You are on page 1of 5

12432 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 68, NO.

12, DECEMBER 2019

Covert Wireless Communication in Presence of a artificial noise [7], [8] and under relay networks [9]. Optimality of
Multi-Antenna Adversary and Delay Constraints Gaussian signalling in covert communication has been analyzed in [10],
while [11] offers a first study in considering a UAV as the transmitter in
Khurram Shahzad , Student Member, IEEE, the context of covert communications. Multi-antenna covert commu-
Xiangyun Zhou , Senior Member, IEEE, nications under AWGN channels has been considered in [12], while a
and Shihao Yan , Member, IEEE recent work in [13] has considered their performance in random wireless
networks considering both centralized and distributed antenna systems
at the transmitter.
Abstract—Covert communication hides the transmission of a message
from a watchful adversary, while ensuring reliable information decoding
The aforementioned works consider covert communication under
at the receiver, providing enhanced security in wireless communications. the assumption of an infinite number of channel uses. However, lim-
In this work, covert communication in the presence of a multi-antenna ited storage resources and requirements of quick updates in modern
adversary and under delay constraints is considered. Under the assumption communication systems require a finite, sometimes small, number of
of quasi-static wireless fading channels, we analyze the effect of increasing channel uses, and hence the results in the infinite blocklength regime
the number of antennas employed at the adversary on the achievable
throughput of covert communication. It is shown that in contrast to a do not hold anymore. Under finite blocklength, covert communication
single-antenna adversary, a slight increase in the number of adversary’s has been considered in the literature under AWGN and fading chan-
antennas drastically reduces the covert throughput, even for relaxed covert- nels [14]–[16], where a single-antenna adversary was considered.
ness requirements. In this work, we consider covert communication under fading chan-
Index Terms—Physical layer security, covert communication, multiple nels with a finite blocklength, in presence of a multi-antenna adversary.
antennas. Equipping the adversary with multiple antennas makes him a stronger
adversary in fading conditions, yielding the task of communicating
covertly even harder. Although [13] has considered achieving covert-
I. INTRODUCTION ness for a multi-antenna transmitter in the presence of multiple ad-
The broadcast nature of wireless transmission makes it prone to versaries, the adversaries are non-colluding, whereas we consider an
unauthorized access, raising serious concerns about its security and adversary utilizing a centralized detection approach. Furthermore, the
privacy. With an ever-increasing dependence on wireless devices not analysis in [13] is presented under the assumption of an infinite block-
only for communication but also activities related to health, finance length as compared to our finite blocklength assumption. We analyze
and sharing private information, there is a renewed interest in the the achievable throughput under strict delay constraints and study the
security and privacy of wireless transmissions. Circumstances exist impact of adversary’s multiple antennas on covertness, when the covert
where instead of protecting the information content of the transmission, communication pair is equipped with single antennas. In particular, we
it is imperative to hide the transmission itself. In such situations, tra- show that in contrast to a single antenna case, the covert throughput
ditional security schemes employing cryptography and physical layer quickly reduces to zero with a slight increase in number of antennas at
security [1] are deemed insufficient, as such schemes cause suspicion, the adversary, even for highly relaxed covertness requirements.
drawing further probing from an adversary. Hiding communications
in sensitive or hostile environments is of paramount importance to II. SYSTEM MODEL
military and law enforcement agencies. On the other hand, detecting We consider a scenario where the adversary, Willie, uses M ≥ 1
any malicious covert communications is also highly desired by law antennas for detection, whereas each of Alice and Bob is equipped
enforcement and cyber task forces since even the presence of such ac- with a single antenna. A communication slot is a block of time in
tivities offers sufficient incentive for them to take action [2]. In all such which transmission of a message from Alice to Bob is complete. If
scenarios, covert communication approaches [3] offer a highly viable Alice transmits in a slot, she sends a finite number, LM , of symbols to
solution, with applications not only of interest to military organizations Bob, with a symbol index of l, while Willie observes silently, looking
but general public as well. to decide whether Alice has transmitted or not. The maximum number
Recent research efforts have explored this nascent approach to of symbols in a slot is denoted by Lmax , and hence, LM ≤ Lmax . We
security under different communication scenarios establishing the fun- assume that Alice’s transmitted signal samples are independent, with
damental limits in additive white Gaussian noise (AWGN) channels [4], a distribution given by CN (0, Pa ) while the distribution of AWGN at
under channel and noise uncertainty [5], [6], use of jamming and Bob’s receiver is given by CN (0, 1). The additive noise samples at
the different antennas at Willie are also considered to be independent,
Manuscript received June 2, 2019; revised August 6, 2019 and October 14, with a distribution of CN (0, 1). Furthermore, it is assumed that Willie’s
2019; accepted October 15, 2019. Date of publication October 21, 2019; date of received signals and his noise are independent.
current version December 17, 2019. The work of X. Zhou was supported by the The wireless links from Alice to Bob and Alice to Willie are subject
Australian Research Council’s Discovery Projects under Grant DP180104062.
to quasi-static Rayleigh fading channels, which constitute a suitable
The review of this article was coordinated by Dr. R. D. Souza. (Corresponding
author: Shihao Yan.) model for covert communications scenario under NLOS communica-
K. Shahzad and X. Zhou are with the Research School of Electri- tions, and is commonly adopted in the literature [7], [16]. Resultantly,
cal, Energy and Materials Engineering, The Australian National Univer- corresponding to a large coherence time, the channel coefficients remain
sity, Canberra, ACT 2601, Australia (e-mail: khurram.shahzad@anu.edu.au; constant in a slot and change independently from one slot to the next.
xiangyun.zhou@anu.edu.au).
S. Yan is with the School of Engineering, Macquarie University, Sydney, The vector of channel coefficients from Alice to Willie’s M antennas is
NSW 2109, Australia (e-mail: shihao.yan@mq.edu.au). denoted by haw ∈ C M ×1 , and for each entry haw of haw , the mean of
Digital Object Identifier 10.1109/TVT.2019.2948608 |haw |2 is denoted by 1/λ. We follow the common assumption that

