Next Article in Journal
Correction: Palacín et al. Evaluation of the Path-Tracking Accuracy of a Three-Wheeled Omnidirectional Mobile Robot Designed as a Personal Assistant. Sensors 2021, 21, 7216
Previous Article in Journal
Research on Low-Voltage Arc Fault Based on CNN–Transformer Parallel Neural Network with Threshold-Moving Optimization
Previous Article in Special Issue
Clipping Noise Compensation for Overlapped Time Domain Multiplexing toward Low Peak-to-Average Power Ratio
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Covert Communications in a Hybrid DF/AF Relay System

Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea
Sensors 2024, 24(20), 6518; https://doi.org/10.3390/s24206518
Submission received: 24 August 2024 / Revised: 25 September 2024 / Accepted: 8 October 2024 / Published: 10 October 2024
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)

Abstract

:
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages such as confidential or sensitive information and avoid detection by the covert message detector embedded on the relay. We first establish an optimal DF/AF mode selection criterion to maximize the covert rate based on the analyses of delay-aware achievable covert rates of individual DF and AF modes. To further reduce the time complexity, we propose a low-complexity selection criterion as well for practical use. The numerical results demonstrate the covert rate gain as high as 50% and running time gain as high as 20% for particular system parameters, which verify the effectiveness of the proposed criteria.

1. Introduction

As wireless technology pervades our daily routines, security and privacy threats have increasingly become paramount concerns nowadays [1]. To ensure the security of wireless transmissions, covert communications, or low-probability-of-detection communications, has been considered as a promising physical layer security technology, which focuses on hiding the very existence of a confidential communications link [2]. It is a particularly useful technology for critical environments such as battlefields, security facilities, and financial institutions where the mere detection or metadata of data traffic could compromise the whole system [3].
The survey paper [4] has explored a vast number of works on covert communications, ranging from the fundamental principle to applications in various system categories in the existing literature. One of the remarkable works introduced is [5] on a three-node Gaussian channel topology composed of a transmitter, receiver, and warden. The authors revealed that the amount of bits that can be covertly transmitted is subject to a square root law and limited by O ( n ) in n channel uses, which tends to 0 as n . Their later work [6] explained that achieving a positive covert rate is possible in the presence of uncertainties in covert transmission, channels, and noise distribution. Another work [7] on the same three-node network showed that the Gaussian signaling is optimal for maximizing the covert rate with a lower bound on the minimum detection error probability (DEP) at the warden. The authors in the more recent work [8] further derived an optimal signaling with a peak power constraint, and [9] discussed potential applications of covert communications strategies including [8] to the sixth generation (6G) non-terrestrial network (NTN).
There also has been increasing interest in the potential of covert communications in relay systems. In [10], the authors minimized the average age of information (AoI) in a covert amplify-and-forward (AF) relay network by optimizing friendly artificial noise (AN) to a warden. The authors in [11] maximized the covert rate of unmanned aerial vehicle (UAV)-aided relay communications by optimizing the trajectory and phases of the intelligent reflecting surface (IRS) on the UAV. Also in [12], the authors jointly optimized the beamforming vectors of a transmitter and decode-and-forward (DF) relay in the presence of a multi-antenna warden when the relay can switch on and off to achieve the best covert rate. The authors in [13] derived optimal transmit power controls of a transmitter, selected DF relay, and cooperative jammers by taking the DEP and transmission outage probability due to random channel variables into consideration. In the presence of an active warden which emits fixed-power jamming signals, the authors of [14] derived optimal transmit power for a transmitter and selected DF relay. Both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) covert transmissions were considered in [15], and the authors maximized the effective covert rate by optimizing power allocation in Nakagami-m fading environments. For two-way IRS-based relay covert communications, the authors of [16] identified the maximum expected DEP subject to covert rate threshold by optimizing the cooperative AN power and covert transmission probability. In [17], the authors studied minimizing the expected relative entropy at the multi-antenna warden, which is equivalent to maximizing the DEP, by optimizing the source and DF relay transmit power in the presence of imperfect source and relay beamforming vectors. The authors in [18] investigated multi-user uplink covert transmissions through a multi-antenna relay that scrambles the received message before forwarding to a multi-antenna destination in order to break the correlation in the two phases of relay procedure, which may further confuse a multi-antenna warden. Furthermore, in [19], the authors jointly optimized the transmit power and trajectory of an UAV relay as well as the phase shifts of an IRS implemented on it for a clustered NOMA covert communications scenario.
Although there are numerous types of a relay device including an IRS, UAV, and mobile, relay protocols can generally be classified into three types: DF, compress-and-forward (CF), and AF. Our recent works in [20,21] identified and compared the optimal performance of the three relay protocols. The analytical and numerical results not only provided useful guidelines for practical operations but also suggested potential for further enhancement by an optimal relay mode selection. The authors of [22] studied combinations of half-duplex (HD)/full-duplex (FD) and DF/AF and identified the maximum covert rate with an external warden. However, the relay processing delay difference between DF and AF, which is an important factor for deciding the relay mode in practice, was not explicitly taken into account. In addition, there was no structured method to select the modes beside numerical comparisons. We thus build solid algorithms that choose the best relay mode for the maximum covert rate upon the foundational analyses from [20,21] with the relay processing delay.
Concretely, in this work, the considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages, e.g., confidential or sensitive information, and avoid detection by the covert message detector embedded on the relay. Our contributions for such a system are summarized as follows:
  • We develop an efficient optimal DF/AF relay mode selection algorithm upon the analyses on the optimal covert rates of each relay mode. Compared to a naive method that calculates all related equations, this algorithm narrows down the required comparisons and performs only necessary calculations to reach the optimal mode selection.
  • To further reduce the time complexity, we propose a low-complexity mode selection algorithm based on the long-term statistics of channel variables. It computes computationally expensive logarithms at the beginning of a long time block during which the wireless channel is statistically static. Then, it utilizes the stored results for relay mode selection in each time instant.
  • We provide numerical results to highlight the covert communications performance gain of the hybrid DF/AF relay. The results also verify the correctness of the proposed algorithms and let us explore the effects of different system parameters on covert rates.

