1. Introduction
As wireless technology pervades our daily routines, security and privacy threats have increasingly become paramount concerns nowadays [1]. To ensure the security of wireless transmissions, covert communications, or low-probability-of-detection communications, has been considered as a promising physical layer security technology, which focuses on hiding the very existence of a confidential communications link [2]. It is a particularly useful technology for critical environments such as battlefields, security facilities, and financial institutions where the mere detection or metadata of data traffic could compromise the whole system [3].
The survey paper [4] has explored a vast number of works on covert communications, ranging from the fundamental principle to applications in various system categories in the existing literature. One of the remarkable works introduced is [5] on a three-node Gaussian channel topology composed of a transmitter, receiver, and warden. The authors revealed that the amount of bits that can be covertly transmitted is subject to a square root law and limited by in n channel uses, which tends to 0 as . Their later work [6] explained that achieving a positive covert rate is possible in the presence of uncertainties in covert transmission, channels, and noise distribution. Another work [7] on the same three-node network showed that the Gaussian signaling is optimal for maximizing the covert rate with a lower bound on the minimum detection error probability (DEP) at the warden. The authors in the more recent work [8] further derived an optimal signaling with a peak power constraint, and [9] discussed potential applications of covert communications strategies including [8] to the sixth generation (6G) non-terrestrial network (NTN).
There also has been increasing interest in the potential of covert communications in relay systems. In [10], the authors minimized the average age of information (AoI) in a covert amplify-and-forward (AF) relay network by optimizing friendly artificial noise (AN) to a warden. The authors in [11] maximized the covert rate of unmanned aerial vehicle (UAV)-aided relay communications by optimizing the trajectory and phases of the intelligent reflecting surface (IRS) on the UAV. Also in [12], the authors jointly optimized the beamforming vectors of a transmitter and decode-and-forward (DF) relay in the presence of a multi-antenna warden when the relay can switch on and off to achieve the best covert rate. The authors in [13] derived optimal transmit power controls of a transmitter, selected DF relay, and cooperative jammers by taking the DEP and transmission outage probability due to random channel variables into consideration. In the presence of an active warden which emits fixed-power jamming signals, the authors of [14] derived optimal transmit power for a transmitter and selected DF relay. Both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) covert transmissions were considered in [15], and the authors maximized the effective covert rate by optimizing power allocation in Nakagami-m fading environments. For two-way IRS-based relay covert communications, the authors of [16] identified the maximum expected DEP subject to covert rate threshold by optimizing the cooperative AN power and covert transmission probability. In [17], the authors studied minimizing the expected relative entropy at the multi-antenna warden, which is equivalent to maximizing the DEP, by optimizing the source and DF relay transmit power in the presence of imperfect source and relay beamforming vectors. The authors in [18] investigated multi-user uplink covert transmissions through a multi-antenna relay that scrambles the received message before forwarding to a multi-antenna destination in order to break the correlation in the two phases of relay procedure, which may further confuse a multi-antenna warden. Furthermore, in [19], the authors jointly optimized the transmit power and trajectory of an UAV relay as well as the phase shifts of an IRS implemented on it for a clustered NOMA covert communications scenario.
Although there are numerous types of a relay device including an IRS, UAV, and mobile, relay protocols can generally be classified into three types: DF, compress-and-forward (CF), and AF. Our recent works in [20,21] identified and compared the optimal performance of the three relay protocols. The analytical and numerical results not only provided useful guidelines for practical operations but also suggested potential for further enhancement by an optimal relay mode selection. The authors of [22] studied combinations of half-duplex (HD)/full-duplex (FD) and DF/AF and identified the maximum covert rate with an external warden. However, the relay processing delay difference between DF and AF, which is an important factor for deciding the relay mode in practice, was not explicitly taken into account. In addition, there was no structured method to select the modes beside numerical comparisons. We thus build solid algorithms that choose the best relay mode for the maximum covert rate upon the foundational analyses from [20,21] with the relay processing delay.
Concretely, in this work, the considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages, e.g., confidential or sensitive information, and avoid detection by the covert message detector embedded on the relay. Our contributions for such a system are summarized as follows:
We develop an efficient optimal DF/AF relay mode selection algorithm upon the analyses on the optimal covert rates of each relay mode. Compared to a naive method that calculates all related equations, this algorithm narrows down the required comparisons and performs only necessary calculations to reach the optimal mode selection.