0018-9545 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:55:32 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 68, NO. 12, DECEMBER 2019 12433

a secret of sufficient length is shared between Alice and Bob [4], Lemma 1: The optimal detector at Willie has the decision rule given
which is unknown to Willie. Employing random coding arguments, as
H1
Alice generates codewords by independently drawing symbols from a hH ∗
aw Y ≷ θ ,
2
(3)
zero-mean complex Gaussian distribution with a variance of Pa . Here, H0
each codebook is known to Alice and Bob and is used only once. When where  
Alice transmits in a slot, she selects the codeword corresponding to her LM 1  
message and transmits the resulting sequence. θ∗ = + haw 2 ln Pa haw 2 + 1 (4)
2 Pa
Let Y = [y1 , y2 , . . . , yLM ] ∈ C M ×LM be the matrix containing
is the optimal decision threshold.
Willie’s observed signals at M antennas. Willie faces a binary hypoth-
Proof: Since Willie has complete statistical knowledge of his ob-
esis test regarding Alice’s actions and we denote Willie’s hypotheses of
servations, hence resorting to the Neyman Pearson criterion [19], the
Alice transmitting or not by H1 and H0 , respectively. The observation
optimal test for Willie to minimize his detection error probability is
model at Willie regarding Alice’s transmission state can be expressed
the likelihood ratio test. Under H0 , the pdf of the observation matrix at
as
 Willie, Y, is given by
H0 : yl ∼ CN (0, IM ),
(1) 
L
H1 : yl ∼ CN (0, Pa haw hH aw + IM ), 1

f (Y|H0 ) = exp −ylH K0−1 yl , (5)
l=1
πM |K0 |
where IM is an M × M identity matrix. We assume that in a given
slot, Pa is fixed and known to Willie. Under the assumption of an
where K0  IM is the covariance matrix of Willie’s observations under
equal probability of Alice transmitting or not in a slot, achieving
H0 . We have
covertness requires PF A + PM D ≥ 1 −  for some arbitrarily small
 [4], [14]. Here, PF A and PM D denote the Probability of False Alarm L
1
1

and Probability of Missed Detection, respectively. f (Y|H0 ) = M
exp −ylH yl = M L exp −tr(YY H ) ,
As per [17], the decoding error probability at Bob is not negligible l=1
π π
for finite blocklengths. For a given decoding error probability, δ, the (6)
channel coding rate (in bits per channel use) for a given channel where tr(·) denotes the trace of a matrix. By taking the logarithm of the
realization and for duration of LM symbols is given as [18] pdf under H0 , we have

