Limits of Covert Communication on Two-Hop AWGN Channels

被引:13
|
作者
Wu, Huihui [1 ]
Liao, Xuening [2 ,3 ]
Dang, Yongchao [1 ]
Shen, Yulong [1 ]
Jiang, Xiaohong [2 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[2] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
关键词
Two-hop relay networks; low probability of detection communication; covert communication;
D O I
10.1109/NaNA.2017.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication aims to achieve secure communications among legitimate network nodes by hiding the existence of the transmission in the first place. Previous work on covert communication mainly focus on the performance analysis of single hop systems, while the performance analysis on two-hop systems remains largely unknown. This paper, for the first time, focuses on the maximum throughput analysis of a two-hop wireless system where the source only communicates with the destination via a relay node. The hypothesis testing problem is first developed to model the probability of false alarms and missed detections at the warden in a two-hop system. Based on the designed hypothesis testing problem, we then conduct theoretical analysis on the maximum throughput of the two-hop system. The results show that the transmitter can communicate with the receiver under a certain detection probability less than a constant is an element of for any is an element of > 0, when the throughput is limited as O(root n) bits in n channel uses. Finally, we conducted analysis to show that this result can be extended to a multi-hop system to ensure a low probability of detection communication.
引用
收藏
页码:42 / 47
页数:6
相关论文
共 50 条
  • [41] Energy Efficiency and Interference Neutralization in Two-Hop MIMO Interference Channels
    Zappone, Alessio
    Jorswieck, Eduard A.
    Buzzi, Stefano
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (24) : 6481 - 6495
  • [42] Flexible Relay Selection for Secure Communication in Two-hop Wireless Networks
    Shen, Yulong
    Jiang, Xiaohong
    Ma, Jianfeng
    2013 11TH INTERNATIONAL SYMPOSIUM ON MODELING & OPTIMIZATION IN MOBILE, AD HOC & WIRELESS NETWORKS (WIOPT), 2013, : 648 - 651
  • [43] Cooperative Secure Communication in Two-Hop Buffer-Aided Networks
    Wang, Dawei
    Ren, Pinyi
    Cheng, Julian
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (03) : 972 - 985
  • [44] Cooperative Beamforming and Jammer Selection Strategies for Two-Hop Secure Communication
    Deng, Hao
    Wang, Hui-Ming
    Liu, Chaowen
    Zheng, Tong-Xing
    Wang, Wenjie
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 22 - 26
  • [45] Communication Model and Capacity Limits of Covert Channels Created by Software Activities
    Yilmaz, Baki Berkay
    Sehatbakhsh, Nader
    Zajic, Alenka
    Prvulovic, Milos
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1891 - 1904
  • [46] Non-regenerative Two-Hop Wiretap Channels using Interference Neutralization
    Gerbracht, Sabrina
    Jorswieck, Eduard A.
    Zheng, Gan
    Ottersten, Bjoern
    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 258 - 263
  • [47] Performance Analysis of Two-Hop OSTBC Transmission over Rayleigh Fading Channels
    Guangping Li
    StevenD Blostein
    Jiayin Qin
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [48] Massive MIMO TWO-Hop Relay Systems Over Rician Fading Channels
    Cao, Jian
    Yu, Shujuan
    Yang, Jie
    Zhang, Yun
    Zhao, Shengmei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5410 - 5426
  • [49] Performance analysis of two-hop relayed transmissions over Rayleigh fading channels
    Hasna, MO
    Alouini, MS
    IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, : 1992 - 1996
  • [50] Throughput of Two-Hop Wireless Channels with Queueing Constraints and Finite Blocklength Codes
    Li, Yi
    Gursoy, M. Cenk
    Velipasalar, Senem
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2599 - 2603