2021
DOI: 10.1109/tcomm.2021.3089694
|View full text |Cite
|
Sign up to set email alerts
|

Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…Gao et al [64] analyzed the covert performance of relay-assisted Internet of Things (IoT) systems with a source-destination pair, a passive warden, and multiple relays, where random selection and superior-link selection schemes were considered. In comparison with the scheme in [63], Sun et al proposed a full-duplex relaying scheme to further improve the covertness performance of systems and investigated the fundamental covert rate performance, where the different relay work modes are considered, including the FD mode and the half-duplex (HD) mode [65]. Jiang et al investigated the resource allocation problem of UAV network covert communication in multi-user scenarios, considering the location uncertainty of the warden, a robust resource allocation and UAV trajectory optimization problem with worst-case covertness constraint is then formulated to maximize the average covert rate [66].…”
Section: B Weakening Signal Leakagementioning
confidence: 99%
“…Gao et al [64] analyzed the covert performance of relay-assisted Internet of Things (IoT) systems with a source-destination pair, a passive warden, and multiple relays, where random selection and superior-link selection schemes were considered. In comparison with the scheme in [63], Sun et al proposed a full-duplex relaying scheme to further improve the covertness performance of systems and investigated the fundamental covert rate performance, where the different relay work modes are considered, including the FD mode and the half-duplex (HD) mode [65]. Jiang et al investigated the resource allocation problem of UAV network covert communication in multi-user scenarios, considering the location uncertainty of the warden, a robust resource allocation and UAV trajectory optimization problem with worst-case covertness constraint is then formulated to maximize the average covert rate [66].…”
Section: B Weakening Signal Leakagementioning
confidence: 99%
“…Covert communications, which intend to hide the existence of wireless communications, have emerged as exciting security technology to preserve users' privacy and also prevent wireless transmission content from being eavesdropped [6]. Such a security technology is highly appealing [7], especially when the DCNTs are deployed to provide some critical services, such as military, healthcare and location tracking.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, more and more recent studies on covert communication scenarios with relay nodes have been conducted. The fundamental covert rate performance of two‐hop wireless relaying system with relay that can work at either the full‐duplex (FD) mode or the half‐duplex (HD) is analyzed in [12]. The transmit power allocation strategy of each relay nodes in multi‐hop routing networks are developed in [13].…”
Section: Introductionmentioning
confidence: 99%