Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
125 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Covert Communication for Untrusted UAV-Assisted Wireless Systems (2403.09475v1)

Published 14 Mar 2024 in cs.CR

Abstract: Wireless systems are of paramount importance for providing ubiquitous data transmission for smart cities. However, due to the broadcasting and openness of wireless channels, such systems face potential security challenges. UAV-assisted covert communication is a supporting technology for improving covert performances and has become a hot issue in the research of wireless communication security. This paper investigates the performance of joint covert and security communication in a tow-hop UAV-assisted wireless system, where a source transmits the covert message to a destination with the help of an untrusted UAV. We first design a transmission scheme such that use UAVs to assist in covert communications while ensuring the security of covert messages. Then, we develop a theoretical model to derive the expressions for the detection error probability of the warden and the covert and security rate, and the maximum covert and security rate is optimized by power control under a given covertness and security requirements. Finally, numerical results are provided to illustrate our theoretical analysis and the performance of covert and security communication in such systems.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (26)
  1. K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi, and M. Mustaqim, “Internet of things (iot) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5g-iot scenarios,” IEEE Access, vol. 8, pp. 23 022–23 040, 2020.
  2. Y. Liu, W. Yu, W. Rahayu, and T. Dillon, “An evaluative study on iot ecosystem for smart predictive maintenance (iot-spm) in manufacturing: Multiview requirements and data quality,” IEEE Internet of Things Journal, vol. 10, no. 13, pp. 11 160–11 184, 2023.
  3. S. Lee, H. Choi, T. Kim, H.-S. Park, and J. K. Choi, “A novel energy-conscious access point (eap) system with cross-layer design in wi-fi networks for reliable iot services,” IEEE Access, vol. 10, pp. 61 228–61 248, 2022.
  4. L. Chettri and R. Bera, “A comprehensive survey on internet of things (iot) toward 5g wireless systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16–32, 2020.
  5. M. Mitev, A. Chorti, H. V. Poor, and G. P. Fettweis, “What physical layer security can do for 6g security,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 375–388, 2023.
  6. B. Che, C. Gao, R. Ma, X. Zheng, and W. Yang, “Covert wireless communication in multichannel systems,” IEEE Wireless Communications Letters, vol. 11, no. 9, pp. 1790–1794, 2022.
  7. B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on awgn channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1921–1930, 2013.
  8. W. Xiong, Y. Yao, X. Fu, and S. Li, “Covert communication with cognitive jammer,” IEEE Wireless Communications Letters, vol. 9, no. 10, pp. 1753–1757, 2020.
  9. W. He, J. Chen, G. Li, H. Wang, X. Chu, R. He, Y. Xu, and Y. Jiao, “Optimal transmission probabilities of information and artificial noise in covert communications,” IEEE Communications Letters, vol. 26, no. 12, pp. 2865–2869, 2022.
  10. T. T. Nguyen, N. C. Luong, S. Feng, K. Elbassioni, and D. Niyato, “Jamming-based covert communication for rate-splitting multiple access,” IEEE Transactions on Vehicular Technology, vol. 72, no. 8, pp. 11 074–11 079, 2023.
  11. X. Chen, N. Zhang, J. Tang, M. Liu, N. Zhao, and D. Niyato, “Uav-aided covert communication with a multi-antenna jammer,” IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 11 619–11 631, 2021.
  12. R. Ma, X. Yang, G. Pan, X. Guan, Y. Zhang, and W. Yang, “Covert communications with channel inversion power control in the finite blocklength regime,” IEEE Wireless Communications Letters, vol. 10, no. 4, pp. 835–839, 2021.
  13. M. Wang, W. Yang, X. Lu, C. Hu, B. Liu, and X. Lv, “Channel inversion power control aided covert communications in uplink noma systems,” IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 871–875, 2022.
  14. R. He, G. Li, H. Wang, Y. Jiao, and J. Cai, “Adaptive power control for cooperative covert communication with partial channel state information,” IEEE Wireless Communications Letters, vol. 11, no. 7, pp. 1428–1432, 2022.
  15. T.-X. Zheng, Z. Yang, C. Wang, Z. Li, J. Yuan, and X. Guan, “Wireless covert communications aided by distributed cooperative jamming over slow fading channels,” IEEE Transactions on Wireless Communications, vol. 20, no. 11, pp. 7026–7039, 2021.
  16. R. Xu, D. Guo, B. Zhang, and G. Ding, “Finite blocklength covert communications with random selection of channel use,” IEEE Wireless Communications Letters, vol. 10, no. 9, pp. 2085–2089, 2021.
  17. K.-H. Cho and S.-H. Lee, “Covert communication over gaussian multiple-access channels with feedback,” IEEE Wireless Communications Letters, vol. 11, no. 9, pp. 1985–1989, 2022.
  18. Y. Su, H. Sun, Z. Zhang, Z. Lian, Z. Xie, and Y. Wang, “Covert communication with relay selection,” IEEE Wireless Communications Letters, vol. 10, no. 2, pp. 421–425, 2021.
  19. L. Lv, Z. Li, H. Ding, N. Al-Dhahir, and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 760–773, 2022.
  20. R. Sun, B. Yang, S. Ma, Y. Shen, and X. Jiang, “Covert rate maximization in wireless full-duplex relaying systems with power control,” IEEE Transactions on Communications, vol. 69, no. 9, pp. 6198–6212, 2021.
  21. J.-Y. Wang, D.-P. Su, P. Feng, N. Liu, and J.-B. Wang, “Optimal height of uav in covert visible light communications,” IEEE Communications Letters, vol. 27, no. 10, pp. 2682–2686, 2023.
  22. Y. Su, S. Fu, J. Si, C. Xiang, N. Zhang, and X. Li, “Optimal hovering height and power allocation for uav-aided noma covert communication system,” IEEE Wireless Communications Letters, vol. 12, no. 6, pp. 937–941, 2023.
  23. H. Rao, S. Xiao, S. Yan, J. Wang, and W. Tang, “Optimal geometric solutions to uav-enabled covert communications in line-of-sight scenarios,” IEEE Transactions on Wireless Communications, vol. 21, no. 12, pp. 10 633–10 647, 2022.
  24. X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “Uav-relayed covert communication towards a flying warden,” IEEE Transactions on Communications, vol. 69, no. 11, pp. 7659–7672, 2021.
  25. C. Wang, Z. Li, T.-X. Zheng, D. W. K. Ng, and N. Al-Dhahir, “Intelligent reflecting surface-aided full-duplex covert communications: Information freshness optimization,” IEEE Transactions on Wireless Communications, vol. 22, no. 5, pp. 3246–3263, 2023.
  26. L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted noma systems: Design, analysis, and optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1735–1750, 2022.

Summary

We haven't generated a summary for this paper yet.