Survey of capacity limits and implementation techniques in wireless covert communication

被引:0
|
作者
Chen, Weiyu [1 ]
Luo, Junshan [1 ]
Wang, Fanggang [2 ]
Ding, Haiyang [3 ]
Wang, Shilian [1 ]
Xia, Guojiang [4 ]
机构
[1] College of Electronic Science and Technology, National University of Defense Technology, Changsha,410073, China
[2] State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing,100044, China
[3] College of Information and Communication, National University of Defense Technology, Wuhan,430019, China
[4] Beijing Institute of Astronautical Systems Engineering, Beijing,100076, China
来源
基金
中国国家自然科学基金;
关键词
Network layers - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
The differences and connections between wireless covert communication (WCC) and related concepts were clarified. The WCC research based on hypothesis testing theory and information theory was focused. The basic research model and the categories of specific models were introduced. The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques. The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate. The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios. Finally, potential research directions were discussed. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:203 / 218
相关论文
共 50 条
  • [31] Fundamental Limits of Covert Communication over MIMO AWGN Channel
    Abdelaziz, Amr
    Koksal, C. Emre
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 64 - 72
  • [32] A NOVEL COVERT SPEECH COMMUNICATION SYSTEM AND ITS IMPLEMENTATION
    Deng Zongyuan Shao Xi Yang Zhen Zheng Baoyu (Operation & Maintenance Centre
    JournalofElectronics(China), 2008, (06) : 737 - 745
  • [33] On the Limits of Covert Backscatter Communication Over Undecodable Ambient Signals
    Chen, Weiyu
    Ding, Haiyang
    Wang, Shilian
    Gong, Fengkui
    Xia, Guojiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4198 - 4213
  • [34] Shannon capacity limits of wireless networks
    Viterbi, Andrew
    SEQUENCES, SUBSEQUENCES, AND CONSEQUENCES, 2007, 4893 : 147 - 152
  • [35] Wave diversity limits for wireless communication
    Franceschetti, Massimo
    2008 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM, VOLS 1-9, 2008, : 4250 - 4253
  • [36] A survey on secure communication techniques for 5G wireless heterogeneous networks
    Kakkar, Ajay
    INFORMATION FUSION, 2020, 62 : 89 - 109
  • [37] Advanced techniques for wireless communication
    University of Magdeburg, Germany
    不详
    IEEE MTT S Int Microwave Symp Dig, 2006, (780):
  • [38] Achieving Covert Wireless Communication With a Multi-Antenna Relay
    Lv, Lu
    Li, Zan
    Ding, Haiyang
    Al-Dhahir, Naofal
    Chen, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 760 - 773
  • [39] Throughput Scaling of Covert Communication over Wireless Adhoc Networks
    Cho, Kang-Hee
    Lee, Si-Hyeon
    Tan, Vincent Y. F.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2164 - 2168
  • [40] Practical Covert Wireless Unidirectional Communication in IEEE 802.11 Environment
    Seong, Hayoung
    Kim, Ikkyun
    Jeon, Yongsung
    Oh, Mi-Kyung
    Lee, Sangjae
    Choi, Dooho
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) : 1499 - 1516