To further reduce the time complexity, we propose a low-complexity mode selection algorithm based on the long-term statistics of channel variables. It computes computationally expensive logarithms at the beginning of a long time block during which the wireless channel is statistically static. Then, it utilizes the stored results for relay mode selection in each time instant.
We provide numerical results to highlight the covert communications performance gain of the hybrid DF/AF relay. The results also verify the correctness of the proposed algorithms and let us explore the effects of different system parameters on covert rates.
2. System Model
Figure 1 illustrates our considered hybrid DF/AF relay system with an embedded covert message detector. The source node S secretly transmits covert messages to the destination node D under cover of public messages. The relay R in normal operation forwards messages in either DF or AF mode based on the request from the source node. We assume that the S-D direct link is unusable due to shadowing or a far distance [14].
The relay receives
(1)
where specifies the channel coefficient from node to for , and mean the public and covert messages, respectively, denotes source transmit power, indicates the proportion of on , and represents the additive noise at the relay. We take into account the noise uncertainty at the relay [23,24]. That is, in decibel scale, where and express the mean and range of noise power, respectively. Since covert communications is executed under the normal operation of relay, the global channel state information is assumed available everywhere [20,21].Let us first review the DEP derivation from our previous work [20] based on the assumption that the covert message detector on the relay is equipped with a radiometer, which is a practical detection equipment [23,25]. We will also revisit the achievable covert rates of each DF and AF relay mode derived in [20] by considering the relay processing delay difference from [26] subsequently.
2.1. Covert Message Detection
The covert message detector at the relay in the considered system determines the existence of a covert transmission by measuring the level of extra components apart from the expected public message in the received signal. By examining such a residual signal with the perfect knowledge of and [27], we may write the null and alternative hypotheses as
(2)
The null hypothesis and alternative hypothesis are formed upon the absence and presence of a covert message, respectively. The equipped radiometer then measures the average power T of the received signal as
(3)
and the decision of the presence of a covert message is made upon for some threshold .The DEP consists of false alarm and miss probabilities in the form of
(4)
We further consider a random covert transmission with [5]. Then, the optimal minimizing the DEP is given by [21]
(5)
whose minimum DEP results in [21](6)
subject to . This can be perceived as the worst-case minimum DEP on the assumption that the detector knows the exact value of .2.2. The Achievable Covert Rate in DF Relay Mode
Based on (1), the achievable rate of the S-R link is given by
(7)
Then, the relay decodes and forwards the combined message to the destination node, and the destination node receives
(8)
for the relay transmit power and additive noise . The achievable rate of the R-D link is calculated as(9)
It should be noted that the actual data rate for must be less than or equal to (7) and (9) for successful decoding at the relay and destination node from information theory [28].
At the destination node, decoding precedes obtaining . Concretely, taking part as interference first, the achievable rate for is written as [15]
(10)
and the achievable rate for after removing the decoded can be derived as(11)
It is also worth noting that the actual data rates for and must be less than or equal to (10) and (11), respectively, for successful decoding.
