. Guo, and J. Wang, “Performance analysis and optimization of irs-aided covert communication with hardware impairments,” IEEE Trans-actions on Vehicular Technology, vol. 72, no. 4, pp. 5463–5467, 2023.

[11] Y. Zeng, Q. Wu, and R. Zhang, “Accessing from the sky: A tutorial on uav communications for 5g and beyond,” Proceedings of the IEEE, vol. 107, no. 12, pp. 2327–2375, 2019.

[12] Z. Wei, M. Zhu, N. Zhang, L. Wang, Y. Zou, Z. Meng, H. Wu, and Z. Feng, “Uav-assisted data collection for internet of things: A survey,” IEEE Internet of Things Journal, vol. 9, no. 17, pp. 15 460–15 483, 2022.

[13] N. Zhao, W. Lu, M. Sheng, Y. Chen, J. Tang, F. R. Yu, and K.-K. Wong, “Uav-assisted emergency networks in disasters,” IEEE Wireless Communications, vol. 26, no. 1, pp. 45–51, 2019.

[14] H. Q. Ta and S. W. Kim, “Covert communication under channel uncertainty and noise uncertainty,” ICC 2019 -2019 IEEE International Conference on Communications (ICC), pp. 1–6, 2019.

[15] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert communication in the presence of an uninformed jammer,” IEEE Transactions on Wireless Communications, vol. 16, no. 9, pp. 6193–6206, 2017.

[16] L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, “Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming,” 2016 IEEE International Conference on Communications (ICC), pp. 1–5, 2016.

[17] P. M. Shemi, M. G. Jibukumar, and M. A. Ali, “Artificial noise aided secrecy enhancement in amplify-and-forward relay networks,” 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 192–196, 2018.

[18] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walken-horst, “Achieving undetectable communication,” IEEE Journal of Selected Topics in Signal Processing, vol. 9, no. 7, pp. 1195–1205, 2015.

[19] Q. Guo, “Application research of multi-antenna tech-nology in 5ghz modulation system,” 2022 IEEE 2nd International Conference on Electronic Technology, Com-munication and Information (ICETCI), pp. 158–161, 2022.

[20] S.-Y. Wang and M. R. Bloch, “Covert mimo communica-tions under variational distance constraint,” IEEE Trans-actions on Information Forensics and Security, vol. 16, pp. 4605–4620, 2021.

[21] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu and J. Li, “Achieving covert wireless communications using a full-duplex receiver,” in IEEE Transactions on Wireless Communications, vol. 17, no. 12, pp. 8517-8530, 2018.