  L0 (Y) = −M L ln(π) − tr(YY H ). (7)


R ≈ log2 1 + Pa |hab |2
   −1 Similarly, the pdf of Y under H1 is written as
1 1 Q (δ)
− 1− , (2)
LM (1 + Pa |hab |2 )2 ln 2 
L
1

f (Y|H1 , h, Pa ) = exp −ylH K1−1 yl
l=1
πM |K1 |
where hab is the fading channel coefficient from Alice to Bob and
1
 
Q−1 (·) is the inverse Gaussian Q-function. Since the transmission rate = exp −tr K1−1 YY H (8)
achieved here for a finite blocklength is less than the Shannon capacity, πM L |K1 |L
the decoding error probability, δ, is considered to be less than 0.5. We
consider the amount of information (in bits), given by LM R(1 − δ), as where K1  Pa haw hH aw + IM is the covariance matrix of Willie’s
our performance metric while PF A + PM D ≥ 1 −  is the covertness observations under H1 . Here, we have
constraint. Alice being part of a wider network, periodically broadcasts
pilot signals enabling other users to estimate their channels. Though this |K1 | = Pa haw 2 + 1, (9)
enables Bob to know his instantaneous channel from Alice, facilitating
and
his message decoding, it also gives Willie the channel information from haw hH
aw
Alice. For ease of exposition, we assume that Alice is also aware of her K1−1 = IM − , (10)
1
Pa
+ haw 2
channel to Bob. In comparison to [13], we note that in case of multiple
transmit antennas at Alice, the assumption of CSI availability at all the where K1−1 is obtained using Woodbury Matrix Identity for matrix
antennas is even harder to justify since training by covert receivers may inversion [20].
expose their existence and violate covertness requirements. We also Putting in the expressions of |K1 | and K1−1 in (8) and taking the
note that while under infinite blocklength, having perfect channel state logarithm of the pdf under H1 ,
information (CSI) at the transmitter and receiver results in no decoding
errors at the receiver, this is not the case under finite blocklength L  
L1 (Y) = − M L ln(π) − ln Pa haw 2 + 1
scenario, where decoding errors still occur even in the presence of 2
perfect CSI at both the transmitter and the receiver.   hH
aw Y
2
− tr YY H + . (11)
1
Pa
+ haw 2
III. DETECTION AT WILLIE
The log likelihood ratio (LLR) can be thus written as
Since Willie is aware of his channels from Alice, her transmit
power and his own receiver’s noise variance, he is able to design
LLR = L1 (Y) − L0 (Y)
an optimal detector, which represents the worst case scenario from
the covert communication design perspective. In the following, we hH
aw Y
2
L  
present Willie’s optimal detector and the corresponding detection error = − ln Pa haw 2 + 1 . (12)
1
+ haw 2 2
probabilities. Pa

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:55:32 UTC from IEEE Xplore. Restrictions apply.
12434 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 68, NO. 12, DECEMBER 2019

Comparing the LLR to a threshold results in the following optimal where P0LM and P1LM denote the probability density functions (pdfs)
decision rule of Willie’s observation vectors under hypothesis H0 and H1 for LM
hH L   H1 independent channel uses, respectively, and D(P0LM ||P1LM ) is the
aw Y
2
− ln Pa haw 2 + 1 ≷ ϕ, (13) Kullback-Leibler (KL) Divergence from P0LM to P1LM . As per [14],
1
+ haw 2 2 H0
Pa D(P0LM ||P1LM ) ≤ 22 must be ensured to guarantee PF A + PM D ≥
where ϕ = 0 for the LLR under the assumption of equal probability of 1 − . Since Alice is unaware of her channels to Willie, she looks
to minimize the expected value of D(P0LM ||P1LM ) over all possible
whether Alice transmits or not. The optimal decision rule can then be
obtained by a rearrangement.  realizations of her channels to Willie. The optimization problem at
We note from (3) that the optimal detector at Willie is a maximum Alice is thus stated as:
ratio combiner [21], which assigns weightage to the observations at P1 maximize LM R(1 − δ)
LM ,Pa
different antennas as per the corresponding channel gains. Thus the
 