With these in hand, Section 4.1 in our previous work [20] has derived the maximum achievable worst-case covert rate for DF relay mode subject to the minimum guaranteed public rate and DEP as
(12)
where , , and(13)
2.3. The Achievable Covert Rate in AF Relay Mode
For AF relay mode, we can write the received signal at the destination node as
(14)
where indicates the normalized forward signal. The achievable rates for and following the identical successive decoding in Section 2.2 are then given by(15)
(16)
respectively, where . The previous work [21] and Section 4.3 of [20] have also derived the maximum achievable worst-case covert rate for the AF relay mode subject to the minimum guaranteed public rate and DEP as(17)
where(18)
(19)
2.4. Relay Processing Delay
The authors in [26] investigated the relationship between the total end-to-end packet transmission delays and , and relay processing delays and for DF and AF modes, respectively. Specifically, if represents the decoding delay,
(20)
(21)
for n channel uses per message where and . We adopt a linear decoding delay in terms of n by for some , which is appropriate to embrace different coding schemes [29]. The delay factor quantifies the amount of difference in processing time between the modes. For instance, high means a large difference (Although was chosen for simulation results in [26], it should be emphasized that in practice is specific to particular hardware configurations of interest and may be larger.).Dividing by and by thus leads to delay-normalized achievable worst-case covert rates as
(22)
(23)
Without loss of generality, we may focus on the number of transmitted bits for duration of as
(24)
(25)
by which we only need to adjust for comparison. It is worth noting that the scaling equally applies to the public rate for DF mode, possibly resulting in a lower value than the minimum guaranteed public rate . To prevent this, we can first replace of (P1) in [20] by the higher threshold and scale both the obtained and by subsequently. Taking this into consideration, the final expression of the delay-aware achievable covert rate for DF mode is written by(26)
with(27)
(28)
(29)
3. Problem Formulation
In this work, we aim to establish an optimal mode selection criterion for the hybrid DF/AF relay to maximize the covert rate by solving
(30a)
(30b)
where determines the relay mode. A naive approach to (P1) is to evaluate the covert rates of both DF mode from (26) and AF mode from (17) and select the higher one. This exhaustive search method, however, not only induces high time complexity but also prevents gaining insights into the solution. Hence, we will present a criterion that optimally selects the best mode without having to entirely calculate both (26) and (17). To further reduce the time complexity, we also provide a simpler criterion utilizing long-term statistics.Let us take addition, subtraction or comparison as Δ running times, multiplication or division as running times, exponentiation or logarithm as running times for Δ bits of an input value based on [30]. We will count the running times of the exhaustive method for selecting the optimal relay mode.
In order to obtain (26) for DF and (17) for AF modes, the constants , and in (13) must to be calculated. and require 4 and 3 multiplications or divisions, respectively, and in (13) takes 2 subtractions, 7 multiplications or divisions, 1 exponentiation, and 1 comparison from operation. This results in running times.
Next, each calculation of in (27) and in (28) incurs 4 additions or subtractions, 3 multiplications or divisions, and 1 logarithm, while in (29) takes 4 additions or subtractions, 4 multiplications or divisions, and 1 logarithm. Therefore, including 2 comparisons among them to determine from (26), the total running times become .
As for AF mode, in (18) needs 4 additions or subtractions, 2 multiplications or divisions, and 1 logarithm. Meanwhile, in (19) takes 4 additions or subtractions, 3 multiplications or divisions, and 1 logarithm. Including 1 comparison among them to decide from (17) thus leads to .
Finally, after performing 1 comparison between and , we have running times altogether.
4. Proposed Solutions
4.1. An Optimal Criterion
For DF mode, if we define and let if and 2 if , (26) becomes equivalent to
(31)
The selection in depends on (27)–(29) such that
(32)
In AF mode, we can draw a similar selection rule for (17) from (18) and (19) as
(33)
where . Therefore, an optimal DF/AF mode selection criterion differs depending on with respect to and (Figure 2):-
Case 1:
and , i.e.,
(34)
-
Case 2:
and , i.e.,
(35)
-
Case 3:
and , i.e.,
(36)
-
Case 4:
and , i.e.,
(37)
Algorithm 1 summarizes the selection procedure between DF and AF in four steps.
Algorithm 1 The proposed optimal mode selection. |
|
We can evaluate the running times of Algorithm 1 based on the similar assumption in Remark 1. Step 1 requires calculation of and with 4 and 3 multiplications or divisions, respectively, and 1 comparison for deciding , summing up to running times.
In step 2, calculation of in (13) takes 2 subtractions, 7 multiplications or divisions, 1 exponentiation, and 1 comparison, which add up to running times. Computing consumes 5 additions or subtractions, 5 multiplications or divisions, and 1 logarithm, leading to running times. After that, the comparison between and for deciding adds Δ running times. This is running steps in total.
In step 3, obtaining λ requires 2 additions, 2 divisions for running times. also requires 3 additions or subtractions, 2 multiplications or divisions, and 1 logarithm for running times. Then, the comparison between and for determining adds Δ running times such that the total complexity becomes .
For step 4, evaluating needs 4 additions or subtractions, 4 multiplications or divisions at most, and 1 logarithm, which total running times. Finding takes 4 additions or subtractions, 3 multiplications or divisions at most, and 1 logarithm that amount to running times. Including 1 comparison between and to select the final relay mode, the total running times become .
