Survey of capacity limits and implementation techniques in wireless covert communication

被引:0
|
作者
Chen, Weiyu [1 ]
Luo, Junshan [1 ]
Wang, Fanggang [2 ]
Ding, Haiyang [3 ]
Wang, Shilian [1 ]
Xia, Guojiang [4 ]
机构
[1] College of Electronic Science and Technology, National University of Defense Technology, Changsha,410073, China
[2] State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing,100044, China
[3] College of Information and Communication, National University of Defense Technology, Wuhan,430019, China
[4] Beijing Institute of Astronautical Systems Engineering, Beijing,100076, China
来源
基金
中国国家自然科学基金;
关键词
Network layers - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
The differences and connections between wireless covert communication (WCC) and related concepts were clarified. The WCC research based on hypothesis testing theory and information theory was focused. The basic research model and the categories of specific models were introduced. The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques. The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate. The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios. Finally, potential research directions were discussed. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:203 / 218
相关论文
共 50 条
  • [21] Techniques for detecting & characterising covert communication signals
    Hill, PCJ
    Comley, VE
    Adams, ER
    MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1361 - 1365
  • [22] Multi-carrier transmission techniques for wireless communication systems: A survey
    Taha, Haitham J.
    Salleh, M.F.M.
    WSEAS Transactions on Communications, 2009, 8 (05): : 457 - 472
  • [23] Covert Communication Achieved by a Greedy Relay in Wireless Networks
    Hu, Jinsong
    Yan, Shihao
    Zhou, Xiangyun
    Shu, Feng
    Li, Jun
    Wang, Jiangzhou
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) : 4766 - 4779
  • [24] On Resource Allocation in Covert Wireless Communication With Channel Estimation
    Sun, Linlin
    Xu, Tingzhen
    Yan, Shihao
    Hu, Jinsong
    Yu, Xian
    Shu, Feng
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) : 6456 - 6469
  • [25] On the Impact of Warden Collusion on Covert Communication in Wireless Networks
    Zhao, Shuangrui
    Liu, Jia
    Shen, Yulong
    Jiang, Xiaohong
    Taleb, Tarik
    Shiratori, Norio
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2297 - 2312
  • [26] Covert Wireless Communication Against Surveillance With Detection and Localization
    Lin, Menghan
    Liu, Chaowen
    Zheng, Tong-Xing
    He, Yi
    Wang, Wenjie
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [27] Covert Wireless Communication With Random Frequency Diverse Array
    Li, Lintao
    Chen, Zhilin
    Chen, Riqing
    Yang, Lei
    Yan, Shihao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) : 1473 - 1478
  • [28] Robust covert communication using high capacity watermarking
    Gaurav Bhatnagar
    Multimedia Tools and Applications, 2017, 76 : 3783 - 3807
  • [29] Limits of Covert Communication on Two-Hop AWGN Channels
    Wu, Huihui
    Liao, Xuening
    Dang, Yongchao
    Shen, Yulong
    Jiang, Xiaohong
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 42 - 47
  • [30] Robust covert communication using high capacity watermarking
    Bhatnagar, Gaurav
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3783 - 3807