Survey of capacity limits and implementation techniques in wireless covert communication

被引:0
|
作者
Chen, Weiyu [1 ]
Luo, Junshan [1 ]
Wang, Fanggang [2 ]
Ding, Haiyang [3 ]
Wang, Shilian [1 ]
Xia, Guojiang [4 ]
机构
[1] College of Electronic Science and Technology, National University of Defense Technology, Changsha,410073, China
[2] State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing,100044, China
[3] College of Information and Communication, National University of Defense Technology, Wuhan,430019, China
[4] Beijing Institute of Astronautical Systems Engineering, Beijing,100076, China
来源
基金
中国国家自然科学基金;
关键词
Network layers - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
The differences and connections between wireless covert communication (WCC) and related concepts were clarified. The WCC research based on hypothesis testing theory and information theory was focused. The basic research model and the categories of specific models were introduced. The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques. The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate. The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios. Finally, potential research directions were discussed. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:203 / 218
相关论文
共 50 条
  • [11] Optical frequency comb assisted denoising for multiple access and capacity enhancement of covert wireless communication
    Yan, Xianglei
    Pan, Wei
    Zou, Xihua
    Lu, Bing
    Yan, Lianshan
    Luo, Bin
    OPTICS LETTERS, 2022, 47 (06) : 1442 - 1445
  • [12] Directional modulation techniques for secure wireless communication: a comprehensive survey
    Omar Ansari
    Muhammad Amin
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [13] Aggregation techniques in wireless communication using federated learning: a survey
    Kaur G.
    Grewal S.K.
    Int. J. Wireless Mobile Comput., 2 (115-126): : 115 - 126
  • [14] Multipath mitigation techniques in indoor wireless communication networks - A survey
    Sunder, R
    Krishnan, CN
    IETE JOURNAL OF RESEARCH, 2000, 46 (06) : 435 - 446
  • [15] Directional modulation techniques for secure wireless communication: a comprehensive survey
    Ansari, Omar
    Amin, Muhammad
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [16] Covert Wireless Communication With a Poisson Field of Interferers
    He, Biao
    Yan, Shihao
    Zhou, Xiangyun
    Jafarkhani, Hamid
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) : 6005 - 6017
  • [17] Covert Wireless Communication With Artificial Noise Generation
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Bash, Boulat A.
    Guha, Saikat
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (11) : 7252 - 7267
  • [18] An Adaptive Audio Steganography for Covert Wireless Communication
    Xin, Guojiang
    Liu, Yuling
    Yang, Ting
    Cao, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [19] Wireless Covert Communication with Polarization Dirty Constellation
    Hu, Mingyu
    Qiao, Sen
    Ji, Xiaopeng
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [20] Hardware Implementation of Audio Watermarking - Covert Communication
    Karthigaikumar, P.
    Baskaran, K.
    Kirubavathy, K. Jaraline
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 588 - 592