Altogether, Algorithm 1 takes . Since exponentiation and logarithm with running times are the major factors for computational complexity, we can conclude that Algorithm 1 has lower complexity compared to the exhaustive search method from Remark 1.
4.2. A Low-Complexity Partial Long-Term Criterion
The proposed optimal mode selection criterion requires calculation of several parameters that vary with instantaneous channel state information. A straightforward method to decrease the computational burden at each time instant would be utilizing approximated and upon the long-term statistics and at the cost of inaccurate selection.
Thus, we propose a low-complexity algorithm that takes an adequate trade-off between the accuracy and time complexity by making partial use of the long-term statistics. To this end, we first note that the last step in Algorithm 1 involves evaluating logarithms, which are generally expensive compared to simple arithmetic operators and take up the most computational resource. We thus retain the use of instantaneous channel coefficients in steps 1–3 but replace them with the long-term counterparts in step 4. This enables the system to evaluate and and store the results of (34)–(37) prior to the beginning of each time block. The relay mode will then be instantly selected after step 3. The modified procedure is described in Algorithm 2.
Algorithm 2 The proposed low-complexity partial long-term mode selection. |
|
Assuming the one-time calculations of and per transmission block to be negligible in step 1, we may only count the running times for step 2, 3, and 4 of Algorithm 2, which are equivalent to step 1, 2, and 3 of Algorithm 2, respectively. The comparison in step 5 can also be precalculated based on step 1. Therefore, the effective total running times for Algorithm 2 is .
We summarize the complexity comparison in Table 1. It can be found that the running times for by all the algorithms are dominated by the logarithm term . The asymptotic decrements in the running time by Algorithms 1 and 2 over the exhaustive search are thus 16% and 50%, respectively.
5. Numerical Results
We now present numerical simulations to assess the covert communications performance of our proposed algorithms. We place the source, hybrid DF/AF relay, and destination nodes on a straight line. The distance-dependent channel coefficient from node to for is in the form of in which and denote the path loss and small-scale channel variation, respectively [31]. Here, indicates the path loss at a reference distance m, accounts for the path loss exponent, and is assumed to follow Rayleigh fading with .
We set other system parameters as follows: the bandwidth MHz, R-S distance m, R-D distance m, source transmission power dBm, relay transmission power dBm, mean noise power at the relay dBm/Hz, noise uncertainty range dB, destination noise power dBm/Hz, DEP threshold , pathloss exponent , public rate threshold bps/Hz, and processing delay factor .
Figure 3 shows the average worst-case covert rate as a function of the source transmit power . We observe that the optimal mode selection of the hybrid DF/AF relay (“DF/AF (Optimal)”) yields a significant performance gain over the single relay modes (“DF” and “AF”). The equivalence between “DF/AF (Optimal)” and “DF/AF (Exhaustive)” in which the best relay mode is selected after evaluating all the logarithms in (18) and (19), (27)–(29) also verifies the correctness of our proposed criterion. The performance gain of the optimal criterion over the other compared schemes is approximately 35% at dBm.
The figure confirms the effectiveness of our proposed low-complexity algorithm (“DF/AF (Partial long-term)”) as well. It is found that the performance is close to the optimum for low values, but deviates from the optimum for higher . Nevertheless, the low-complexity scheme still outperforms other baseline schemes such as “DF/AF (Fully long-term)” where the selection is determined solely by the long-term statistics of channel, and “DF/AF (Random)” with random selection.
Figure 4 compares the average time elapsed among “DF/AF (Optimal)”, “DF/AF (Partial long-term)”, and “DF/AF (Exhaustive)” when increases. We conducted this experiment using Python 3.10 on 2023 MacBook Air 15 (Apple Inc., Cupertino, CA, USA) with Apple M2 processor including 4 cores of 3.49 GHz and the other 4 cores of 2.42 GHz. Both the proposed schemes have achieved notably lower time consumption compared to the exhaustive method. For instance, the running time gains of the optimal and partial long-term criteria over the exhaustive search are approximately 15% and 34%, respectively, at dBm, and 21% and 26% at dBm. We can thus conclude from Figure 3 and Figure 4 that the proposed schemes provide a satisfactory trade-off between performance and time complexity.
