You are on page 1of 8

This article has been accepted for inclusion in a future issue of this magazine.

Content is final as presented, with the exception of pagination.


ACCEPTED FROM OPEN CALL

Intelligent Reflecting Surface (IRS)-Enabled Covert Communications in Wireless


Networks
Xiao Lu, Ekram Hossain, Taniya Shafique, Shaohan Feng, Hai Jiang, and Dusit Niyato

Abstract • The standardized protocols adopted for pub-


lic networks make a large number of entities
With growing security threats to the evolving confront the same threat.
wireless systems, protecting user privacy becomes • The security level of encryption protocols
progressively challenging. Even if the transmitted could be compromised if eavesdroppers
information is encrypted and the potential wiretap have powerful computational capacities as
channel is physically limited, the raw data itself, decryption involves solving mathematical
such as transmitter position and transmission pat- problems.
tern, could expose confidential information. In this • Distribution and management of cryp-
context, covert communication that intends to hide tographic keys are difficult in decentralized
the existence of transmission from an observant networks with random access and mobility.
adversary emerges as a practical solution. Howev- To cope with these difficulties of encryption,
er, existing covertness techniques ineluctably con- physical-layer security (PLS) approaches have
sume additional resources such as bandwidth and drawn significant research attention in recent years.
energy, which burdens system deployment. In view Essentially, PLS approaches safeguard information
of this concern, we propose an intelligent reflecting by only exploiting the fundamental nature of the
surface (IRS)-based approach to enhance commu- wireless medium (i.e., interference, noise, and
nication covertness. The core idea is making use of fading), which avoids extra signaling and commu-
a smartly controlled metasurface to reshape unde- nication overheads incurred by encryption in the
sirable propagation conditions which could divulge higher layer(s). There are two remarkable research
secret messages. To facilitate the understanding of tendencies on PLS, namely, information-theoretic
the proposed idea, we first provide an overview secrecy (ITS) [2] and covert communication [3].
of the state-of-the-art covert communication tech- ITS approaches aim to achieve a positive secrecy
niques. Then, we introduce the fundamentals of rate (i.e., the rate difference of a legitimate channel
IRS and elaborate on how an IRS can be integrat- and an eavesdropping channel), at which informa-
ed to benefit communication covertness. We also tion can be conveyed confidentially. Nevertheless,
demonstrate a case study of the joint configuration merely preventing transmission from being deci-
of the IRS and the legitimate transmitter, which phered is not sufficient from the perspective of pri-
is of pivotal importance in designing an IRS-en- vacy protection. There appear progressively more
hanced covert communication system. Finally, we circumstances where revealing the position, move-
shed light on some open research directions. ment, or even the existence of communication is
crippling or even fatal. For example, exposure of
Introductions business activities could bare commercial secrets.
Provisioning secured communication becomes This raises the need for covert communication, also
unprecedentedly challenging owing to the threat referred to as low probability of detection (LPD)
of technology integration. The ubiquitousness of communication or undetectable communication,
access interfaces and utilization of shared spec- the objective of which is to shelter the presence
trum in an open wireless medium make the of a legitimate transmission from a vigilant adver-
soaring volume of confidential information (e.g., sary while maintaining a certain covert rate at the
financial accounts, identity authentication, and intended user.1
business secrets) more exposed to malicious
1 In this article, covert
communication refers to attackers, the goal of which is to intercept sensi- Overview of Covert Communication
physical-layer techniques that tive and private data. Therefore, ensuring the reli- Notably, covert communication offers three major
hide wireless transmission ability and security of wireless data remains one advantages as follows. First, covertness techniques
over covert channels. This
is different from the con- of the most important tasks in developing future guarantee a stronger security level compared to
cept of covert information generation networks and has drawn increasing ITS. If a communication link is hidden from an
techniques that bury private attention from the wireless communities [1]. adversary, the information carried is immune from
information in a cover medi- The current practice of wireless security mainly interception. Second, in contrast to encryption,
um (e.g., graphic, voice, and
video message) instead of relies on application/transport-layer encryption. the performance of covert communication does
masking the transmission However, securing wireless communications with not rely on the adversary’s competence. In other
behavior. encryption faces the following challenges: words, the achievable security level will not be

Digital Object Identifier: Xiao Lu and Hai Jiang are with the University of Alberta; Ekram Hossain (corresponding author) and Taniya Shafique are with the University of Manitoba;
10.1109/MNET.011.1900579 Shaohan Feng and Dusit Niyato are with Nanyang Technological University.

