Cargando…
Disguised Full-Duplex Covert Communications
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages....
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10385348/ https://www.ncbi.nlm.nih.gov/pubmed/37514808 http://dx.doi.org/10.3390/s23146515 |
_version_ | 1785081384178548736 |
---|---|
author | Moon, Jihwan |
author_facet | Moon, Jihwan |
author_sort | Moon, Jihwan |
collection | PubMed |
description | Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. |
format | Online Article Text |
id | pubmed-10385348 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103853482023-07-30 Disguised Full-Duplex Covert Communications Moon, Jihwan Sensors (Basel) Communication Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. MDPI 2023-07-19 /pmc/articles/PMC10385348/ /pubmed/37514808 http://dx.doi.org/10.3390/s23146515 Text en © 2023 by the author. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Communication Moon, Jihwan Disguised Full-Duplex Covert Communications |
title | Disguised Full-Duplex Covert Communications |
title_full | Disguised Full-Duplex Covert Communications |
title_fullStr | Disguised Full-Duplex Covert Communications |
title_full_unstemmed | Disguised Full-Duplex Covert Communications |
title_short | Disguised Full-Duplex Covert Communications |
title_sort | disguised full-duplex covert communications |
topic | Communication |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10385348/ https://www.ncbi.nlm.nih.gov/pubmed/37514808 http://dx.doi.org/10.3390/s23146515 |
work_keys_str_mv | AT moonjihwan disguisedfullduplexcovertcommunications |