Figure 5 studies the relationship between the average worst-case covert rate and relay transmit power . The optimal hybrid DF/AF scheme once again validates its effectiveness for all values. As an example, the performance improvement of the optimal criterion over the compared schemes is at least approximately 20% at dBm. The low-complexity algorithm also demonstrates greater performance over other compared schemes from low to medium regimes, but it reduces to the single AF relay mode as becomes high. In fact, when is high, is also high, and this results in from (26) and (27), and and by definition. Moreover, one can numerically check that both average and are much lower than bps/Hz for our choice of system parameters in this section. This corresponds to Case 4 in (37) in which AF is highly likely to be selected since for high and . Hence, it explains why “DF/AF (Partial long-term)” scheme approaches the single AF relay mode. A more careful selection is therefore necessary for high .
Figure 6 presents the average worst-case covert rate as the public rate threshold varies. Our proposed optimal and low-complexity mode selection schemes show considerable improvement than other compared ones for all ranges. For as an example, the optimal criterion gains 28% improvement at least over the other compared schemes. We note that “DF/AF (Fully long-term)” based only on the long-term statistics of channel even underperform the random mode selection, despite its negligible computational complexity. This highlights the decent trade-off between the complexity and performance by the proposed “DF/AF (Partial long-term)”.
It also appears that AF outperforms DF as becomes higher. This is due to the stricter requirement for decodability at both the relay and destination node for DF mode while it is only the destination node that needs to perform decoding for AF mode. For instance, is compared with and in both in (27) and in (28) for DF mode. On the other hand, it is only in (18) that is compared with for AF mode. Thus, higher is unfavorable for DF mode to simultaneously meet the decodability at both the relay and destination node.
Figure 7 illustrates the average worst-case covert rate performance for different values of processing delay factor . The proposed optimal and low-complexity mode selection schemes mostly choose DF when is low and AF when is high as expected. Besides, both schemes make the best decision when is in an intermediate range. The performance gain of 50% is observed for the optimal criterion over the other compared schemes for . In contrast, “DF/AF (Fully long-term)” only with the long-term statistics of channel was not able to determine the best relay mode for non-extreme values of , which could be more common in practice.
6. Conclusions
In this paper, we studied covert communications in a hybrid DF/AF relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages, e.g., confidential or sensitive information, and avoid detection by the covert message detector embedded on the relay. We first established an optimal DF/AF mode selection criterion to maximize the covert rate based on the analyses of delay-aware achievable covert rates of individual DF and AF modes. To further reduce the time complexity, we proposed a low-complexity selection criterion as well for practical use. The numerical results demonstrate the covert rate gain as high as 50% and running time gain as high as 20% for particular system parameters, which verify the effectiveness of the proposed criteria.
The proposed hybrid DF/AF relay strategy for covert communications may provide adaptive and flexible means of secure transmissions by switching between DF and AF modes based on network conditions, security needs, and environmental threats, in favor of high covert rate. It is suitable for a wide range of real-world applications, such as a reliable and fast exchange of mission-critical information among military units in active combat zones, adaptive satellite-to-ground secure communications robust to abrupt climate changes and channel variations, and covert integrated sensing and communications with rapidly varying node locations.
An actual implementation of the proposed system model and relay mode selection algorithms, and handling related issues can be interesting future works.
Not applicable.
Not applicable.
The data presented in this study are available on request from the corresponding author.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 2. An optimal DF/AF mode selection criterion based on [Forumla omitted. See PDF.]. (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.].
Figure 3. The average worst-case covert rate [Forumla omitted. See PDF.] versus the source transmit power [Forumla omitted. See PDF.].
Figure 4. The average time elapsed versus the source transmit power [Forumla omitted. See PDF.].
Figure 5. The average worst-case covert rate [Forumla omitted. See PDF.] versus the relay transmit power [Forumla omitted. See PDF.].
Figure 6. The average worst-case covert rate [Forumla omitted. See PDF.] versus the public rate threshold [Forumla omitted. See PDF.].
Figure 7. The average worst-case covert rate [Forumla omitted. See PDF.] versus the processing delay factor [Forumla omitted. See PDF.].
