Survey of capacity limits and implementation techniques in wireless covert communication

被引:0
|
作者
Chen, Weiyu [1 ]
Luo, Junshan [1 ]
Wang, Fanggang [2 ]
Ding, Haiyang [3 ]
Wang, Shilian [1 ]
Xia, Guojiang [4 ]
机构
[1] College of Electronic Science and Technology, National University of Defense Technology, Changsha,410073, China
[2] State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing,100044, China
[3] College of Information and Communication, National University of Defense Technology, Wuhan,430019, China
[4] Beijing Institute of Astronautical Systems Engineering, Beijing,100076, China
来源
基金
中国国家自然科学基金;
关键词
Network layers - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
The differences and connections between wireless covert communication (WCC) and related concepts were clarified. The WCC research based on hypothesis testing theory and information theory was focused. The basic research model and the categories of specific models were introduced. The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques. The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate. The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios. Finally, potential research directions were discussed. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:203 / 218
相关论文
共 50 条
  • [1] Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 26 - +
  • [2] Communication Model and Capacity Limits of Covert Channels Created by Software Activities
    Yilmaz, Baki Berkay
    Sehatbakhsh, Nader
    Zajic, Alenka
    Prvulovic, Milos
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1891 - 1904
  • [3] A comprehensive survey of covert communication techniques, limitations and future challenges
    Makhdoom, Imran
    Abolhasan, Mehran
    Lipman, Justin
    COMPUTERS & SECURITY, 2022, 120
  • [4] Multiple antenna wireless communication systems: Limits to capacity growth
    Hanlen, L
    Fu, M
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 172 - 176
  • [5] Covert Communication in Wireless Relay Networks
    Hu, Jinsong
    Yan, Shihao
    Zhou, Xiangyun
    Shu, Feng
    Wang, Jiangzhou
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [6] Covert Wireless Communication in Multichannel Systems
    Che, Bohan
    Gao, Chang
    Ma, Ruiqian
    Zheng, Xueqiang
    Yang, Weiwei
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (09) : 1790 - 1794
  • [7] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    CHINA SATELLITE NAVIGATION CONFERENCE PROCEEDINGS, CSNC 2022, VOL II, 2022, 909 : 310 - 320
  • [8] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    Lecture Notes in Electrical Engineering, 2022, 909 LNEE : 310 - 320
  • [9] Implementation of covert communication based on steganography
    Huang Yongfeng
    Xiao Bo
    Xiao Honghua
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1512 - 1515
  • [10] Blockchain Meets Covert Communication: A Survey
    Chen, Zhuo
    Zhu, Liehuang
    Jiang, Peng
    Zhang, Can
    Gao, Feng
    He, Jialing
    Xu, Dawei
    Zhang, Yan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (04): : 2163 - 2192