Covert Communication With a Ginibre Field of Interferers

被引:0
|
作者
Kong, Justin [1 ]
Dagefu, Fikadu T. [1 ]
机构
[1] US Army Combat Capabil Dev Command DEVCOM, Army Res Lab, Adelphi, MD 20783 USA
关键词
Covert communications; Ginibre point process; stochastic geometry; PHYSICAL LAYER SECURITY; WIRELESS NETWORKS; POINT PROCESS; PROBABILITY;
D O I
10.1109/WCNC57260.2024.10571270
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study covert communication in wireless networks consisting of a transmitter, a receiver, an adversary, and multiple randomly distributed interferers. We model the spatial distribution of the interferers as a fi-Ginibre point process which can consider a repulsion among the interferers' locations and simplifies to the Poisson point process for a particular case. Both the average detection error probability (DEP) at the adversary and the communication outage probability (COP) at the receiver are investigated. We derive approximations of the average DEP and COP, and validate that the approximations are tight when compared to the simulated results. In addition, we examine the impact of the repulsion among the interferers on both the average DEP and COP. Finally, we show that the achievable average DEP, which is the maximized DEP with a requirement on the COP, is enhanced when there exists repulsion among the positions of the interferers.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Jamming strategies in covert communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
  • [32] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    CHINA SATELLITE NAVIGATION CONFERENCE PROCEEDINGS, CSNC 2022, VOL II, 2022, 909 : 310 - 320
  • [33] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    Lecture Notes in Electrical Engineering, 2022, 909 LNEE : 310 - 320
  • [34] Covert Multi-Access Communication with a Non-Covert User
    Bounhar, Abdelaziz
    Sarkiss, Mireille
    Wigger, Michele
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 1473 - 1478
  • [35] Enhancing covert communication in NOMA systems with joint security and covert design
    Doan, Thanh Binh
    Nguyen, Tien-Hoa
    PLOS ONE, 2025, 20 (01):
  • [36] Optimum Combining for Cooperative Relaying in a Poisson Field of Interferers
    Suraweera, Navod
    Beaulieu, Norman C.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (09) : 3132 - 3142
  • [37] Image Covert Communication With Block Regulation
    Xu, Shuying
    Chang, Chin-Chen
    Horng, Ji-Hwei
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1217 - 1221
  • [38] Covert Communication Networks in Hostile Environments
    Kim, Kiseon
    Ben-Othman, Jalel
    Mahalik, Prem
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [39] Covert Communication Using Port Knocking
    Khader, Mariam
    Hadi, Ali
    Hudaib, Amjad
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 22 - 27
  • [40] Integrated optical covert sensing and communication
    朱华涛
    徐向明
    刘占琪
    张杰
    Chinese Optics Letters, 2025, 23 (02) : 19 - 23