antennas with better channel gain from Alice have higher contribution
subject to Ehaw 2 D P0LM ||P1LM ≤ 22 ,
in the decision statistic in (3). We next present the detection error
probabilities at Willie under the optimal detector. LM ≤ Lmax . (21)
Lemma 2: The detection error probabilities at Willie, i.e., PF A and
PM D are given as where E[·] denotes the statistical expectation, and is taken over all the
channels from Alice to the multiple antennas at Willie. The expression
θ∗
γ LM , haw 2
for the KL-divergence for M ≥ 1 is given as
PF A = 1 − , (14)
Γ (LM ) D P0LM ||P1LM = LM D (P0 ||P1 )
and  
θ∗   haw 2 Pa
γ LM , haw 2 (haw 2 Pa +1) = LM ln haw 2 Pa + 1 − , (22)
PM D = , (15) haw 2 Pa + 1
Γ (LM )
respectively, where γ(a, b) is the lower incomplete Gamma function, where, haw 2 is the sum of M independent exponential RVs, and for
Γ(x) is the complete Gamma function, and θ∗ is the optimal threshold M > 1, constitutes an Erlang RV, with pdf given by
of Willie’s detector given in (4). fhaw 2 (h; M, λ) = EM (h, λ)
Proof: Under hypothesis H0 , yl has a distribution given by
CN (0, IM ). Conditioned on the known channel coefficients from λM hM −1 e−λh
= ; h, λ ≥ 0. (23)
Alice, the vector hH aw Y has a complex Gaussian distribution given (M − 1)!
by CN (0, haw 2 ILM ). Thus, In the following, we present the optimal choice of Pa and LM for
hH
aw Y
2
∼ haw  2
χ22LM , (16) Alice to achieve a desired level of covertness.
Proposition 1: The optimal number of Alice’s channel uses, L∗M ,
where χ22LMdenotes a chi-squared random variable (RV) with 2LM in terms of Alice’s transmit power, maximizing the throughput to Bob
degrees of freedom. Hence, while satisfying a given covertness requirement, , is given by

 
PF A = P hH 2 ∗
aw Y > θ |H0 . (17) 22
L∗M = min Lmax , , (24)
g(Pa )
Under hypothesis H1 , yl ∼ CN (0, Pa haw hH aw + IM ), and condi-
tioned on the known channels, the distribution of hHaw Y is given by
while the optimal transmit power at Alice is the solution to
CN (0, haw 2 (haw 2 Pa + 1)ILM ). As a result, we have maximize L∗M R(1 − δ),
Pa
(25)
hH
aw Y ∼ (haw  (haw  Pa + 1))χ2LM ,
2 2 2 2
(18)
where g(Pa ) is as given in (28) shown at the bottom of the next page.
giving
Proof: The expectation in (21) for M > 1 is calculated as
PM D = P hH ∗
aw Y ≤ θ |H1 .
2
(19)  
Ehaw 2 D P0LM ||P1LM = LM g(Pa ), (26)
Calculating the probabilities in (17) and (19) gives the desired result,
hence completing the proof.  where the function g(PA ) and meijer-G(a, b, c, d, z) within g(Pa ) are
We note here that the analysis of the optimal detector at Willie under defined as in (28) and (29) shown at the bottom of the next page,
finite blocklength in fading scenarios is quite different as compared respectively [22]. Due to the covertness constraint, P1 is now restated
to the infinite blocklength case. As highlighted in [13], for infinite as
observations at the adversary, uncertainties of transmitted signals and
receiver noise vanish and the analysis is simplified, whereas this does P1.1 maximize LM R(1 − δ)
LM ,Pa
not hold under the finite blocklength scenario.  
22
subject to LM ≤ min Lmax , . (27)
IV. ALICE’S APPROACH TO ACHIEVE COVERTNESS g(Pa )
Due to the involvement of incomplete Gamma function, the detection Since R is an increasing function of Pa and LM , the covertness
performance at Willie does not lend itself well for further analysis. requirement puts an upper limit on the number of channel uses by
To proceed, we lower bound Willie’s detection performance using Alice in a block for a given Pa . The upper limit for LM is thus
Pinsker’s inequality [19], giving determined by the tighter bound between the covertness constraint
 and Lmax . Accommodating the optimal LM results in the optimization
1 LM LM problem in (25) which is of one dimension and can be solved by methods
PF A + PM D ≥ 1 − D P0 ||P1 , (20)
2 of efficient numerical search, hence concluding the proof. 