2. System Model

Figure 1 illustrates our considered hybrid DF/AF relay system with an embedded covert message detector. The source node S secretly transmits covert messages to the destination node D under cover of public messages. The relay R in normal operation forwards messages in either DF or AF mode based on the request from the source node. We assume that the S-D direct link is unusable due to shadowing or a far distance [14].
The relay receives
y R = h S R P S α x P + 1 α x C + z R ,
where h XY specifies the channel coefficient from node X to Y for X , Y { S , R , D } , x P C N ( 0 , 1 ) and x C C N ( 0 , 1 ) mean the public and covert messages, respectively, P S denotes source transmit power, α indicates the proportion of P S on x P , and  z R C N ( 0 , σ R 2 ) represents the additive noise at the relay. We take into account the noise uncertainty at the relay [23,24]. That is, σ R , dB 2 U ( σ ¯ R , dB 2 ζ dB , σ ¯ R , dB 2 + ζ dB ) in decibel scale, where σ ¯ R , dB 2 and ζ dB 0 express the mean and range of noise power, respectively. Since covert communications is executed under the normal operation of relay, the global channel state information is assumed available everywhere [20,21].
Let us first review the DEP derivation from our previous work [20] based on the assumption that the covert message detector on the relay is equipped with a radiometer, which is a practical detection equipment [23,25]. We will also revisit the achievable covert rates of each DF and AF relay mode derived in [20] by considering the relay processing delay difference from [26] subsequently.

2.1. Covert Message Detection

The covert message detector at the relay in the considered system determines the existence of a covert transmission by measuring the level of extra components apart from the expected public message in the received signal. By examining such a residual signal z ˜ R y R h S R P S x P with the perfect knowledge of h S R and P S [27], we may write the null and alternative hypotheses as
H 0 : z ˜ R = z R , H 1 : z ˜ R = h S R P S α 1 x P + 1 α x C + z R .
The null hypothesis H 0 and alternative hypothesis H 1 are formed upon the absence and presence of a covert message, respectively. The equipped radiometer then measures the average power T of the received signal as
H 0 : T = σ R 2 , H 1 : T = 2 h S R 2 P S 1 α + σ R 2 ,
and the decision of the presence of a covert message is made upon T τ for some threshold  τ .
The DEP Pr ( e ) consists of false alarm and miss probabilities in the form of
Pr e = Pr T τ | H 0 False alarm Pr H 0 + Pr T < τ | H 1 Miss Pr H 1 .
We further consider a random covert transmission with Pr ( H 0 ) = Pr ( H 1 ) = 0.5 [5]. Then, the optimal τ minimizing the DEP is given by [21]
τ = 2 h S R 2 P S 1 α + 1 ζ σ ¯ R 2 ,
whose minimum DEP results in [21]
Pr e τ = τ = 1 2 1 1 2 ln ζ ln τ τ 2 h S R 2 P S 1 α ,
subject to ζ σ ¯ R 2 2 h S R 2 P S ( 1 α ) + σ ¯ R 2 / ζ . This can be perceived as the worst-case minimum DEP on the assumption that the detector knows the exact value of α .

2.2. The Achievable Covert Rate in DF Relay Mode

Based on (1), the achievable rate of the S-R link is given by
r ¯ S = log 2 1 + h S R 2 P S σ R 2 .
Then, the relay decodes and forwards the combined message x S α x P + 1 α x C to the destination node, and the destination node receives
y D = h R D P R α x P + 1 α x C + z D ,
for the relay transmit power P R and additive noise z D C N ( 0 , σ D 2 ) . The achievable rate of the R-D link is calculated as
r ¯ R = log 2 1 + h R D 2 P R σ D 2 .
It should be noted that the actual data rate for x S must be less than or equal to (7) and (9) for successful decoding at the relay and destination node from information theory [28].
At the destination node, decoding x P precedes obtaining x C . Concretely, taking x C part as interference first, the achievable rate for x P is written as [15]
r P , DF = log 2 1 + h R D 2 P R α h R D 2 P R 1 α + σ D 2 ,
and the achievable rate for x C after removing the decoded x P can be derived as
r C , DF = log 2 1 + h R D 2 P R 1 α σ D 2 .
It is also worth noting that the actual data rates for x P and x C must be less than or equal to (10) and (11), respectively, for successful decoding.
With these in hand, Section 4.1 in our previous work [20] has derived the maximum achievable worst-case covert rate for DF relay mode subject to the minimum guaranteed public rate r ¯ P and DEP ε [ 0 , 0.5 ] as
r C , DF = min log 2 1 + γ S R , min r ¯ P , log 2 1 + γ R D r ¯ P , log 2 1 + γ R D 1 α ¯ ,
where γ S R , min h S R 2 P S / ( ζ σ ¯ R 2 ) , γ R D h R D 2 P R / σ D 2 , and 
α ¯ max 1 ζ 1 4 ε 1 ζ σ ¯ R 2 2 h S R 2 P S , 0 2 .