The complexity comparison.
Algorithm | Running Time |
---|---|
Exhaustive search | |
Algorithm 1 (optimal) | |
Algorithm 2 (partial long-term) | |
References
1. Zhang, J.; Yan, Z.; Fei, S.; Wang, M.; Li, T.; Wang, H. Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?. IEEE Netw.; 2022; 36, pp. 105-112. [DOI: https://dx.doi.org/10.1109/MNET.101.2100189]
2. Jiang, Y.; Wang, L.; Chen, H.-H.; Shen, X. Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges. Proc. IEEE; 2024; 112, pp. 47-82. [DOI: https://dx.doi.org/10.1109/JPROC.2024.3364256]
3. Forouzan, B.A. Cryptography and Network Security; McGraw-Hill: New York, NY, USA, 2007.
4. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor.; 2023; 25, pp. 1173-1198. [DOI: https://dx.doi.org/10.1109/COMST.2023.3263921]
5. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun.; 2013; 31, pp. 1921-1930. [DOI: https://dx.doi.org/10.1109/JSAC.2013.130923]
6. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag.; 2015; 53, pp. 26-31. [DOI: https://dx.doi.org/10.1109/MCOM.2015.7355562]
7. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun.; 2019; 18, pp. 3542-3553. [DOI: https://dx.doi.org/10.1109/TWC.2019.2915305]
8. Kang, B.; Ye, N.; An, J. Optimal Signaling for Covert Communications Under Peak Power Constraint. IEEE Trans. Inf. Forensics Secur.; 2024; 19, pp. 5030-5045. [DOI: https://dx.doi.org/10.1109/TIFS.2024.3395067]
9. An, J.; Kang, B.; Ouyang, Q.; Pan, J.; Ye, N. Covert Communications Meet 6G NTN: A Comprehensive Enabler for Safety-Critical IoT. IEEE Netw.; 2024; 38, pp. 17-24. [DOI: https://dx.doi.org/10.1109/MNET.2024.3379864]
10. Sim, S.; Kim, J.; Lee, J. Jamming Power Optimization for Data Freshness in Covert Relay Networks. Proceedings of the 2023 14th International Conference on Information and Communication Technology Convergence (ICTC); Jeju Island, Republic of Korea, 11–13 October 2023; pp. 1401-1403.
11. Qian, Y.; Yang, C.; Mei, Z.; Zhou, X.; Shi, L.; Li, J. On Joint Optimization of Trajectory and Phase Shift for IRS-UAV Assisted Covert Communication Systems. IEEE Trans. Veh. Technol.; 2023; 72, pp. 12873-12883. [DOI: https://dx.doi.org/10.1109/TVT.2023.3271461]
12. Wang, M.; Xia, B.; Xu, Z.; Guo, Y.; Chen, Z. Performance Analysis and Optimization for Coordinated Direct and Relay Covert Transmission With Multiantenna Warder. IEEE Internet Things J.; 2023; 10, pp. 13414-13427. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3263265]
13. Gao, C.; Yang, B.; Zheng, D.; Jiang, X.; Taleb, T. Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems. IEEE Trans. Commun.; 2024; 72, pp. 1020-1032. [DOI: https://dx.doi.org/10.1109/TCOMM.2023.3327272]
14. Zhao, Q.; Gao, C.; Zheng, D.; Li, Y.; Zheng, X. Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden. IEEE Internet Things J.; 2024; 11, pp. 16450-16460. [DOI: https://dx.doi.org/10.1109/JIOT.2024.3353833]
15. Li, Q.; Xu, D.; Zhang, K.; Navaie, K.; Ding, Z. Covert Communications in STAR-RIS Assisted NOMA IoT Networks Over Nakagami-m Fading Channels. IEEE Internet Things J.; 2024; 11, pp. 22456-22470. [DOI: https://dx.doi.org/10.1109/JIOT.2024.3381596]
16. Wang, C.; Xiong, Z.; Zheng, M.; Zhao, N.; Niyato, D. Covert Communications via Two-Way IRS with Noise Power Uncertainty. IEEE Trans. Commun.; 2024; 72, pp. 4803-4815. [DOI: https://dx.doi.org/10.1109/TCOMM.2024.3381672]
17. Lin, M.; Liu, C.; Wu, Q.; Wang, W. DF-Relay-Assisted Multiantenna D2D Covert Communication in the Presence of Joint Detection. IEEE Internet Things J.; 2024; 11, pp. 11800-11811. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3331015]
