Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

Zhijun Han , Yiqing Zhou , Yu Zhang , Tong-Xing Zheng , Ling Liu , Jinglin Shi

›› 2025, Vol. 11 ›› Issue (4) : 1114 -1124.

PDF
›› 2025, Vol. 11 ›› Issue (4) :1114 -1124. DOI: 10.1016/j.dcan.2024.10.019
Research article
research-article

Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

Author information +
History +
PDF

Abstract

In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to achieve in practice. To be more practical, it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI, which makes it difficult for legitimate transceivers to estimate the detection probability of the warden. First, the uncertainty caused by the unknown warden location must be removed, and the Optimal Detection Position (OPTDP) of the warden is derived which can provide the best detection performance (i.e., the worst case for a covert communication). Then, to further avoid the impractical assumption of perfect CSI, the covert throughput is maximized using only the channel distribution information. Given this OPTDP based worst case for covert communications, the jammer selection, the jamming power, the transmission power, and the transmission rate are jointly optimized to maximize the covert throughput (OPTDP-JP). To solve this coupling problem, a Heuristic algorithm based on Maximum Distance Ratio (H-MAXDR) is proposed to provide a sub-optimal solution. First, according to the analysis of the covert throughput, the node with the maximum distance ratio (i.e., the ratio of the distances from the jammer to the receiver and that to the warden) is selected as the friendly jammer (MAXDR). Then, the optimal transmission and jamming power can be derived, followed by the optimal transmission rate obtained via the bisection method. In numerical and simulation results, it is shown that although the location of the warden is unknown, by assuming the OPTDP of the warden, the proposed OPTDP-JP can always satisfy the covertness constraint. In addition, with an uncertain warden and imperfect CSI, the covert throughput provided by OPTDP-JP is 80% higher than the existing schemes when the covertness constraint is 0.9, showing the effectiveness of OPTDP-JP.

Keywords

Covert communications / Uncertain warden / Jammer selection / Power optimization / Throughput maximization

Cite this article

Download citation ▾
Zhijun Han, Yiqing Zhou, Yu Zhang, Tong-Xing Zheng, Ling Liu, Jinglin Shi. Joint jammer selection and power optimization in covert communications against a warden with uncertain locations. , 2025, 11(4): 1114-1124 DOI:10.1016/j.dcan.2024.10.019

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

C.-X. Wang, X. You, X. Gao, X. Zhu, Z. Li, C. Zhang, H. Wang, Y. Huang, Y. Chen, H. Haas, J.S. Thompson, E.G. Larsson, M.D. Renzo, W. Tong, P. Zhu, X. Shen, H.V. Poor, L. Hanzo, On the road to 6g: visions, requirements, key technologies, and testbeds, IEEE Commun. Surv. Tutor. 25 (2) (2023) 905-974.

[2]

M. Wang, B. Xia, Y. Yao, Z. Chen, J. Wang, Fundamental limit among covertness, re-liability, latency and throughput for irs-enabled short-packet communications, IEEE Trans. Wirel.commun. 23 (4) (2024) 3886-3900.

[3]

X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F.R. Yu, A. Nallanathan, Covert com-munications: a comprehensive survey, IEEE Commun. Surv. Tutor. 25 (2) (2023) 1173-1198.

[4]

Y. Jiang, L. Wang, H.-H. Chen, X. Shen, Physical layer covert communication in b5g wireless networks—its research, applications, and challenges, Proc. IEEE 112 (1)(2024) 47-82.

[5]

Z. Li, M. Xia, M. Wen, Y.-C. Wu, Massive access in secure noma under imperfect csi: security guaranteed sum-rate maximization with first-order algorithm, IEEE J. Sel. Areas Commun. 39 (4) (2021) 998-1014.

[6]

A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook Applied Cryptography, 1st ed., CRC Press, Boca Raton, USA, 1996.

[7]

Z. Li, S. Wang, M. Wen, Y.-C. Wu, Secure multicast energy-efficiency maximization with massive riss and uncertain csi: first-order algorithms and convergence analysis, IEEE Trans. Wirel.commun. 21 (9) (2022) 6818-6833.

[8]

Z. Li, Q. Lin, Y.-C. Wu, D.W.K. Ng, A. Nallanathan, Enhancing physical layer se-curity with ris under multi-antenna eavesdroppers and spatially correlated channel uncertainties, IEEE Trans. Commun. 72 (3) (2024) 1532-1547.