2.3. The Achievable Covert Rate in AF Relay Mode

For AF relay mode, we can write the received signal at the destination node as
y D = h R D P R x R + z D ,
where x R y R / ( h S R 2 P S + σ R 2 ) 1 / 2 indicates the normalized forward signal. The achievable rates for x P and x C following the identical successive decoding in Section 2.2 are then given by
r P , AF = log 2 1 + γ S R α γ S R 1 α + 1 + γ S R + 1 γ R D 1 ,
r C , AF = log 2 1 + γ S R 1 α 1 + γ S R + 1 γ R D 1 ,
respectively, where γ S R h S R 2 P S / σ R 2 . The previous work [21] and Section 4.3 of [20] have also derived the maximum achievable worst-case covert rate for the AF relay mode subject to the minimum guaranteed public rate r ¯ P and DEP ε [ 0 , 0.5 ] as
r C , AF = min r C , AF , 1 , r C , AF , 2 ,
where
r C , AF , 1 log 2 1 + γ S R , min 1 + γ S R , min + 1 γ R D 1 r ¯ P ,
r C , AF , 2 log 2 1 + γ S R , min 1 α ¯ 1 + γ S R , min + 1 γ R D 1 .

2.4. Relay Processing Delay

The authors in [26] investigated the relationship between the total end-to-end packet transmission delays t e 2 e , DF and t e 2 e , AF , and relay processing delays t R , DF and t R , AF for DF and AF modes, respectively. Specifically, if  t dec represents the decoding delay,
t e 2 e , DF = n + t R , DF + t dec = 2 n + t dec ,
t e 2 e , AF = n + t R , AF + t dec = 2 n + t dec ,
for n channel uses per message where t R , DF = n + t dec and t R , AF = n . We adopt a linear decoding delay in terms of n by t dec = δ n for some δ 0 , which is appropriate to embrace different coding schemes [29]. The delay factor δ quantifies the amount of difference in processing time between the modes. For instance, high δ means a large difference (Although δ [ 0 , 4 ] was chosen for simulation results in [26], it should be emphasized that δ in practice is specific to particular hardware configurations of interest and may be larger.).
Dividing r C , DF by t e 2 e , DF and r C , AF by t e 2 e , AF thus leads to delay-normalized achievable worst-case covert rates as
r C , DF , delay - norm = r C , DF t e 2 e , DF = 1 2 1 + δ n r C , DF ,
r C , AF , delay - norm = r C , AF t e 2 e , AF = 1 2 + δ n r C , AF .
Without loss of generality, we may focus on the number of transmitted bits for duration of t e 2 e , AF as
r C , DF , delay = t e 2 e , AF r C , DF , delay - norm = 2 + δ 2 1 + δ r C , DF ,
r C , AF , delay = t e 2 e , AF r C , AF , delay - norm = r C , AF ,
by which we only need to adjust r C , DF , delay for comparison. It is worth noting that the scaling equally applies to the public rate r DF for DF mode, possibly resulting in a lower value than the minimum guaranteed public rate r ¯ P . To prevent this, we can first replace r ¯ P of (P1) in [20] by the higher threshold r ¯ P ( 2 ( 1 + δ ) ) / ( 2 + δ ) and scale both the obtained r P , DF and r C , DF by ( 2 + δ ) / ( 2 ( 1 + δ ) ) subsequently. Taking this into consideration, the final expression of the delay-aware achievable covert rate for DF mode is written by
r C , DF , delay = min r C , DF , delay , 1 , r C , DF , delay , 2 , r C , DF , delay , 3 ,
with
r C , DF , delay , 1 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , DF , delay , 2 2 + δ 2 1 + δ log 2 1 + γ R D r ¯ P ,
r C , DF , delay , 3 2 + δ 2 1 + δ log 2 1 + γ R D 1 α ¯ .

