Covert Communications in Wideband OFDMA Primary Networks

被引:0
|
作者
Shabsigh, Ghaith [1 ]
Frost, Victor S. [1 ]
机构
[1] Univ Kansas, Dept Elect Engn & Comp Sci, Lawrence, KS 66045 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting and hiding the transmission of information over wireless channels at the physical layer level is of great importance in several applications. An Ad-Hoc covert network (ACN) is a set of users that exchange information over a wireless channel with a low probability of being detected by an intercept receiver. The ACN achieves a low probability of detection by hiding its transmission within noise or by exploiting the RF spectrum of other man-made transmissions. OFDM-based wireless systems, like LTE, are very well known for their ability to adapt and overcome channel variations and interference, which make them vulnerable to exploitation. In this paper, we consider an ACN that hides its transmission by frequency hopping in the RF spectrum of an OFDM-based wireless primary network (PN). To minimize the interference on the PN and increase the performance of the ACN, we first employ a spectrum sensing method that takes advantage of the OFDM nature of the PN to identify unused subcarriers. We proceed by deriving the optimum ACN power allocation algorithm that maximizes its throughput, and satisfies interference constraints on the OFDM PN. The solution will demonstrate that this optimum algorithm does not rely on the LPD requirements of the ACN. Finally, the possibility of the ACN to operate at a low probability of being detected by an intercept receiver is discussed.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Joint Beamforming and UAV Trajectory Optimization for Covert Communications in ISAC Networks
    Deng, Dan
    Zhou, Wen
    Li, Xingwang
    da Costa, Daniel Benevides
    Ng, Derrick Wing Kwan
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2025, 24 (02) : 1016 - 1030
  • [22] Covert Communications Aided by Cooperative Jamming in Overlay Cognitive Radio Networks
    Wen, Yingkun
    Liu, Lei
    Li, Junhuai
    Li, Yilan
    Wang, Kan
    Yu, Shui
    Guizani, Mohsen
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 12878 - 12891
  • [23] Joint Optimization for Covert Communications in UAV-Assisted NOMA Networks
    Deng, Dan
    Dang, Shuping
    Li, Xingwang
    Ng, Derrick Wing Kwan
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) : 1012 - 1026
  • [24] Device-to-device communications under transceiver impairments in OFDMA cellular networks
    Dahat, Priyadarshi Ashok
    Das, Suvra Sekhar
    Physical Communication, 2020, 40
  • [25] Achieving a frequency reuse factor of 1 in OFDMA cellular networks with cooperative communications
    Pischella, Mylene
    Belfiore, Jean-Claude
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 653 - +
  • [26] Punctured pilots for OFDMA Communications
    Jung, Sung-Yoon
    Kim, Sunghwan
    2011 IEEE 54TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2011,
  • [27] Device-to-device communications under transceiver impairments in OFDMA cellular networks
    Dahat, Priyadarshi Ashok
    Das, Suvra Sekhar
    PHYSICAL COMMUNICATION, 2020, 40
  • [28] OFDMA in LTE Mobile Communications
    Flores, Fanny P.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ENGINEERING, SCIENCE, AND INDUSTRIAL APPLICATIONS (ICESI 2017), 2017, : 88 - 103
  • [29] Covert underwater acoustic communications
    Ling, Jun
    He, Hao
    Li, Jian
    Roberts, William
    Stoica, Petre
    JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 2010, 128 (05): : 2898 - 2909
  • [30] Minecraft tunnels for covert communications☆
    Tusing, Nathan
    Oakley, Jonathan
    Shao, Chunpeng
    Yu, Lu
    Brooks, Richard
    ENTERTAINMENT COMPUTING, 2025, 53