18. Lin, M.; Liu, C.; Wang, W. Relay-Assisted Uplink Covert Communication in the Presence of Multi-Antenna Warden and Uninformed Jamming. IEEE Trans. Commun.; 2024; 72, pp. 2124-2137. [DOI: https://dx.doi.org/10.1109/TCOMM.2023.3342213]
19. Qin, X.; Na, Z.; Wen, Z.; Wu, X. Relaying IRS-UAV Assisted Covert Communications in Uplink C-NOMA Network. IEEE Commun. Lett.; 2024; 28, pp. 2136-2140. [DOI: https://dx.doi.org/10.1109/LCOMM.2024.3424198]
20. Moon, J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors; 2023; 23, 8747. [DOI: https://dx.doi.org/10.3390/s23218747] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/37960448]
21. Moon, J. Covert Communications in a Compress-and-Forward Relay System. ICT Express; 2024; 10, pp. 412-417. [DOI: https://dx.doi.org/10.1016/j.icte.2023.08.005]
22. Liu, Y.; Wu, H.; Jiang, X. Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems. Ad Hoc Netw.; 2023; 148, 103207. [DOI: https://dx.doi.org/10.1016/j.adhoc.2023.103207]
23. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication With Noise Uncertainty. IEEE Commun. Lett.; 2017; 21, pp. 941-944. [DOI: https://dx.doi.org/10.1109/LCOMM.2016.2647716]
24. Si, J.; Li, Z.; Zhao, Y.; Cheng, J.; Guan, L.; Shi, J.; Al-Dhahir, N. Covert Transmission Assisted by Intelligent Reflecting Surface. IEEE Trans. Commun.; 2021; 69, pp. 5394-5408. [DOI: https://dx.doi.org/10.1109/TCOMM.2021.3082779]
25. Lee, S.; Baxley, R.J.; Weitnauer, M.A.; Walkenhorst, B. Achieving Undetectable Communication. IEEE J. Sel. Top. Signal Process.; 2015; 9, pp. 1195-1205. [DOI: https://dx.doi.org/10.1109/JSTSP.2015.2421477]
26. Makki, B.; Alouini, M.-S. End-to-End Performance Analysis of Delay-Sensitive Multi-Relay Networks. IEEE Commun. Lett.; 2019; 23, pp. 2159-2163. [DOI: https://dx.doi.org/10.1109/LCOMM.2019.2945949]
27. Kim, S.W.; Ta, H.Q. Covert Communications Over Multiple Overt Channels. IEEE Trans. Commun.; 2022; 70, pp. 1112-1124. [DOI: https://dx.doi.org/10.1109/TCOMM.2021.3127532]
28. Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2005.
29. Makki, B.; Svensson, T.; Caire, G.; Zorzi, M. Fast HARQ Over Finite Blocklength Codes: A Technique for Low-Latency Reliable Communication. IEEE Trans. Wirel. Commun.; 2019; 18, pp. 194-209. [DOI: https://dx.doi.org/10.1109/TWC.2018.2878713]
30. Borwein, J.M.; Borwein, P.B. Pi and the AGM: A Study in Analytic Number Theory and Computational Complexity; Wiley: New York, NY, USA, 1987.
31. Xing, H.; Liu, L.; Zhang, R. Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel. IEEE Trans. Veh. Technol.; 2016; 65, pp. 180-190. [DOI: https://dx.doi.org/10.1109/TVT.2015.2395725]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages such as confidential or sensitive information and avoid detection by the covert message detector embedded on the relay. We first establish an optimal DF/AF mode selection criterion to maximize the covert rate based on the analyses of delay-aware achievable covert rates of individual DF and AF modes. To further reduce the time complexity, we propose a low-complexity selection criterion as well for practical use. The numerical results demonstrate the covert rate gain as high as 50% and running time gain as high as 20% for particular system parameters, which verify the effectiveness of the proposed criteria.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer