Covert Communication With a Ginibre Field of Interferers

被引:0
|
作者
Kong, Justin [1 ]
Dagefu, Fikadu T. [1 ]
机构
[1] US Army Combat Capabil Dev Command DEVCOM, Army Res Lab, Adelphi, MD 20783 USA
关键词
Covert communications; Ginibre point process; stochastic geometry; PHYSICAL LAYER SECURITY; WIRELESS NETWORKS; POINT PROCESS; PROBABILITY;
D O I
10.1109/WCNC57260.2024.10571270
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study covert communication in wireless networks consisting of a transmitter, a receiver, an adversary, and multiple randomly distributed interferers. We model the spatial distribution of the interferers as a fi-Ginibre point process which can consider a repulsion among the interferers' locations and simplifies to the Poisson point process for a particular case. Both the average detection error probability (DEP) at the adversary and the communication outage probability (COP) at the receiver are investigated. We derive approximations of the average DEP and COP, and validate that the approximations are tight when compared to the simulated results. In addition, we examine the impact of the repulsion among the interferers on both the average DEP and COP. Finally, we show that the achievable average DEP, which is the maximized DEP with a requirement on the COP, is enhanced when there exists repulsion among the positions of the interferers.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Covert Communication With Mismatched Decoders
    Zhang, Qiaosheng
    Tan, Vincent Y. F.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (07) : 4163 - 4177
  • [22] Covert Communication With Acoustic Noise
    Jin, Meng
    He, Yuan
    Liu, Yunhao
    Wang, Xinbing
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (01) : 207 - 221
  • [23] Keyless Asynchronous Covert Communication
    Arumugam, Keerthi Suria Kumar
    Bloch, Matthieu R.
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [24] Jamming Strategies in Covert Communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 1 - 15
  • [25] Deep Learning for Covert Communication
    Shen, Weiguo
    Chen, Jiepeng
    Zheng, Shilian
    Zhang, Luxin
    Pei, Zhangbin
    Lu, Weidang
    Yang, Xiaoniu
    CHINA COMMUNICATIONS, 2024, 21 (09) : 40 - 59
  • [26] Detecting Covert Communication on Android
    Hansen, Michael
    Hill, Raquel
    Wimberly, Seth
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 300 - 303
  • [27] Covert Communication With Cognitive Jammer
    Xiong, Wenhui
    Yao, Yinfeng
    Fu, Xiaoyu
    Li, Shaoqian
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (10) : 1753 - 1757
  • [28] On Covert Communication With Interference Uncertainty
    Liu, Zhihong
    Liu, Jiajia
    Zeng, Yong
    Ma, Jianfeng
    Huang, Qiping
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [29] Covert Communication in Mobile Applications
    Rubin, Julia
    Gordon, Michael I.
    Nguyen Nguyen
    Rinard, Martin
    2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 647 - 657
  • [30] Deep Learning for Covert Communication
    Shen Weiguo
    Chen Jiepeng
    Zheng Shilian
    Zhang Luxin
    Pei Zhangbin
    Lu Weidang
    Yang Xiaoniu
    China Communications, 2024, 21 (09) : 40 - 59