Papers
Topics
Authors
Recent
Search
2000 character limit reached

On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay

Published 9 Apr 2024 in cs.IT and math.IT | (2404.05983v1)

Abstract: Covert communication's effectiveness critically depends on precise channel state information (CSI). This paper investigates the impact of imperfect CSI on achievable covert communication performance in a two-hop relay system. Firstly, we introduce a two-hop covert transmission scheme utilizing channel inversion power control (CIPC) to manage opportunistic interference, eliminating the receiver's self-interference. Given that CSI estimation error (CEE) and feedback delay (FD) are the two primary factors leading to imperfect CSI, we construct a comprehensive theoretical model to accurately characterize their effects on CSI quality. With the aid of this model, we then derive closed-form solutions for detection error probability (DEP) and covert rate (CR), establishing an analytical framework to delineate the inherent relationship between CEE, FD, and covert performance. Furthermore, to mitigate the adverse effects of imperfect CSI on achievable covert performance, we investigate the joint optimization of channel inversion power and data symbol length to maximize CR under DEP constraints and propose an iterative alternating algorithm to solve the bi-dimensional non-convex optimization problem. Finally, extensive experimental results validate our theoretical framework and illustrate the impact of imperfect CSI on achievable covert performance.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (31)
  1. B. A. Bash, D. Goeckel and D. Towsley, “Square root law for communication with low probability of detection on AWGN channels,” in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 448-452.
  2. I. Makhdoom, M. Abolhasan and J. Lipman, “A Comprehensive Survey of Covert Communication Techniques Limitations and Future Challenges,” Comput. Secur., pp. 102784, 2022.
  3. Y. Jiang, L. Wang, H. Zhao and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with power domain NOMA,” IEEE Syst. J., vol. 14, no. 3, pp. 3717-3728, Sept. 2020.
  4. L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, D. Chen, “Covert communication in downlink NOMA systems with random transmit power,” IEEE Wirel. Commun. Lett., vol. 9, no. 11, pp. 2000-2004, Nov. 2020.
  5. Y. Cheng, J. Lu, D. Niyato, B. Lyu, M. Xu and S. Zhu, “Performance analysis of jammer-aided covert RIS-NOMA systems,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Rio de Janeiro, Brazil, Dec. 2022, pp. 2716-2721.
  6. L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design analysis and optimization” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735-1750, Mar. 2022.
  7. Y. Su, H. Sun, Z. Zhang, Z. Lian, Z. Xie and Y. Wang, “Covert communication with relay selection,” IEEE Wirel. Commun. Lett., vol. 10, no. 2, pp. 421-425, Feb. 2021.
  8. C. Gao, B. Yang, X. Jiang, H. Inamura and M. Fukushi, “Covert communication in relay-assisted IoT systems,” IEEE Internet Things J., vol. 8, no. 8, pp. 6313-6323, 15 Apr. 2021.
  9. C. Gao, B. Yang, D. Zheng, X. Jiang and T. Taleb, “Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems,” IEEE Trans. Commun., Oct. 2023.
  10. S.-Y. Wang and M. R. Bloch, “Covert MIMO communications under variational distance constraint,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 4605-4620, 2021.
  11. L. Bai, J. Xu and L. Zhou, “Covert communication for spatially sparse mmwave massive MIMO channels,” IEEE Trans. Commun., vol. 71, no. 3, pp. 1615-1630, Mar. 2023.
  12. J. Hu, S. Yan, X. Zhou, F. Shu and J. Li, “Covert wireless communications with channel inversion power control in Rayleigh fading,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12135-12149, Dec. 2019.
  13. Z. Hadzi-Velkov, S. Pejoski and N. Zlatanov, “Achieving near ideal covertness in NOMA systems with channel inversion power control,” IEEE Commun. Lett., vol. 26, no. 11, pp. 2542-2546, Aug. 2022.
  14. M. Wang, W. Yang, X. Lu, C. Hu, B. Liu and X. Lv, “Channel inversion power control aided covert communications in uplink NOMA systems,” IEEE Wireless Commun. Lett., vol. 11, no. 4, pp. 871-875, Apr. 2022.
  15. K. Shahzad, X. Zhou and S. Yan, “Covert communication in fading channels under channel uncertainty,” in Proc. IEEE 85th Veh. Technol. Conf., Sydney, NSW, Australia, Jun. 2017, pp. 1-5.
  16. L. Lv, Z. Li, H. Ding, N. Al-Dhahir and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 760-773, 2022.
  17. J. Wang, W. Tang, Q. Zhu, X. Li, H. Rao and S. Li, “Covert communication with the help of relay and channel uncertainty” IEEE Wireless Commun. Lett., vol. 8, no. 1, pp. 317-320, Feb. 2019.
  18. K. Shahzad and X. Zhou, “Covert wireless communications under quasi-static fading with channel uncertainty,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1104-1116, Oct. 2021.
  19. J. Bai, J. He, Y. Chen, Y. Shen and X. Jiang, “On covert communication performance with outdated CSI in wireless greedy relay systems,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 2920-2935, Aug. 2022.
  20. E. N. Onggosanusi, A. Gatherer, A. G. Dabak and S. Hosur, “Performance analysis of closed-loop transmit diversity in the presence of feedback delay,” IEEE Trans. Commun., vol. 49, no. 9, pp. 1618-1630, Sept. 2001.
  21. E. Visotsky and U. Madhow, “Space-time transmit precoding with imperfect feedback” IEEE Trans. Inf. Theory, vol. 47, no. 6, pp. 2632-2639, Sept. 2001.
  22. A. Sheikholeslami, M. Ghaderi, D. Towsley, B. A. Bash, S. Guha and D. Goeckel, “Multi-Hop Routing in Covert Wireless Networks,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 3656-3669, June 2018.
  23. H. Wang, Y. Zhang, X. Zhang and Z. Li, “Secrecy and covert communications against UAV surveillance via multi-hop networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 389-401, Jan. 2020.
  24. H.-S. Im and S.-H. Lee, “Mobility-assisted covert communication over wireless ad hoc networks,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1768–1781, 2021.
  25. D. Song, Z. Yang, G. Pan, S. Wang and J. An, “RIS-Assisted Covert Transmission in Satellite-Terrestrial Communication Systems,” IEEE Internet Things J., vol. 10, no. 22, pp. 19415-19426, 15 Nov.15, 2023.
  26. K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu and J. Li, “Achieving covert wireless communications using a full-duplex receiver,” IEEE Trans. Wireless Commun., vol. 17, no. 12, pp. 8517-8530, Dec. 2018.
  27. Y. Liu, H. Wu, X. Jiang, “Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems,” Ad Hoc Networks., Vol. 148, pp. 103207, Jun. 2023.
  28. M. C. Gursoy, “On the capacity and energy efficiency of training-based transmissions over fading channels,” IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4543–4567, Oct. 2009.
  29. B. He and X. Zhou, “Secure on-off transmission design with channel estimation errors” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1923-1936, Dec. 2013.
  30. A.P. Dawid, “Conditional independence in statistical theory,” J. Roy. Sta. Soc. B, Stat. Methodol., vol. 41, no. 1, pp. 1-15, 1979.
  31. U. Niesen, D. Shah, and G. W. Wornell, “Adaptive alternating minimization algorithms,” IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1423-1429, Mar. 2009.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.