3. Problem Formulation

In this work, we aim to establish an optimal mode selection criterion for the hybrid DF/AF relay to maximize the covert rate by solving
( P 1 ) : max a A F r C , DF , delay 1 a A F + r C , AF a A F ,
subject to : a A F { 0 , 1 } ,
where a A F determines the relay mode. A naive approach to (P1) is to evaluate the covert rates of both DF mode from (26) and AF mode from (17) and select the higher one. This exhaustive search method, however, not only induces high time complexity but also prevents gaining insights into the solution. Hence, we will present a criterion that optimally selects the best mode without having to entirely calculate both (26) and (17). To further reduce the time complexity, we also provide a simpler criterion utilizing long-term statistics.
Remark 1. 
Let us take addition, subtraction or comparison as Δ running times, multiplication or division as  Δ 2  running times, exponentiation or logarithm as  Δ 2 log Δ  running times for Δ bits of an input value based on [30]. We will count the running times of the exhaustive method for selecting the optimal relay mode.
In order to obtain (26) for DF and (17) for AF modes, the constants  γ S R , min ,  γ R D  and  α ¯  in (13) must to be calculated. γ S R , min  and  γ R D  require 4 and 3 multiplications or divisions, respectively, and  α ¯  in (13) takes 2 subtractions, 7 multiplications or divisions, 1 exponentiation, and 1 comparison from  max ( · )  operation. This results in  3 Δ + 14 Δ 2 + Δ 2 log Δ  running times.
Next, each calculation of  r C , DF , delay , 1  in (27) and  r C , DF , delay , 2  in (28) incurs 4 additions or subtractions, 3 multiplications or divisions, and 1 logarithm, while  r C , DF , delay , 3  in (29) takes 4 additions or subtractions, 4 multiplications or divisions, and 1 logarithm. Therefore, including 2 comparisons among them to determine  r C , DF , delay  from (26), the total running times become  14 Δ + 10 Δ 2 + 3 Δ 2 log Δ .
As for AF mode,  r C , AF , 1  in (18) needs 4 additions or subtractions, 2 multiplications or divisions, and 1 logarithm. Meanwhile,  r C , AF , 2  in (19) takes 4 additions or subtractions, 3 multiplications or divisions, and 1 logarithm. Including 1 comparison among them to decide  r C , AF  from (17) thus leads to  9 Δ + 5 Δ 2 + 2 Δ 2 log Δ .
Finally, after performing 1 comparison between  r C , DF , delay  and  r C , AF , we have  27 Δ + 29 Δ 2 + 6 Δ 2 log Δ  running times altogether.

4. Proposed Solutions

4.1. An Optimal Criterion

For DF mode, if we define ω min ( γ S R , min , γ R D ) and let i ω = 1 if ω = γ S R , min and 2 if ω = γ R D , (26) becomes equivalent to
r C , DF , delay = min r C , DF , delay , i ω , r C , DF , delay , 3 .
The selection in min ( · ) depends on (27)–(29) such that
r ¯ P , boundary , DF 2 + δ 2 1 + δ log 2 1 + ω 1 + γ R D 1 α ¯ r C , DF , delay , 3 r C , DF , delay , i ω r ¯ P .
In AF mode, we can draw a similar selection rule for (17) from (18) and (19) as
r ¯ P , boundary , AF log 2 1 + λ 1 + λ 1 α ¯ r C , AF , 2 r C , AF , 1 r ¯ P ,
where λ γ S R , min / ( 1 + γ S R , min + 1 γ R D 1 ) . Therefore, an optimal DF/AF mode selection criterion differs depending on r ¯ P with respect to r ¯ P , boundary , DF and r ¯ P , boundary , AF (Figure 2):
  • Case 1: min r ¯ P , boundary , DF , r ¯ P , boundary , AF r ¯ P
    r C , DF , delay = r C , DF , delay , 3 and r C , AF = r C , AF , 2 , i.e.,
    2 + δ 2 1 + δ log 2 1 + γ R D 1 α ¯ DF AF log 2 1 + λ 1 α ¯ .
  • Case 2: r ¯ P , boundary , AF < r ¯ P r ¯ P , boundary , DF
    r C , DF , delay = r C , DF , delay , 3 and r C , AF = r C , AF , 1 , i.e.,
    2 + δ 2 1 + δ log 2 1 + γ R D 1 α ¯ DF AF log 2 1 + λ r ¯ P .
  • Case 3: r ¯ P , boundary , DF < r ¯ P r ¯ P , boundary , AF
    r C , DF , delay = r C , DF , delay , i ω and r C , AF = r C , AF , 2 , i.e.,
    2 + δ 2 1 + δ log 2 1 + ω r ¯ P DF AF log 2 1 + λ 1 α ¯ .
  • Case 4: max r ¯ P , boundary , DF , r ¯ P , boundary , AF < r ¯ P
    r C , DF , delay = r C , DF , delay , i ω and r C , AF = r C , AF , 1 , i.e.,
    2 + δ 2 1 + δ log 2 1 + ω DF AF log 2 1 + λ .
Algorithm 1 summarizes the selection procedure between DF and AF in four steps.
Algorithm 1 The proposed optimal mode selection.
1:
Deciding ω and i ω for DF mode by computing and comparing γ S R , min and γ R D
2:
Deciding between r C , DF , delay , i ω or r C , DF , delay , 3 as r C , DF , delay by comparing r ¯ P , boundary , DF and r ¯ P after computing α ¯ and r ¯ P , boundary , DF
3:
Deciding between r C , AF , 1 or r C , AF , 2 as r C , AF by comparing r ¯ P , boundary , AF and r ¯ P after computing λ and r ¯ P , boundary , AF
4:
Deciding the relay mode by computing and comparing r C , DF , delay and r C , AF
Remark 2. 
We can evaluate the running times of Algorithm 1 based on the similar assumption in Remark 1. Step 1 requires calculation of γ S R , min and γ R D with 4 and 3 multiplications or divisions, respectively, and 1 comparison for deciding i ω , summing up to Δ + 7 Δ 2 running times.
In step 2, calculation of α ¯ in (13) takes 2 subtractions, 7 multiplications or divisions, 1 exponentiation, and 1 comparison, which add up to 3 Δ + 7 Δ 2 + Δ 2 log Δ running times. Computing r ¯ P , boundary , DF consumes 5 additions or subtractions, 5 multiplications or divisions, and 1 logarithm, leading to 5 Δ + 5 Δ 2 + Δ 2 log Δ running times. After that, the comparison between r ¯ P , boundary , DF and r ¯ P for deciding r C , DF adds Δ running times. This is 8 Δ + 12 Δ 2 + 2 Δ 2 log Δ running steps in total.
In step 3, obtaining λ requires 2 additions, 2 divisions for 2 Δ + 2 Δ 2 running times. r ¯ P , boundary , AF also requires 3 additions or subtractions, 2 multiplications or divisions, and 1 logarithm for 3 Δ + 2 Δ 2 + Δ 2 log Δ running times. Then, the comparison between r ¯ P , boundary , AF and r ¯ P for determining r C , AF adds Δ running times such that the total complexity becomes 6 Δ + 4 Δ 2 + Δ 2 log Δ .
For step 4, evaluating r C , DF , delay needs 4 additions or subtractions, 4 multiplications or divisions at most, and 1 logarithm, which total 4 Δ + 4 Δ 2 + Δ 2 log Δ running times. Finding r C , AF takes 4 additions or subtractions, 3 multiplications or divisions at most, and 1 logarithm that amount to 4 Δ + 3 Δ 2 + Δ 2 log Δ running times. Including 1 comparison between r C , DF , delay and r C , AF to select the final relay mode, the total running times become 9 Δ + 7 Δ 2 + 2 Δ 2 log Δ .
Altogether, Algorithm 1 takes 24 Δ + 30 Δ 2 + 5 Δ 2 log Δ . Since exponentiation and logarithm with Δ 2 log Δ running times are the major factors for computational complexity, we can conclude that Algorithm 1 has lower complexity compared to the exhaustive search method from Remark 1.