1 0890-8044/20/$25.00 © 2020 IEEE IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

degraded even if the adversary has powerful infor-


mation processing capability. Third, covertness
techniques can be implemented either as alterna-
tive or complementary solutions for upper-layer
security and privacy techniques, such as steganog-
raphy and encryption. This section first introduces
the principles of covert communication and then
presents an overview of the existing techniques.

Understanding Covert Communication


Consider a general point-to-point communica-
tion scenario where a legitimate transmitter
(Alice) intends to deliver a message wirelessly to
the target receiver (Bob) while keeping the mes-
sage unobserved by an adversary (Willie). Wil-
lie monitors the wireless channel with the aim to
detect whether Alice is on transmission or not.
Hence, Willie faces a binary decision between FIGURE 1. Illustration of the impacts of system parameters on covert communications.
null hypothesis H 0 that Alice is mute and the
alternative hypothesis H 1 that Alice is transmit- ticular, a beamformer adjusts the relative phase
ting. For such a purpose, Willie can perform sta- and amplitude of the signals on each element of
tistical hypothesis testing based on the average an antenna array such that the superposed radia-

power received in a time slot denoted as P W. tion pattern is constructive in the desired direction

PW contains the received interference power IW and destructive in other directions. As a conse-
2
and noise power sW in the case of H0 and addi- quence, the transmitted signals can be concen-
tionally contains the received signal power S W trated toward the desired recipient to enhance
from Alice in the case of H 1. Let D 0 and D 1 the achievable rate and concurrently nulled at the
denote the decisions of Willie in favor of H0 and adversary for LPD. Multiple-antenna techniques
H1, respectively. The decision of Willie follows a have high deployment scalability as it is a trans-
threshold-based rule which advocates D0 and D1 mitter-side implementation. Beamforming perfor-

when PW is smaller and greater than a predefined mance is largely dependent on the availability of
threshold t, respectively. According to this rule, instantaneous channel state information (CSI).
erroneous decision occurs in two circumstances: The inaccuracy of CSI at a multi-antenna trans-
Willie sides with D1 when H0 is true, that is, false mitter due to estimation error could result in a
alarm, and Willie sides with D0 when H1 is true, high probability of signal leakage to the adversary
that is, missed detection. The total probability that and thus degrade the covertness performance.
Willie makes erroneous decisions (i.e., including However, the negative impact of imperfect CSI
false alarm and missed detection) can be inter- can be mitigated as the number of transmit anten-
preted as the covert probability for transmissions nas becomes massive, for example, more than
from Alice to Bob. It is evident that the covert one hundred [5]. The highly correlated channels
probability is influenced by the uncertainties of in a massive antenna region render minimal CSI
2
SW, IW, and sW . estimation errors and hence high beamforming
Figure 1 illustrates the impacts of different resolution. Channel hardening effect that makes
parameters. The blue and orange lines repre- effective channel gains deterministic is an addi-
sent the probability density function (PDF) of IW tional attribute of massive antennas that can be
2
+ sW with smaller variance and larger variance, exploited to provide a reliable covert rate.
respectively. For each case, the miss-detection Artificial Noise (AN) Generation: Random AN
probability and false alarm probability can be can be generated to increase interference dynam-
represented by the left and right shadow areas, ics, deliberately misleading the decisions of the
respectively. We can observe that, for a given t, adversary regarding the existence of any covert
it is possible to increase the miss-detection prob- transmission. The key to a successful AN design
ability by decreasing SW, and increase both the is to avert the negative impact of jamming signals
miss-detection probability and false alarm prob- on legitimate channels [6]. For this, multiple-an-
ability by enlarging the variance of interference tenna techniques can be exploited to produce
and noise. Thus, communication can be carried AN nulling in the directions of legitimate users. A
out more covertly with reduced signal leakage to more robust covert performance can be achieved
Willie and/or with larger interference plus noise if the position of the adversary is known so that
fluctuations. the detectivity of the adversary can be corrupted
to the largest extent through directional jamming.
Overview of Covertness Techniques An outstanding feature of the AN generation
By exploiting the properties of covert communica- approach is its flexible implementability. In prac-
tion, different approaches have been developed tice, AN can be generated by different entities.
to enhance covertness performance, which are Some common ways of realizing AN generation
reviewed below. are described as follows:
Multiple Antennas: Taking advantage of spa- • Cooperative jamming employs a third-party
tial degrees of freedom, multiple-antenna tech- device (e.g., power beacon and drone radio
niques can be utilized to improve the stealthiness transmitter) that functions as a helper to jam
of wireless channels through directional trans- an adversary’s channel. One or more friendly
mission [4]. This can be realized by means of jammers can coordinate with Alice to dis-
beamforming to produce spatial selectivity. In par- turb Willie’s channel while causing minimal

