Jamming Aided Covert Communication With Multiple Receivers
نویسندگان
چکیده
We consider that a transmitter covertly communicates with multiple receivers under the help of friendly jammer. The messages intended for different are transmitted in mutually orthogonal frequency bands. An adversary observes all these bands aiming at detecting whether or not communication occurs, while jammer broadcasts jamming signals to degrade detection performance adversary. block Rayleigh fading channel model and evaluate covert two situations: 1) wireless channels vary slowly such transmission ends within one coherent time block, 2) fast have changed several times before whole is finished. In former case, subject covertness constraint, we maximize sum effective rates by optimizing transmit power allocation rate each receiver. latter take training process into consideration, ergodic pilot length. Though both optimization problems non-convex, presented methods find their global optimal solutions. Besides, also present sub-optimal solutions lower computational complexities. Numerical results situations.
منابع مشابه
Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication
Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an ...
متن کاملStudy on Airspace Covert Communication Algorithm of Covert Communication System
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...
متن کاملCovert Communication over a K-User Multiple Access Channel
We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself ...
متن کاملCovert Wireless Communication with Artificial Noise Generation
Covert communication conceals the transmission of the message from an attentive adversary. Recent work on the limits of covert communication in additive white Gaussian noise (AWGN) channels has demonstrated that a covert transmitter (Alice) can reliably transmit a maximum of O ( √ n) bits to a covert receiver (Bob) without being detected by an adversary (Warden Willie) in n channel uses. This p...
متن کاملjamming reduction in gps receivers by subspace projection technique
different methods exists for jamming mitigation and we should choose a method based an the jammer type and other parameters. one of the jammers is narrow band fm jammer and we use subspace projection techniques for the suppression of this type of jammer. in subspace projection technique, we estimate the if of signals and construct the subspace vector that is orthogonal to jammer vector by incre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2021
ISSN: ['1536-1276', '1558-2248']
DOI: https://doi.org/10.1109/twc.2021.3059306