4.2. A Low-Complexity Partial Long-Term Criterion

The proposed optimal mode selection criterion requires calculation of several parameters that vary with instantaneous channel state information. A straightforward method to decrease the computational burden at each time instant would be utilizing approximated r ˜ C , DF , delay and r ˜ C , AF upon the long-term statistics E [ h S R 2 ] and E [ h R D 2 ] at the cost of inaccurate selection.
Thus, we propose a low-complexity algorithm that takes an adequate trade-off between the accuracy and time complexity by making partial use of the long-term statistics. To this end, we first note that the last step in Algorithm 1 involves evaluating logarithms, which are generally expensive compared to simple arithmetic operators and take up the most computational resource. We thus retain the use of instantaneous channel coefficients in steps 1–3 but replace them with the long-term counterparts in step 4. This enables the system to evaluate r ˜ C , DF , delay and r ˜ C , AF and store the results of (34)–(37) prior to the beginning of each time block. The relay mode will then be instantly selected after step 3. The modified procedure is described in Algorithm 2.
Algorithm 2 The proposed low-complexity partial long-term mode selection.
1:
Evaluating r ˜ C , DF , delay and r ˜ C , AF , and storing the results of (24)–(27) in the beginning of each time block
2:
Deciding ω and i ω for DF mode by computing and comparing γ S R , min and γ R D
3:
Deciding between r C , DF , delay , i ω or r C , DF , delay , 3 as r C , DF , delay by comparing r ¯ P , boundary , DF and r ¯ P after computing α ¯ and r ¯ P , boundary , DF
4:
Deciding between r C , AF , 1 or r C , AF , 2 as r C , AF by comparing r ¯ P , boundary , AF and r ¯ P after computing λ and r ¯ P , boundary , AF
5:
Deciding the relay mode based on step 1
Remark 3. 
Assuming the one-time calculations of r ˜ C , DF , delay and r ˜ C , AF per transmission block to be negligible in step 1, we may only count the running times for step 2, 3, and 4 of Algorithm 2, which are equivalent to step 1, 2, and 3 of Algorithm 2, respectively. The comparison in step 5 can also be precalculated based on step 1. Therefore, the effective total running times for Algorithm 2 is 15 Δ + 23 Δ 2 + 3 Δ 2 log Δ .
We summarize the complexity comparison in Table 1. It can be found that the running times for Δ by all the algorithms are dominated by the logarithm term Δ 2 log Δ . The asymptotic decrements in the running time by Algorithms 1 and 2 over the exhaustive search are thus 16% and 50%, respectively.