IEEE Network • Accepted for Publication 2


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

Technique Effect on adversaries Computational complexity Deployment scalability

(Massive) multiple antennas Weakening signal leakage High High

Low if using a third-party device Low if using a third-party


AN generation Increasing interference dynamics
and high otherwise device and high otherwise

Cooperative relaying Weakening signal leakage Low Low

Spread spectrum Weakening signal leakage High High

MmWave Weakening signal leakage High Low


TABLE 1. Comparison of existing techniques for covert communication.

impact on the legitimate transmission. Coop- techniques adopted for bandwidth spreading
erative jamming incurs synchronization and include direct sequence which spreads the trans-
communication overhead for transmit power mitted signal over multiple frequency channels,
control. Moreover, the use of cooperative and frequency hopping which randomly and
jammer(s) sacrifices deployment scalability speedily switches the transmission channel across
and may not work efficiently in the presence a fairly wide frequency range. Generally, direct
of mobility. sequence is more immune to malicious detec-
• Full-duplex jamming can support concur- tion as the PSD of the transmitted signal is con-
rent information reception and in-band AN tinuously kept low. Frequency hopping is more
generation with a full-duplex receiver. This exposed as it makes use of narrow-banded signals
approach surmounts the control overhead with high PSD on any frequency hop. In addition
and mobility issues of cooperative jamming to LPD, the frequency diversity empowered by
at the cost of loopback self-interference spread-spectrum signal offers robustness of covert
from transmit to receive RF chains. Thanks to communication against fading. The spread spec-
the recent advance of full-duplex techniques trum approach has high deployability as it is a
in multiple domains (e.g., antenna interface, sender-side manipulation.
analog baseband, and digital processing), Millimeter-Wave Communications: Operating
self-interference can be suppressed to a tol- at the frequency bands between 30-300 Giga-
erable extent with a viable expense. hertz (GHz), millimeter-wave (mmWave) com-
• AN injection is a sender-side technique capa- munication features steerable narrow beam, that
ble of transmitting information signals and is, precise angular resolution can be realized by
AN simultaneously. moderately small antenna dimensions. The direc-
Ideally, AN is constructed to be orthogonal tionality of the narrow beam naturally benefits
to the legitimate channel such that only Willie’s covertness as signal leakage due to imperfect
channel is affected. The crux of AN injection is beam patterns toward the off-boresight direc-
to balance the trade-off between covertness and tions can be suppressed. To intercept mmWave
information rate by optimizing the transmit pow- communication, an adversary can only detect the
ers of jamming and information signals. misaligned beam, which exhibits an on and off
In addition, hybrid approaches can be behavior where the bursty beam arrives intermit-
explored for performance enhancement. tently. This distinguishing beam pattern effectively
Cooperative Relaying: Cooperative relaying disrupts the detectability of an adversary. Further-
relies on cooperation from intermediate node(s) more, the ultra-wide bandwidth of mmWave com-
to facilitate undetectable communication. For pared to microwave allows high flexibility in the
legitimate communication, the access distance has frequency range of legitimate transmission. Scan-
a profound effect on covertness. For long-distance ning signals on a wide spectral ambit imposes a
transmission, high transmit power is required to great amount of overhead for signal detection at
attain a target rate that unavoidably compromises an adversary. The downside of short wavelength
the covertness. Cooperative relaying remedies comes to weakened scattering and diffraction abil-
this issue by multi-hop forwarding. The rationale ities which make mmWave attenuate acutely and
is to shorten the access distance of each hop so susceptible to obstacles. Moreover, the Doppler
as to keep the required transmit power low, ren- shift of mmWave is strong even at walking speed.
dering a low detection probability by Willie. As Hence, mmWave-based covert communication
cooperative relaying-based covert communication has low deployment stability as the covert rate of
involves the use of the third-party device(s) as the mmWave communication is vastly affected by the
relay(s), its deployment scalability is relatively low. availability of line-of-sight channels and mobility.
Spread Spectrum: The spread spectrum Table 1 summarizes and compares the
approach facilitates covertness by suppressing above-reviewed physical-layer techniques for
the average power spectral density (PSD) of the covert communication. Generally, the existing
transmitted signal below the noise floor level. covertness techniques can be classified into two
Specifically, the information is modulated on a categories in terms of the effects on adversaries.
sequential noise-like wave, namely pseudo-noise One is to mitigate the information signal leakage,
sequence, which considerably spreads the trans- and the other is to enlarge interference dynamics
mission bandwidth compared to the one required to cover the signal leakage. These approaches
by normal narrowband signals. As a result, it is dif- unavoidably consume additional system resourc-
ficult for an adversary to discriminate the informa- es, such as bandwidth and energy, and sacrifice
tion-bearing signals from noise, which significantly the communication performance at legitimate
lowers the signal detectability. Typical modulation users.