[9]

S. Yan, X. Zhou, J. Hu, S.V. Hanly, Low probability of detection communication: opportunities and challenges, IEEE Wirel. Commun. 26 (5) (2019) 19-25.

[10]

M. Wang, Z. Xu, B. Xia, Y. Guo, Z. Chen, DF relay assisted covert communications: analysis and optimization, IEEE Trans. Veh. Technol. 72 (3) (2023) 4073-4078.

[11]

A. Mukherjee, Physical-layer security in the internet of things: sensing and com-munication confidentiality under resource constraints, Proc. IEEE 103 (10) (2015) 1747-1761.

[12]

B.A. Bash, D. Goeckel, D. Towsley, Limits of reliable communication with low prob-ability of detection on awgn channels, IEEE J. Sel. Areas Commun. 31 (9) (2013) 1921-1930.

[13]

S. Lee, R.J. Baxley, M.A. Weitnauer, B. Walkenhorst, Achieving undetectable com-munication, IEEE J. Sel. Top. Signal Process. 9(7) (2015) 1195-1205.

[14]

B. He, S. Yan, X. Zhou, V.K.N. Lau, On covert communication with noise uncertainty, IEEE Commun. Lett. 21 (4) (2017) 941-944.

[15]

K. Shahzad, X. Zhou, Covert wireless communications under quasi-static fading with channel uncertainty, IEEE Trans. Inf. Forensics Secur. 16 (2021) 1104-1116.

[16]

J. Wang, W. Tang, Q. Zhu, X. Li, H. Rao, S. Li, Covert communication with the help of relay and channel uncertainty, IEEE Wirel. Commun. Lett. 8(1) (2019) 317-320.

[17]

M. Wang, Y. Yao, B. Xia, Z. Chen, J. Wang, Covert and reliable short-packet commu-nications over fading channels against a proactive warder: analysis and optimization, IEEE Trans. Wirel.commun. 23 (5) (2024) 3932-3945.

[18]

B. He, S. Yan, X. Zhou, H. Jafarkhani, Covert wireless communication with a Poisson field of interferers, IEEE Trans. Wirel.commun. 17 (9) (2018) 6005-6017.

[19]

J. Zhao, G. Li, G. Chen, Q. Wu, X. Li, J. Zhang, Covert communication of irs-assisted wireless networks with stochastic geometry approach, IEEE Wirel. Commun. Lett. 13 (4) (2024) 974-978.

[20]

K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, J. Li, Achieving covert wireless commu-nications using a full-duplex receiver, IEEE Trans. Wirel.commun. 17 (12) (2018) 8517-8530.

[21]

F. Shu, T. Xu, J. Hu, S. Yan, Delay-constrained covert communications with a full-duplex receiver, IEEE Wirel. Commun. Lett. 8(3) (2019) 813-816.

[22]

C. Wang, Z. Li, D.W.K. Ng, Covert rate optimization of millimeter wave full-duplex communications, IEEE Trans. Wirel.commun. 21 (5) (2022) 2844-2861.

[23]

B. Yang, T. Taleb, Y. Fan, S. Shen, Mode selection and cooperative jamming for covert communication in d2d underlaid uav networks, IEEE Netw. 35 (2) (2021) 104-111.

[24]

M. Mohammadi, Z. Mobini, D. Galappaththige, C. Tellambura, A comprehensive sur-vey on full-duplex communication: current solutions, future trends, and open issues, IEEE Commun. Surv. Tutor. 25 (4) (2023) 2190-2244.

[25]

T.V. Sobers, B.A. Bash, S. Guha, D. Towsley, D. Goeckel, Covert communication in the presence of an uninformed jammer, IEEE Trans. Wirel.commun. 16 (9) (2017) 6193-6206.

[26]

W. Xiong, Y. Yao, X. Fu, S. Li, Covert communication with cognitive jammer, IEEE Wirel. Commun. Lett. 9 (10) (2020) 1753-1757.

[27]

K. Li, T.V. Sobers, D. Towsley, D. Goeckel, Covert communication in continuous-time systems in the presence of a jammer, IEEE Trans. Wirel.commun. 21 (7) (2022) 4883-4897.

