Covert Communication Achieved by a Greedy Relay in Wireless Networks; IEEE Transactions on Wireless Communications; Vol. 17, iss. 7

Podrobná bibliografie
Parent link:IEEE Transactions on Wireless Communications
Vol. 17, iss. 7.— 2018.— [P. 4766-4779]
Korporativní autor: Национальный исследовательский Томский политехнический университет Инженерная школа информационных технологий и робототехники Отделение автоматизации и робототехники
Další autoři: Hu Jinsong, Yan Shihao, Zhou Xiangyun, Shu Feng, Li Dzhun, Wang Jiangzhou
Shrnutí:Title screen
Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this paper, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power and spectrum) allocated only for the purpose of forwarding the source's information. We propose two strategies for the relay to transmit its covert information, namely rate-control and power-control transmission schemes, for which the source's detection limits are analyzed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the power-control transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source's message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmits power).
Jazyk:angličtina
Vydáno: 2018
Témata:
On-line přístup:https://doi.org/10.1109/TWC.2018.2831217
Médium: Elektronický zdroj Kapitola
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=664282

MARC

LEADER 00000naa0a2200000 4500
001 664282
005 20250424142848.0
035 |a (RuTPU)RU\TPU\network\35466 
035 |a RU\TPU\network\35400 
090 |a 664282 
100 |a 20210406d2018 k||y0rusy50 ba 
101 0 |a eng 
102 |a US 
135 |a drcn ---uucaa 
181 0 |a i  
182 0 |a b 
200 1 |a Covert Communication Achieved by a Greedy Relay in Wireless Networks  |f Hu Jinsong, Yan Shihao, Zhou Xiangyun [et al.] 
203 |a Text  |c electronic 
300 |a Title screen 
320 |a [References: 32 tit.] 
330 |a Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this paper, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power and spectrum) allocated only for the purpose of forwarding the source's information. We propose two strategies for the relay to transmit its covert information, namely rate-control and power-control transmission schemes, for which the source's detection limits are analyzed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the power-control transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source's message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmits power). 
461 |t  IEEE Transactions on Wireless Communications 
463 |t Vol. 17, iss. 7  |v [P. 4766-4779]  |d 2018 
610 1 |a труды учёных ТПУ 
610 1 |a электронный ресурс 
610 1 |a physical layer security 
610 1 |a covert communication 
610 1 |a wireless relay networks 
610 1 |a detection 
610 1 |a transmission schemes 
610 1 |a безопасность 
610 1 |a беспроводные сети 
610 1 |a обнаружение 
701 0 |a Hu Jinsong 
701 0 |a Yan Shihao 
701 0 |a Zhou Xiangyun 
701 0 |a Shu Feng 
701 0 |a Li Dzhun 
701 0 |a Wang Jiangzhou 
712 0 2 |a Национальный исследовательский Томский политехнический университет  |b Инженерная школа информационных технологий и робототехники  |b Отделение автоматизации и робототехники  |3 (RuTPU)RU\TPU\col\23553 
801 0 |a RU  |b 63413507  |c 20210406  |g RCR 
850 |a 63413507 
856 4 |u https://doi.org/10.1109/TWC.2018.2831217 
942 |c CF