3 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

FIGURE 2. IRS-enhanced covert communication systems.

IRS-Enhanced Covert Communication IRS can work in conjunction with existing covert-
ness techniques without the necessity to redesign
To tackle the resource-consuming issue of exist- the corresponding protocols and hardware, as
ing covertness techniques, we introduce an intel- an IRS only serves as an auxiliary device target-
ligent reflecting surface (IRS)-based solution to ing the manipulations of environmental signals.
facilitate covert communication. The core tech- Meanwhile, an IRS can be jointly configured with
nology of IRS is to have full control of electro- an existing system for performance optimization,
magnetic behavior of the impinging waves by an example of which is to be shown in the case
leveraging programmable metamaterials. Empow- study of this article. In the following, we first
ered by the IRS, the proposed approach has the elaborate the basics of IRS, including the princi-
potential to safeguard transmission from mali- ples, features, and differences from other related
cious detection by changing the propagation concepts, and then introduce the IRS-enhanced
environment. This approach is radically different covert communication systems.
from the existing approaches since recycling the
environment resources (i.e., transmitted signals Fundamentals of IRS
that are not received by the intended receivers) An IRS, also known as digitally controllable
has not been previously considered for covert scatterers and software-defined hypersurface, is
communication. An outstanding merit of the IRS a software-controlled artificial surface that can
that motivates the use of it for covert commu- be programmed to alter its electromagnet-
nication is its compatibility with the existing sys- ic response. By principle, an IRS possesses two
tems, to be illustrated in Fig. 2. In particular, an prominent physical properties as follows:

