Covert Communication Assisted by Friendly Jammer with Jamming-Monitoring Channel Uncertainty

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Covert communication is mainly achieved via concealing or masking the legitimate transmissions from being passively detected by the hostile nodes. In this research, we introduce and investigate a covert communication proposal with the assistance of a friendly jammer. In our proposal, jamming based interference injection and channel uncertainty are both employed for enhancing the covertness of legitimate communication. Based on the formulated detecting model, the average minimum detection error probability is derived for the hostile monitoring node. We deduce the outage probability and the covert throughput achievable by the legitimate receiving node. In addition, we detail a two-phase based bisection algorithm for attaining the maximal covert throughput with joint optimal of jamming power and transmission information rate. Finally, simulation results reveal the effectiveness of the proposed covert wireless system.

Original languageEnglish
Title of host publication2023 9th International Conference on Mechanical and Electronics Engineering, ICMEE 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages43-48
Number of pages6
ISBN (Electronic)9798350307146
DOIs
StatePublished - 2023
Event9th International Conference on Mechanical and Electronics Engineering, ICMEE 2023 - Xi'an, China
Duration: 17 Nov 202319 Nov 2023

Publication series

Name2023 9th International Conference on Mechanical and Electronics Engineering, ICMEE 2023

Conference

Conference9th International Conference on Mechanical and Electronics Engineering, ICMEE 2023
Country/TerritoryChina
CityXi'an
Period17/11/2319/11/23

Keywords

  • Covert communication
  • channel uncertainty
  • covert throughput maximization
  • friendly jammer
  • hostile detection performance

Fingerprint

Dive into the research topics of 'Covert Communication Assisted by Friendly Jammer with Jamming-Monitoring Channel Uncertainty'. Together they form a unique fingerprint.

Cite this