Jamming Aided Covert Communication With Multiple Receivers

نویسندگان

چکیده

We consider that a transmitter covertly communicates with multiple receivers under the help of friendly jammer. The messages intended for different are transmitted in mutually orthogonal frequency bands. An adversary observes all these bands aiming at detecting whether or not communication occurs, while jammer broadcasts jamming signals to degrade detection performance adversary. block Rayleigh fading channel model and evaluate covert two situations: 1) wireless channels vary slowly such transmission ends within one coherent time block, 2) fast have changed several times before whole is finished. In former case, subject covertness constraint, we maximize sum effective rates by optimizing transmit power allocation rate each receiver. latter take training process into consideration, ergodic pilot length. Though both optimization problems non-convex, presented methods find their global optimal solutions. Besides, also present sub-optimal solutions lower computational complexities. Numerical results situations.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication

Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an ...

متن کامل

Study on Airspace Covert Communication Algorithm of Covert Communication System

Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...

متن کامل

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself ...

متن کامل

Covert Wireless Communication with Artificial Noise Generation

Covert communication conceals the transmission of the message from an attentive adversary. Recent work on the limits of covert communication in additive white Gaussian noise (AWGN) channels has demonstrated that a covert transmitter (Alice) can reliably transmit a maximum of O ( √ n) bits to a covert receiver (Bob) without being detected by an adversary (Warden Willie) in n channel uses. This p...

متن کامل

jamming reduction in gps receivers by subspace projection technique

different methods exists for jamming mitigation and we should choose a method based an the jammer type and other parameters. one of the jammers is narrow band fm jammer and we use subspace projection techniques for the suppression of this type of jammer. in subspace projection technique, we estimate the if of signals and construct the subspace vector that is orthogonal to jammer vector by incre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Wireless Communications

سال: 2021

ISSN: ['1536-1276', '1558-2248']

DOI: https://doi.org/10.1109/twc.2021.3059306