[28]

X. Kang, H. Lei, L. Yang, G. Pan, T.A. Tsiftsis, H. Liu, Active-ris-aided covert com-munications in noma systems with cooperative jamming, IEEE Trans. Veh. Technol. 73 (5) (2024) 7436-7440.

[29]

H. Du, D. Niyato, Y.-A. Xie, Y. Cheng, J. Kang, D.I. Kim, Performance analysis and optimization for jammer-aided multiantenna uav covert communication, IEEE J. Sel. Areas Commun. 40 (10) (2022) 2962-2979.

[30]

K. Shahzad, Relaying via cooperative jamming in covert wireless communications, in: IEEE 12th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia, 2018, pp. 1-6.

[31]

L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, J. Chen, Covert communication in intel-ligent reflecting surface-assisted noma systems: design, analysis, and optimization, IEEE Trans. Wirel.commun. 21 (3) (2022) 1735-1750.

[32]

R. Chen, Z. Li, J. Shi, L. Yang, J. Hu, Achieving covert communication in overlay cognitive radio networks, IEEE Trans. Veh. Technol. 69 (12) (2020) 15113-15126.

[33]

R. Soltani, D. Goeckel, D. Towsley, B.A. Bash, S. Guha, Covert wireless communi-cation with artificial noise generation, IEEE Trans. Wirel.commun. 17 (11) (2018) 7252-7267.

[34]

T.-X. Zheng, Z. Yang, C. Wang, Z. Li, J. Yuan, X. Guan, Wireless covert communi-cations aided by distributed cooperative jamming over slow fading channels, IEEE Trans. Wirel.commun. 20 (11) (2021) 7026-7039.

[35]

R. He, J. Chen, G. Li, H. Wang, Y. Xu, W. Yang, Y. Jiao, W. He, Channel-aware jammer selection and power control in covert communication, IEEE Trans. Veh. Technol. 73 (2) (2024) 2266-2279.

[36]

M. Forouzesh, P. Azmi, N. Mokari, D. Goeckel, Covert communication using null space and 3d beamforming: uncertainty of willie’s location information, IEEE Trans. Veh. Technol. 69 (8) (2020) 8568-8576.

[37]

Z. Li, X. Liao, J. Shi, L. Li, P. Xiao, Md-gan-based uav trajectory and power opti-mization for cognitive covert communications, IEEE Int. Things J. 9 (12) (2022) 10187-10199.

[38]

M. Forouzesh, F. Samsami Khodadad, P. Azmi, A. Kuhestani, H. Ahmadi, Simultane-ous secure and covert transmissions against two attacks under practical assumptions, IEEE Int. Things J. 10 (12) (2023) 10160-10171.

[39]

X. Chen, W. Sun, C. Xing, N. Zhao, Y. Chen, F.R. Yu, A. Nallanathan, Multi-antenna covert communication via full-duplex jamming against a warden with uncertain lo-cations, IEEE Trans. Wirel.commun. 20 (8) (2021) 5467-5480.

[40]

T.-X. Zheng, H.-M. Wang, D.W.K. Ng, J. Yuan, Multi-antenna covert communications in random wireless networks, IEEE Trans. Wirel.commun. 18 (3) (2019) 1974-1987.

[41]

R. He, G. Li, H. Wang, Y. Jiao, J. Cai, Adaptive power control for cooperative covert communication with partial channel state information, IEEE Wirel. Commun. Lett. 11 (7) (2022) 1428-1432.

[42]

C. Pan, H. Ren, K. Wang, W. Xu, M. Elkashlan, A. Nallanathan, L. Hanzo, Multicell mimo communications relying on intelligent reflecting surfaces, IEEE Trans. Wirel.commun. 19 (8) (2020) 5218-5233.

[43]

Z. Wang, Y. Wu, Q. Niu, Multi-sensor fusion in automated driving: a survey, IEEE Access 8 (2020) 2847-2868.

[44]

X. Wang, F.-C. Zheng, P. Zhu, X. You, Energy-efficient resource allocation in coor-dinated downlink multicell ofdma systems, IEEE Trans. Veh. Technol. 65 (3) (2016) 1395-1408.

PDF

210

Accesses

0

Citation

Detail

Sections
Recommended

/