Covert Wireless Communication with Multi-Domain Uncertainties

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Microwave and Wireless Communications".

Deadline for manuscript submissions: 30 June 2024 | Viewed by 2862

Special Issue Editors


E-Mail Website
Guest Editor
College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
Interests: covert communication; cooperative communications; cognitive radio; physical layer security

E-Mail Website
Guest Editor
Academy of Military Sciences of PLA, Beijing 100091, China
Interests: physical layer security; covert communication; channel coding; MIMO communications systems; cooperative communications; cognitive radio systems
Academy of Military Sciences of PLA, Beijing 100091, China
Interests: physical layer security; short-packet communication; low probability of detection communication; age of information

Special Issue Information

Dear Colleagues,

Due to the broadcast nature of wireless channels, communication security for sensitive information has received much attention. Apart from the communication content, the traffic in wireless channels and the location of nodes are also crucial for security against various attacks, e.g., side channel and brute force attacks. Against this background, covert communication (including also low probability detection communication) has been regarded as a promising technology to provide a high level of security and privacy in wireless networks. In covert communications, the randomness of the wireless environment is exploited to confuse a malicious warden with detection based on the binary hypothesis test. To cause extra uncertainties for warden detection, the randomness in time, space, frequency, power, and coding domains in wireless transmission need to be artfully designed. On the other hand, the metrics adopted for covert communication in various scenarios are different in covert communications, e.g., the timelessness, spectrum efficiency, energy efficiency, etc. In different scenarios, resource allocation also plays an important role in matching the desired metrics.

This Special Issue will focus on investigating fundamental and practical challenges for the analysis and design of covert communication with multi-domain uncertainties, proposing new transmission protocols and schemes for various metrics. More specifically, this Special Issue will bring together leading researchers and developers to present their views on the current trends and challenges, addressing various issues related to covert communication. Prospective authors are invited to submit original manuscripts on the following topics of interest, including but not limited to:

  • Fundamental theory of covert communication
  • Cooperation and relaying in covert communication
  • Covert communication in time-critical networks
  • Covert communication in massive MIMO systems
  • RIS-aided covert communication
  • Covert communication in spectrum sharing systems (cognitive radio, NOMA, etc.)
  • Energy harvesting in covert communication
  • Optimal coding for covert communication
  • Machine learning in covert communication
  • Covert communication in burgeoning scenarios (UAV, backscatter, etc.)
  • Game-based resource allocation in covert communication

Dr. Weiwei Yang
Dr. Yuzhen Huang
Dr. Xingbo Lu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • covert communication
  • physical layer security
  • multi-domain uncertainties
  • transmission strategies
  • resource allocation

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 11400 KiB  
Article
Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications
by Xiaolong Zhang, Jie Liu and Yuzhen Huang
Electronics 2023, 12(13), 2822; https://doi.org/10.3390/electronics12132822 - 26 Jun 2023
Viewed by 776
Abstract
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D [...] Read more.
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D communication model assisted by covert communication, and further propose the notion of effective covert throughput (ECT) to quantitatively characterize the trade-off between the covertness and reliability of IoT state monitoring information transmission. Secondly, in the constructed communication scenario, we analyze the detection error probability of the warden and clarify that the existing equal power transmission of pilot and data signals can minimize the detection performance of the warden. However, this strategy is achieved by compromising the transmission performance of the system, which means that the ECT of D2D pair may not be optimal. Thirdly, we aim to maximize the ECT of D2D pair and construct a joint optimization problem for pilot transmission power, data transmission power, and packet length. Furthermore, a joint optimization algorithm based on the 2D search is adopted to obtain the optimal solution of the established optimization problem. Simulation results demonstrated that the transmission performance of the joint optimization algorithm is better than that of the scheme of the equal power scheme on the premise of ensuring the covertness. Full article
(This article belongs to the Special Issue Covert Wireless Communication with Multi-Domain Uncertainties)
Show Figures

Figure 1

14 pages, 603 KiB  
Article
Covert Communication for Integrated Satellite–Terrestrial Relay Networks with Cooperative Jamming
by Zeke Wu, Kefeng Guo and Shibing Zhu
Electronics 2023, 12(4), 999; https://doi.org/10.3390/electronics12040999 - 17 Feb 2023
Cited by 1 | Viewed by 1407
Abstract
We explore the influence of cooperative jamming on covert communication for integrated satellite–terrestrial relay networks (ISTRN) in this article, where one full-duplex relay is utilized to support communications and acts as a jammer to confuse eavesdroppers. A cooperative scheme is first proposed to [...] Read more.
We explore the influence of cooperative jamming on covert communication for integrated satellite–terrestrial relay networks (ISTRN) in this article, where one full-duplex relay is utilized to support communications and acts as a jammer to confuse eavesdroppers. A cooperative scheme is first proposed to efficiently achieve covert communication in this specific scenario. Further, the probability of detection error (PDE) is derived. Subsequently, the minimum PDE is calculated using the optimal detection threshold. Moreover, a closed-form expression of outage probability (OP) is acquired to quantify the system’s covert performance. Based on this, we design a power optimization algorithm to enhance the effective covert rate under covertness constraints. Lastly, numerical simulation results are given to verify the efficiency of our cooperative jamming scheme when interrupting the eavesdroppers. Notably, an optimal power allocation factor can be obtained, leading to a higher effective covert rate. Full article
(This article belongs to the Special Issue Covert Wireless Communication with Multi-Domain Uncertainties)
Show Figures

Figure 1

Back to TopTop