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:55:32 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 68, NO. 12, DECEMBER 2019 12435

We note from (24) that the optimal choice of blocklength, L∗M , is a


decreasing function of the transmit power used by Alice and is upper-
bounded by the delay constraint determined by Lmax . This fact will be
more evident and explained in the numerical results section.
Corollary 1: The optimal number of Alice’s channel uses, for
M = 1, in terms of Alice’s transmit power, maximizing the throughput
to Bob while satisfying a given covertness requirement, is given by
 
22
L∗1 = min Lmax , , (30)
f (Pa )
while the optimal transmit power at Alice can be found similarly as in
Proposition 1. Here, f (Pa ) is given as
    
λ λ λ
f (Pa ) = − 1 + 1 + e Pa Ei − , (31)
Pa Pa
and Ei(·) is the Exponential Integral function.
Proof: The proof follows by simply putting M = 1 in the results Fig. 1. Number of Alice’s optimal transmit symbols, L∗M , versus the transmit
given in Proposition 1.  power, Pa .

V. RESULTS AND DISCUSSIONS


In this section, we present numerical results examining the effect of
reliability and covertness on the optimal parameters for Alice and the
achievable covert throughput. Unless otherwise stated, the parameters
are set as follows: δ = 0.1, λ = 1, and |hab |2 = 1. It should be noted
here that due to the assumption of Bob and Willie’s receiver noise
being CN (0, 1), the transmit power at Alice has units relative to the
considered additive noise.
Fig. 1 shows the optimal number of Alice’s transmit symbols against
a range of her transmit power, Pa , for different values of Lmax and
. First, the effect of limiting Alice’s maximum transmit symbols is
evident for lower values of Pa , as decreasing Pa allows for Alice to use
a higher blocklength under a certain covertness constraint. Furthermore,
for a given value of , an increase in Pa requires using lower number
of transmit symbols for a given covertness requirement which is in
agreement with the intuition that if Alice chooses to transmit at a higher Fig. 2. Achievable covert throughput from Alice to Bob, LM R(1 − δ), versus
the number of antennas at Willie, M , for varying covertness requirements.
power, the transmission time should be reduced. This also represents a
trade-off between achieving covertness and maximizing the throughput
since the covert throughput is an increasing function of both Pa and
LM , while achieving covertness requires a decrease in both. As we can see, the difference between utilizing the optimal and
In Fig. 2, we show the achievable throughput against a multi-antenna fixed value of LM is evident in terms of the difference in throughput
Willie for varying covertness requirements under the optimal choice from Alice to Bob. Furthermore, as the number of antennas at Willie
of LM and Pa . We also show the achievable throughput for the case grows beyond a single antenna, there is a very sharp decrease in
where LM is fixed while the transmit power is optimized to satisfy a the achievable covert throughput in both cases and depending on the
required covert criteria. It should be noted here that in calculating these covertness requirement, it reaches zero very quickly. This shows the
throughput results, we consider a lower bound on LM , which is due to effectiveness of Willie in detecting any covert transmissions using more
the use of approximated expression of R as given in (2), and this bound than one antenna. As we see, even for  = 0.3, the throughput decreases
ensures that the calculated rate is always non-negative. We note that fairly quickly to zero and hence covertness can not be achieved beyond
 = 0.3 represents a relatively relaxed covertness requirement. M = 16.

   
λM 1 λ λ λ
g(Pa ) = 2
(Pa ) meijer-G 0, 1, [0, 0, M ], [], − Pa(2−M ) Γ(M + 1)e Pa γ(−M, ) (28)
(M − 1)! λM Pa Pa

meijer-G(a, b, c, d, z) = meijer-G([a1 , . . . , an ], [an+1 , . . . , ap ], [b1 , . . . , bm ], [bm+1 , . . . , bq ], z)


= Gm,n
p,q (a1 , . . . , ap , b1 , . . . , bq |z)
 
 m n
1 j=1 Γ(bj − s) j=1 Γ(1 − aj + s)
=   z s ds (29)
2πi q p
j=m+1 Γ(1 − bj + s) j=n+1 Γ(aj − s)

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:55:32 UTC from IEEE Xplore. Restrictions apply.
12436 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 68, NO. 12, DECEMBER 2019

