Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/WCNC51071.2022.9771821guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Covert Communications in Low-VHF/Microwave Heterogeneous Networks

Published: 10 April 2022 Publication History

Abstract

In this paper, we explore covert communication in a heterogeneous network where a transmitter sends a confidential message to a receiver by utilizing two different radio frequency (RF) bands, low-very high frequency (low-VHF) and microwave frequency modalities. Since two RF modalities exhibit different characteristics in terms of channels and available bandwidths, it is important to efficiently leverage the modalities based on the wireless environment. Therefore, we develop a new algorithm that optimizes the transmit powers and bandwidths for the modalities and selects one modality with the goal of maximizing the detection error probability at a warden while guaranteeing a quality-of-service requirement of the receiver. We first derive a closed-form joint optimal power and bandwidth solution for a given modality, and then provide a modality selection method. From numerical simulations, it is validated that the proposed scheme achieves the optimal performance and the covertness can be enhanced by judiciously choosing one of the two modalities based on the channel condition.

References

[1]
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 16, pp. 1550–1573, Third Quart. 2014.
[2]
Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surveys Tuts., vol. 19, pp. 347–376, First Quart. 2017.
[3]
S. Yan, X. Zhou, J. Hu, and S. V. Hanly, “Low probability of detection communication: Opportunities and challenges,” IEEE Wireless Commun., vol. 26, pp. 19–25, Oct. 2019.
[4]
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.
[5]
A. O. Hero, “Secure space-time communication,” IEEE Trans. Inf. Theory, vol. 49, pp. 3235–3249, Dec. 2003.
[6]
I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978.
[7]
Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, pp. 2470–2492, Jun. 2008.
[8]
H.-B. Kong, P. Wang, D. Niyato, and Y. Cheng, “Physical layer security in wireless networks with Ginibre point processes,” IEEE Trans. Wireless Commun., vol. 17, pp. 5132–5147, Aug. 2018.
[9]
R. Chopra, C. R. Murthy, and R. Annavajjala, “Physical layer security in wireless sensor networks using distributed co-phasing,” IEEE Trans. Inf. Forensics security, vol. 14, pp. 2662–2675, Oct. 2019.
[10]
J. Kong, F. T. Dagefu, and B. M. Sadler, “Distributed beamforming in the presence of adversaries,” IEEE Trans. Veh. Technol., vol. 69, pp. 9682–9696, Sep. 2020.
[11]
H. Wang, Y. Zhang, D. W. K. Ng, and M. H. Lee, “Secure routing with power optimization for ad-hoc networks,” IEEE Trans. Commun., vol. 66, pp. 4666–4679, Oct. 2018.
[12]
B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, pp. 1921–1930, Sep. 2013.
[13]
P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” in Proc. Int. Symp. Inf. Theory, Istanbul, Turkey, pp. 2945–2949, Jul. 2013.
[14]
L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits of communication with low probability of detection,” IEEE Trans. Inf. Theory, vol. 62, pp. 3493–3503, Jun. 2016.
[15]
K. S. K. Arumugam and M. R. Bloch, “Keyless covert communication over multiple-access channels,” in Proc. Int. Symp. Inf. Theory, Barcelona, Spain, pp. 2229–2233, Jul. 2016.
[16]
B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication with noise uncertainty,” IEEE Commun. Lett., vol. 21, pp. 941–944, Apr. 2017.
[17]
B. He, S. Yan, X. Zhou, and H. Jafarkhani, “Covert wireless communication with a Poisson field of interferers,” IEEE Trans. Wireless Commun., vol. 17, pp. 6005–6017, Sep. 2018.
[18]
J. Kong, F. T. Dagefu, J. Choi, and P. Spasojevic, “Intelligent reflecting surface assisted covert communication with transmission probability op-timization,” IEEE Wireless Commun. Lett., vol. 10, pp. 1825–1829, Aug. 2021.
[19]
S. Yan, B. He, X. Zhou, Y. Cong, and A. L. Swindlehurst, “Delay-intolerant covert communications with either fixed or random transmit power,” IEEE Trans. Inf. Forensics security, vol. 14, pp. 129–140, Jan. 2019.
[20]
R. Ma, X. Yang, G. Pan, X. Guan, Y. Zhang, and W. Yang, “Covert communications with channel inversion power control in the finite blocklength regime,” IEEE Wireless Commun. Lett., vol. 10, pp. 835–839, Apr. 2021.
[21]
Y. Wu, A. Khisti, C. Xiao, G. Caire, K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, pp. 679–695, Apr. 2018.
[22]
T. Lv, H. Gao, and S. Yang, “Secrecy transmit beamforming for heterogeneous networks,” IEEE J. Sel. Areas Commun., vol. 33, pp. 1154–1170, Jun. 2015.
[23]
H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Physical layer security in heterogeneous cellular networks,” IEEE Trans. Commun., vol. 64, pp. 1204–1219, Mar. 2016.
[24]
L. Xu, H. Xing, A. Nallanathan, Y. Yang, and T. Chai, “Security-aware cross-layer resource allocation for heterogeneous wireless networks,” IEEE Trans. Commun., vol. 67, pp. 1388–1399, Feb. 2018.
[25]
F. T. Dagefu et al., “Short-range low-VHF channel characterization in cluttered environments,” IEEE Trans. Antennas Propag., vol. 63, pp. 2719–2727, Jun. 2015.
[26]
F. T. Dagefu et al., “Performance assessment of lower VHF band for short-range communication and geolocation applications,” Radio Science, vol. 50, pp. 443–452, May 2015.
[27]
J. Choi, F. T. Dagefu, B. M. Sadler, and K. Sarabandi, “Low-power low-VHF ad-hoc networking in complex environments,” IEEE Access, vol. 5, pp. 24120–24127, Nov. 2017.
[28]
EMAG Technologies Inc. [Online]. Available: https://emagtech.com/.

Cited By

View all
  • (2024)Covert Communications with Simultaneous Multi-Modal TransmissionProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656117(1-7)Online publication date: 27-May-2024

Index Terms

  1. Covert Communications in Low-VHF/Microwave Heterogeneous Networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        2022 IEEE Wireless Communications and Networking Conference (WCNC)
        Apr 2022
        2737 pages

        Publisher

        IEEE Press

        Publication History

        Published: 10 April 2022

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 20 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Covert Communications with Simultaneous Multi-Modal TransmissionProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656117(1-7)Online publication date: 27-May-2024

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media