5. Numerical Results

We now present numerical simulations to assess the covert communications performance of our proposed algorithms. We place the source, hybrid DF/AF relay, and destination nodes on a straight line. The distance-dependent channel coefficient h XY from node X to Y for X , Y { S , R , D } is in the form of h XY = L XY h ^ XY in which L XY L 0 ( d XY / d 0 ) β and h ^ XY denote the path loss and small-scale channel variation, respectively [31]. Here, L 0 indicates the path loss at a reference distance d 0 = 1 m, β accounts for the path loss exponent, and h ^ XY is assumed to follow Rayleigh fading with C N ( 0 , 1 ) .
We set other system parameters as follows: the bandwidth W = 20 MHz, R-S distance d R S = 100 m, R-D distance d R D = 100 m, source transmission power P S = 23 dBm, relay transmission power P R = 23 dBm, mean noise power at the relay σ ¯ R 2 = 160 dBm/Hz, noise uncertainty range ζ = 5 dB, destination noise power σ D 2 = 160 dBm/Hz, DEP threshold ε = 0.45 , pathloss exponent β = 3.5 , public rate threshold r ¯ P = 1.5 bps/Hz, and processing delay factor δ = 5.0 .
Figure 3 shows the average worst-case covert rate as a function of the source transmit power P S . We observe that the optimal mode selection of the hybrid DF/AF relay (“DF/AF (Optimal)”) yields a significant performance gain over the single relay modes (“DF” and “AF”). The equivalence between “DF/AF (Optimal)” and “DF/AF (Exhaustive)” in which the best relay mode is selected after evaluating all the logarithms in (18) and (19), (27)–(29) also verifies the correctness of our proposed criterion. The performance gain of the optimal criterion over the other compared schemes is approximately 35% at P S = 30 dBm.
The figure confirms the effectiveness of our proposed low-complexity algorithm (“DF/AF (Partial long-term)”) as well. It is found that the performance is close to the optimum for low P S values, but deviates from the optimum for higher P S . Nevertheless, the low-complexity scheme still outperforms other baseline schemes such as “DF/AF (Fully long-term)” where the selection is determined solely by the long-term statistics of channel, and “DF/AF (Random)” with random selection.
Figure 4 compares the average time elapsed among “DF/AF (Optimal)”, “DF/AF (Partial long-term)”, and “DF/AF (Exhaustive)” when P S increases. We conducted this experiment using Python 3.10 on 2023 MacBook Air 15 (Apple Inc., Cupertino, CA, USA) with Apple M2 processor including 4 cores of 3.49 GHz and the other 4 cores of 2.42 GHz. Both the proposed schemes have achieved notably lower time consumption compared to the exhaustive method. For instance, the running time gains of the optimal and partial long-term criteria over the exhaustive search are approximately 15% and 34%, respectively, at P S = 40 dBm, and 21% and 26% at P S = 20 dBm. We can thus conclude from Figure 3 and Figure 4 that the proposed schemes provide a satisfactory trade-off between performance and time complexity.
Figure 5 studies the relationship between the average worst-case covert rate and relay transmit power P R . The optimal hybrid DF/AF scheme once again validates its effectiveness for all P R values. As an example, the performance improvement of the optimal criterion over the compared schemes is at least approximately 20% at P S = 40 dBm. The low-complexity algorithm also demonstrates greater performance over other compared schemes from low to medium P R regimes, but it reduces to the single AF relay mode as P R becomes high. In fact, when P R is high, γ R D is also high, and this results in r C , DF , delay r C , DF , delay , 1 from (26) and (27), and ω γ S R , min and λ γ S R , min by definition. Moreover, one can numerically check that both average r ¯ P , boundary , DF and r ¯ P , boundary , AF are much lower than r ¯ P = 1.5 bps/Hz for our choice of system parameters in this section. This corresponds to Case 4 in (37) in which AF is highly likely to be selected since ω λ for high P R and δ = 5.0 . Hence, it explains why “DF/AF (Partial long-term)” scheme approaches the single AF relay mode. A more careful selection is therefore necessary for high P R .
Figure 6 presents the average worst-case covert rate as the public rate threshold r ¯ P varies. Our proposed optimal and low-complexity mode selection schemes show considerable improvement than other compared ones for all r ¯ P ranges. For r ¯ P = 1.3 as an example, the optimal criterion gains 28% improvement at least over the other compared schemes. We note that “DF/AF (Fully long-term)” based only on the long-term statistics of channel even underperform the random mode selection, despite its negligible computational complexity. This highlights the decent trade-off between the complexity and performance by the proposed “DF/AF (Partial long-term)”.
It also appears that AF outperforms DF as r ¯ P becomes higher. This is due to the stricter requirement for decodability at both the relay and destination node for DF mode while it is only the destination node that needs to perform decoding for AF mode. For instance, r ¯ P is compared with γ S R , min and γ R D in both r C , DF , delay , 1 in (27) and r C , DF , delay , 2 in (28) for DF mode. On the other hand, it is only r C , AF , 1 in (18) that is compared with r ¯ P for AF mode. Thus, higher r ¯ P is unfavorable for DF mode to simultaneously meet the decodability at both the relay and destination node.
Figure 7 illustrates the average worst-case covert rate performance for different values of processing delay factor δ . The proposed optimal and low-complexity mode selection schemes mostly choose DF when δ is low and AF when δ is high as expected. Besides, both schemes make the best decision when δ is in an intermediate range. The performance gain of 50% is observed for the optimal criterion over the other compared schemes for δ = 3.0 . In contrast, “DF/AF (Fully long-term)” only with the long-term statistics of channel was not able to determine the best relay mode for non-extreme values of δ , which could be more common in practice.

6. Conclusions

In this paper, we studied covert communications in a hybrid DF/AF relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages, e.g., confidential or sensitive information, and avoid detection by the covert message detector embedded on the relay. We first established an optimal DF/AF mode selection criterion to maximize the covert rate based on the analyses of delay-aware achievable covert rates of individual DF and AF modes. To further reduce the time complexity, we proposed a low-complexity selection criterion as well for practical use. The numerical results demonstrate the covert rate gain as high as 50% and running time gain as high as 20% for particular system parameters, which verify the effectiveness of the proposed criteria.
The proposed hybrid DF/AF relay strategy for covert communications may provide adaptive and flexible means of secure transmissions by switching between DF and AF modes based on network conditions, security needs, and environmental threats, in favor of high covert rate. It is suitable for a wide range of real-world applications, such as a reliable and fast exchange of mission-critical information among military units in active combat zones, adaptive satellite-to-ground secure communications robust to abrupt climate changes and channel variations, and covert integrated sensing and communications with rapidly varying node locations.
An actual implementation of the proposed system model and relay mode selection algorithms, and handling related issues can be interesting future works.

Funding

This research was partially supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2021R1I1A3050126). This work was partially supported by Korea Research Institute for defense Technology planning and advancement (KRIT) grant funded by the Korea government (DAPA (Defense Acquisition Program Administration)) (21-106-A00-007, Space-Layer Intelligent Communication Network Laboratory, 2022). This research was partially supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2024-RS-2024-00437886) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhang, J.; Yan, Z.; Fei, S.; Wang, M.; Li, T.; Wang, H. Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond? IEEE Netw. 2022, 36, 105–112. [Google Scholar] [CrossRef]
  2. Jiang, Y.; Wang, L.; Chen, H.-H.; Shen, X. Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges. Proc. IEEE 2024, 112, 47–82. [Google Scholar] [CrossRef]
  3. Forouzan, B.A. Cryptography and Network Security; McGraw-Hill: New York, NY, USA, 2007. [Google Scholar]
  4. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1173–1198. [Google Scholar] [CrossRef]
  5. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  6. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef]
  7. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef]
  8. Kang, B.; Ye, N.; An, J. Optimal Signaling for Covert Communications Under Peak Power Constraint. IEEE Trans. Inf. Forensics Secur. 2024, 19, 5030–5045. [Google Scholar] [CrossRef]
  9. An, J.; Kang, B.; Ouyang, Q.; Pan, J.; Ye, N. Covert Communications Meet 6G NTN: A Comprehensive Enabler for Safety-Critical IoT. IEEE Netw. 2024, 38, 17–24. [Google Scholar] [CrossRef]
  10. Sim, S.; Kim, J.; Lee, J. Jamming Power Optimization for Data Freshness in Covert Relay Networks. In Proceedings of the 2023 14th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 11–13 October 2023; pp. 1401–1403. [Google Scholar]
  11. Qian, Y.; Yang, C.; Mei, Z.; Zhou, X.; Shi, L.; Li, J. On Joint Optimization of Trajectory and Phase Shift for IRS-UAV Assisted Covert Communication Systems. IEEE Trans. Veh. Technol. 2023, 72, 12873–12883. [Google Scholar] [CrossRef]
  12. Wang, M.; Xia, B.; Xu, Z.; Guo, Y.; Chen, Z. Performance Analysis and Optimization for Coordinated Direct and Relay Covert Transmission With Multiantenna Warder. IEEE Internet Things J. 2023, 10, 13414–13427. [Google Scholar] [CrossRef]
  13. Gao, C.; Yang, B.; Zheng, D.; Jiang, X.; Taleb, T. Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems. IEEE Trans. Commun. 2024, 72, 1020–1032. [Google Scholar] [CrossRef]
  14. Zhao, Q.; Gao, C.; Zheng, D.; Li, Y.; Zheng, X. Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden. IEEE Internet Things J. 2024, 11, 16450–16460. [Google Scholar] [CrossRef]
  15. Li, Q.; Xu, D.; Zhang, K.; Navaie, K.; Ding, Z. Covert Communications in STAR-RIS Assisted NOMA IoT Networks Over Nakagami-m Fading Channels. IEEE Internet Things J. 2024, 11, 22456–22470. [Google Scholar] [CrossRef]
  16. Wang, C.; Xiong, Z.; Zheng, M.; Zhao, N.; Niyato, D. Covert Communications via Two-Way IRS with Noise Power Uncertainty. IEEE Trans. Commun. 2024, 72, 4803–4815. [Google Scholar] [CrossRef]
