2018
DOI: 10.1109/twc.2018.2831217
|View full text |Cite
|
Sign up to set email alerts
|

Covert Communication Achieved by a Greedy Relay in Wireless Networks

Abstract: Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
122
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 177 publications
(123 citation statements)
references
References 30 publications
1
122
0
Order By: Relevance
“…Taking plane, for example, with the vector residual, of residual signal and the corresponding center line value shared between the sender and the receiver, the secret message bits can be demodulated with (14). The demodulation in plane works in the same way.…”
Section: Model-based Demodulationmentioning
confidence: 99%
See 2 more Smart Citations
“…Taking plane, for example, with the vector residual, of residual signal and the corresponding center line value shared between the sender and the receiver, the secret message bits can be demodulated with (14). The demodulation in plane works in the same way.…”
Section: Model-based Demodulationmentioning
confidence: 99%
“…Several kinds of wireless covert channels have been proposed [6][7][8][9][10][11][12][13][14][15][16]. In [7,13], the secret data is embedded in the redundant fields of wireless communication protocols such as padding of frames, headers of the MAC, RLC, and PDCP.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Proof. By invoking the CDFs F SE (x) and F Ψ 2 (x) into (19) and differentiating it with respect to x with the help of 34(eq. 1.14.1.4) and after some simplifications, we can obtain the PDF Λ (II) E (x) as given in (21).…”
Section: Proposition 2 the Pdf λ (Ii)mentioning
confidence: 99%
“…8 PHY-security can be implemented without consuming the additional communication resources or infrastructures, and it can guarantee information confidentiality with the aid of appropriate coding and signal processing techniques. Recently, PHY-security in cooperative relaying networks has been widely studied in the literature (see other works [9][10][11][12][13][14][15][16][17][18][19] and the references therein). Specifically, Zou et al, 9 Yang et al, 10 and Nguyen and Kim 11 have investigated the secrecy performance of cooperative multirelay networks with optimal relay selection scheme.…”
Section: Introductionmentioning
confidence: 99%