Abstract
Uninformed jammers are used to facilitate covert communications between a transmitter and an intended receiver under the surveillance of a warden. In reality, the signals the uniformed jammer emits to make the warden’s decision uncertain have inadvertently interfered with the detection of the intended receiver. In this paper, we apply truncated channel inversion power control (TCIPC) to both the transmitter and the uninformed jammer. The TCIPC scheme used on the uninformed jammer may help the intended receiver remove jamming signals using the successive interference cancellation (SIC) technique. Under the assumption that the warden knows the channel coefficient between two intended transceivers and achieves the optimal detection power threshold, we form the optimization problem to maximize the effective transmission rate (ETR) under covertness and decoding constraints. With the aim of enhancing covertness-related performance, we achieve the optimal power control parameters and determine system parameter-related constraints required for the existence of these solutions. According to the simulations, the use of the TCIPC scheme on the uninformed jammer significantly improves covertness-related performance in comparison to that of random power control (RPC) and constant power control (CPC) schemes. In addition, simulation results show that, for the TCIPC scheme: 1) the maximum ETR tends to converge as the transmitter’s or the uninformed jammer’s maximum transmit power increases, and 2) there exists an optimal value of the transmitter’s predetermined transmission rate to achieve the optimal performance.
Publisher
National Institute of Telecommunications
Subject
Electrical and Electronic Engineering,Computer Networks and Communications
Reference27 articles.
1. S. Rich and B. Gellman, "NSA seeks to build quantum computer that could crack most types of encryption", The Washington Post, no. 2, 2014 [Online]. Available: http://wapo.st/19DycJT
2. S. Yan, X. Zhou, J. Hu, and S.V. Hanly, "Low probability of detection communication: Opportunities and challenges", IEEE Wireless Communications, vol. 26, no. 5, pp. 19–25, 2019 https://doi.org/10.1109/MWC.001.1900057
3. B.A. Bash, D. Goeckel, and D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels", IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1921–1930, 2013 https://doi.org/10.1109/JSAC.2013.130923
4. P.H. Che, M. Bakshi, and S. Jaggi, "Reliable deniable communication: Hiding messages in noise", in 2013 IEEE International Symposium on Information Theory, 2013, pp. 2945–2949 https://doi.org/10.1109/ISIT.2013.6620765
5. M.R. Bloch, "Covert communication over noisy channels: A resolvability perspective", IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334–2354, 2016 https://doi.org/10.1109/TIT. 2016.2530089
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献