  17. Lin, M.; Liu, C.; Wu, Q.; Wang, W. DF-Relay-Assisted Multiantenna D2D Covert Communication in the Presence of Joint Detection. IEEE Internet Things J. 2024, 11, 11800–11811. [Google Scholar] [CrossRef]
  18. Lin, M.; Liu, C.; Wang, W. Relay-Assisted Uplink Covert Communication in the Presence of Multi-Antenna Warden and Uninformed Jamming. IEEE Trans. Commun. 2024, 72, 2124–2137. [Google Scholar] [CrossRef]
  19. Qin, X.; Na, Z.; Wen, Z.; Wu, X. Relaying IRS-UAV Assisted Covert Communications in Uplink C-NOMA Network. IEEE Commun. Lett. 2024, 28, 2136–2140. [Google Scholar] [CrossRef]
  20. Moon, J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors 2023, 23, 8747. [Google Scholar] [CrossRef] [PubMed]
  21. Moon, J. Covert Communications in a Compress-and-Forward Relay System. ICT Express 2024, 10, 412–417. [Google Scholar] [CrossRef]
  22. Liu, Y.; Wu, H.; Jiang, X. Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems. Ad Hoc Netw. 2023, 148, 103207. [Google Scholar] [CrossRef]
  23. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication With Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  24. Si, J.; Li, Z.; Zhao, Y.; Cheng, J.; Guan, L.; Shi, J.; Al-Dhahir, N. Covert Transmission Assisted by Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 5394–5408. [Google Scholar] [CrossRef]
  25. Lee, S.; Baxley, R.J.; Weitnauer, M.A.; Walkenhorst, B. Achieving Undetectable Communication. IEEE J. Sel. Top. Signal Process. 2015, 9, 1195–1205. [Google Scholar] [CrossRef]
  26. Makki, B.; Alouini, M.-S. End-to-End Performance Analysis of Delay-Sensitive Multi-Relay Networks. IEEE Commun. Lett. 2019, 23, 2159–2163. [Google Scholar] [CrossRef]
  27. Kim, S.W.; Ta, H.Q. Covert Communications Over Multiple Overt Channels. IEEE Trans. Commun. 2022, 70, 1112–1124. [Google Scholar] [CrossRef]
  28. Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2005. [Google Scholar]
  29. Makki, B.; Svensson, T.; Caire, G.; Zorzi, M. Fast HARQ Over Finite Blocklength Codes: A Technique for Low-Latency Reliable Communication. IEEE Trans. Wirel. Commun. 2019, 18, 194–209. [Google Scholar] [CrossRef]
  30. Borwein, J.M.; Borwein, P.B. Pi and the AGM: A Study in Analytic Number Theory and Computational Complexity; Wiley: New York, NY, USA, 1987. [Google Scholar]
  31. Xing, H.; Liu, L.; Zhang, R. Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel. IEEE Trans. Veh. Technol. 2016, 65, 180–190. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 24 06518 g001
Figure 2. An optimal DF/AF mode selection criterion based on r ¯ P . (a) r ¯ P , boundary , DF r ¯ P , boundary , AF . (b) r ¯ P , boundary , DF < r ¯ P , boundary , AF .
Figure 2. An optimal DF/AF mode selection criterion based on r ¯ P . (a) r ¯ P , boundary , DF r ¯ P , boundary , AF . (b) r ¯ P , boundary , DF < r ¯ P , boundary , AF .
Sensors 24 06518 g002
Figure 3. The average worst-case covert rate r C versus the source transmit power P S .
Figure 3. The average worst-case covert rate r C versus the source transmit power P S .
Sensors 24 06518 g003
Figure 4. The average time elapsed versus the source transmit power P S .
Figure 4. The average time elapsed versus the source transmit power P S .
Sensors 24 06518 g004
Figure 5. The average worst-case covert rate r C versus the relay transmit power P R .
Figure 5. The average worst-case covert rate r C versus the relay transmit power P R .
Sensors 24 06518 g005
Figure 6. The average worst-case covert rate r C versus the public rate threshold r ¯ P .
Figure 6. The average worst-case covert rate r C versus the public rate threshold r ¯ P .
Sensors 24 06518 g006
Figure 7. The average worst-case covert rate r C versus the processing delay factor δ .
Figure 7. The average worst-case covert rate r C versus the processing delay factor δ .
Sensors 24 06518 g007
Table 1. The complexity comparison.
Table 1. The complexity comparison.
AlgorithmRunning Time
Exhaustive search 27 Δ + 29 Δ 2 + 6 Δ 2 log Δ
Algorithm 1 (optimal) 24 Δ + 30 Δ 2 + 5 Δ 2 log Δ
Algorithm 2 (partial long-term) 15 Δ + 23 Δ 2 + 3 Δ 2 log Δ
Δ : The input bits of an input value.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Moon, J. Covert Communications in a Hybrid DF/AF Relay System. Sensors 2024, 24, 6518. https://doi.org/10.3390/s24206518

AMA Style

Moon J. Covert Communications in a Hybrid DF/AF Relay System. Sensors. 2024; 24(20):6518. https://doi.org/10.3390/s24206518

Chicago/Turabian Style

Moon, Jihwan. 2024. "Covert Communications in a Hybrid DF/AF Relay System" Sensors 24, no. 20: 6518. https://doi.org/10.3390/s24206518

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop