2023
DOI: 10.1109/jiot.2023.3237640
|View full text |Cite
|
Sign up to set email alerts
|

Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…In (9), σ 2 ij is the path-loss between i and j and R ir is the correlation matrix of the RIS elements. Here we adopt the RIS channel correlation model proposed in [37].…”
Section: B Step 2: Aggregate Randomly Configured Sub-reflecting Chann...mentioning
confidence: 99%
See 1 more Smart Citation
“…In (9), σ 2 ij is the path-loss between i and j and R ir is the correlation matrix of the RIS elements. Here we adopt the RIS channel correlation model proposed in [37].…”
Section: B Step 2: Aggregate Randomly Configured Sub-reflecting Chann...mentioning
confidence: 99%
“…To be specific, in keyless techniques no encryption is involved and the information secrecy is achieved if and only if the legitimate receiver has better channel quality than the eavesdropper. So far, numerous key-less PLS techniques are proposed in the literature including secure beamforming [5], relay-based techniques [6], power allocation schemes [7], covert methods [8], [9], etc. However, key-less secure transmission usually requires complex code design and accurate channel state information (CSI) which may not be available mainly when a passive eavesdropper is considered [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…For multi-antenna DF relay-assisted covert communications, [16] analyzed achievable covert rates, considering both direct and relay links. Furthermore, secure communications with covertness requirements were addressed in [17] in the presence of an untrusted relay, and [18] discussed a similar system with an external eavesdropper, incorporating practical assumptions such as warden location uncertainty.…”
Section: Introductionmentioning
confidence: 99%