VI. CONCLUSION [8] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li, “Achieving
covert wireless communications using a full-duplex receiver,” IEEE Trans.
In this work, we have considered the performance of covert com- Wireless Commun., vol. 17, no. 12, pp. 8517–8530, Dec. 2018.
munication in the presence of a multi-antenna adversary while under [9] J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication
strict delay constraints. We have analyzed the effect of covertness achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless
Commun., vol. 17, no. 7, pp. 4766–4779, Jul. 2018.
requirement and the number of antennas at Willie on Alice’s achievable
[10] S. Yan, Y. Cong, S. V. Hanly, and X. Zhou, “Gaussian signalling for
covert throughput. It has been shown that the improved detection covert communications,” IEEE Trans. Wireless Commun., vol. 18, no. 7,
capability of Willie drastically reduces the covert throughput. This pp. 3542–3553, Jul. 2019.
letter presented an initial work on covert communication under delay [11] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint optimization of a
constraints and in the presence of a multi-antenna adversary. Future UAV’s trajectory and transmit power for covert communications,” IEEE
Trans. Signal Process., vol. 67, no. 16, pp. 4276–4290, Aug. 2019.
work will focus on devising improved covertness schemes for achieving [12] A. Abdelaziz and C. E. Koksal, “Fundamental limits of covert communi-
non-zero throughput despite the higher number of antennas at Willie, cation over MIMO AWGN channel,” in Proc. IEEE Conf. Commun. Netw.
and under more complex fading models encompassing both LOS and Secur., Oct. 2017, pp. 1–9.
NLOS scenarios. [13] T. X. Zheng, H. M. Wang, D. W. K. Ng, and J. Yuan, “Multi-antenna covert
communications in random wireless networks,” IEEE Trans. Wireless
Commun., vol. 18, no. 3, pp. 1974–1987, Mar. 2019.
REFERENCES [14] S. Yan, B. He, X. Zhou, Y. Cong, and A. L. Swindlehurst, “Delay-intolerant
covert communications with either fixed or random transmit power,” IEEE
[1] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Trans. Inf. Forensics Secur., vol. 14, no. 1, pp. 129–140, Jan. 2019.
Communications. Boca Raton, FL, USA: CRC Press, 2013. [15] F. Shu, T. Xu, J. Hu, and S. Yan, “Delay-constrained covert communica-
[2] S. Yan, X. Zhou, J. Hu, and S. Hanly, “Low probability of detection tions with a full-duplex receiver,” IEEE Wireless Commun. Lett., vol. 8,
communication: Opportunities and challenges,” IEEE Wireless Commun., no. 3, pp. 813–816, Jan. 2019.
vol. 26, no. 5, pp. 19–25, Oct. 2019. [16] H. Tang, J. Wang, and Y. R. Zheng, “Covert communications with ex-
[3] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information tremely low power under finite block length over slow fading,” in Proc.
in noise: Fundamental limits of covert wireless communication,” IEEE IEEE InfoCom Workshops, Apr. 2018, pp. 657–661.
Commun. Mag., vol. 53, no. 12, pp. 26–31, Dec. 2015. [17] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite
[4] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communica- blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–
tion with low probability of detection on AWGN channels,” IEEE J. Sel. 2359, May 2010.
Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013. [18] G. Ozcan and M. C. Gursoy, “Throughput of cognitive radio systems with
[5] K. Shahzad, X. Zhou, and S. Yan, “Covert communication in fading finite blocklength codes,” IEEE J. Sel. Areas Commun., vol. 31, no. 11,
channels under channel uncertainty,” in Proc. IEEE Veh. Technol. Conf., pp. 2541–2554, Nov. 2013.
Jun. 2017, pp. 1–5. [19] E. L. Lehmann and J. P. Romano, Testing Statistical Hypotheses. Berlin,
[6] B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication Germany: Springer, 2006.
with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–944, [20] G. Strang, Introduction to Linear Algebra. Wellesley, MA, USA: Cam-
Apr. 2017. bridge Press, 1993.
[7] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert [21] A. Goldsmith, Wireless Communications. Cambridge, U.K.: Cambridge
communication in the presence of an uninformed jammer,” IEEE Trans. Univ. Press, 2005.
Wireless Commun., vol. 16, no. 9, pp. 6193–6206, Sep. 2017. [22] MATLAB R2018a, The MathWorks, Inc., Natick, MA, USA, 2018.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:55:32 UTC from IEEE Xplore. Restrictions apply.

You might also like