IEEE Network • Accepted for Publication 4


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

• From the standpoint of structure, the later- Not to be confused with some related tech-
al size is orders of magnitude bigger than niques that can also be applied to facilitate covert
the thickness of an IRS. Usually, the lateral communication, we discuss their key differences
size expands to more than a few tens of and highlight the comparative advantages of IRS
the wavelength while the thickness is much as follows:
smaller than the wavelength. 2 Hence, an • A phased array utilizes an array of radiators
IRS and its structure are often referred to as with variable phase shifts to create different
two-dimensional structure and zero-thickness beam patterns. As each radiator is associated
surface, respectively. With the two-dimen- with a dedicated active RF chain, a phased
sional structure, the radio wave propagation array incurs high hardware cost and appears
or resonance effects within the substrate of with a large form factor. Moreover, the per-
the IRS can be safely neglected. formance of a phased array degrades at high
• From the standpoint of layout, the distance frequency (e.g., GHz) as a result of reduced
between adjacent IRS elements is much efficiency of the feed line. By contrast, an
shorter than the wavelength. The sub-wave- IRS features low-cost fabrications with near-
length distancing of the elements togeth- ly passive elements. Meta-materials such as
er with the fabrication of elements in the ferroelectric films and graphene maintain
sub-wavelength scale form a continuous good control of radio waves over a wide fre-
electromagnetic field across the surface quency range covering Terahertz and visible
which enables a fine-grained electromagnet- region [8]. Another desirable feature of the
ic control of the incident radio waves. IRS is that the contiguous surface enables
A typical hardware implementation of IRS is to higher spatial resolution of electromagnet-
use a tunable metasurface, which is a thin and pla- ic control than that of the spaced antenna
nar electromagnetic material consisting of discrete arrays with radiator separation.
scattering particles spread over the structure, the • Active metasurfaces [11] make use of active
electromagnetic characteristics (e.g., capacitances materials (e.g., epsilon-near-zero materials)
and resonances) of which can be digitally re-engi- to generate an electromagnetic field on the
neered without re-fabrication. This can be realized entire surface. Although active metasurface
by leveraging electronically tunable meta-atoms, provides exceptional controllability of sig-
such as liquid crystal, varactor/PIN diodes, doped nals, the operation is energy-consuming and
semiconductors, micro-electro-mechanical sys- the configuration usually incurs high com-
tems (MEMS) switches, and flexible plasmonics. putational complexity, for example, due to
Generally, there exist three approaches to change signal processing. By contrast, an IRS entails
the electromagnetic properties of meta-atoms, considerably reduced computational com-
namely, tunable resonator technique, guided-wave plexity and lower energy profile due to its
technique, and rotation technique, a detailed passive electromagnetic manipulation. An
review of which can be found in [8]. IRS virtually consumes zero power during
Configuring the constitutional meta-atoms the reflecting process and incurs power con-
enables the metasurface to synthesize a wide diver- sumption only when reconfiguring the elec-
sity of radiation patterns that are infeasible with tromagnetic properties of the IRS units.
natural materials. In other words, by adjusting the • Full-duplex relays resemble IRSs in the
on and off states as well as the bias voltage of the aspects of full-duplex transmission and mul-
meta-atoms, transformations applied to the incident tipath diversity gain. Full-duplex relays can be
radio waves can be programmed. The meta-atoms either active or passive:
can either be tuned uniformly or individually. The – An active relay forwards data with its own
former can realize simple electromagnetic manip- signals generated from its active components
ulations such as absolute absorption and passive (e.g., power amplifier). Due to full-duplex
reflection, while the latter can support more com- operation, the active relay inevitably caus-
plicated manipulations such as wave polarizing, es self-interference and this signal process-
imaging, and holograms. A distinguishing function ing latency. By contrast, an IRS is free from
of IRS enabled by the electromagnetic reconfigu- self-interference due to its passive electro-
ration is to recycle existing environmental signals. magnetic operation.
Specifically, an IRS can reshape the phases, ampli- – A passive relay reflects the existing source
tudes, and reflecting angles of the environmental signals for data forwarding. The electromag-
signals to serve its own objectives, for example, netic responses (i.e., reflection coefficients)
jamming and signal cancellation. With the striking of the passive relay are usually pre-designed
advancement in fabrication techniques of metama- and fixed. By contrast, an IRS possesses
terials, modern IRSs are capable of fully reshaping greater flexibility in adjusting its electromag-
the phase, amplitude, frequency, and reflecting netic response.
angles of impinging signals in a full-duplex fashion. Furthermore, an IRS is far more versatile than an
The elementary functions that can be enabled by information-forwarding relay as it can perform
cutting-edge IRS technologies include: reflection, concurrent functions (e.g., beamsteering and
refraction, absorption, focusing, splitting, and polar- interference cancellation) to satisfy heteroge-
ization [9]. For instance, NTT DOCOMO’s proto- neous quality-of-service (QoS) requirements.
type [10], announced in January 2020, realized a Apart from its distinctive physical properties,
2 For example, the IRS pro- three-mode operation encompassing full reflection, IRSs are deployment-friendly. First, a metasurface
totype in [7] operating in 60 partial reflection and full penetration of the imping- can be fabricated with nearly passive elements
GHz mmWave measures 69,
67.5, and 0.05 of the wave- ing radio waves. More detailed knowledge of hard- (e.g., analog phase shifters) that do not rely on
length in its length, width, ware fabrication and network implementation of active components for transmission. Hence, the
and thickness. IRS can be found in [8, 9]. circuit power consumption of a metasurface is

5 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

typically meager and can be powered through


microwave energy harvesting. For example, the
experimental results in [12] show that the energy
consumption of the implemented IRS is typically
no more than the energy that can be recycled
from the environmental microwave signals. Sec-
ond, thanks to the lightweight and ultra-thin foot-
print, metamaterials can be easily coated on the
facade of environmental objects, for example,
walls, vehicles, and smart clothing, constructing a
rich scattering environment. Therefore, IRS-coated
objects have the potential of delivering a more
deterministic wireless propagation environment
in a self-sustainable manner. This opens up broad
opportunities to satisfy heterogeneous QoS
requirements for future generation networks (e.g.,
more stable connectivity, improved data rate,
higher spectral efficiency) by only recycling exist-
ing environmental resources. Third, the fabrication
of IRS can be customized with artificially-engi-
neered materials for aesthetically-friendly deploy- FIGURE 3. System model.
ment. The optically-transparent metasurface
prototype from NTT DOCOMO [10] is an exam-
ple that makes a good aesthetic match with glass covert communication, the IRS can also be uti-
buildings, subway trains, road signs and billboards lized to facilitate wireless power transfer. Figure
for commercial use. Fourth, another advantage of 2b considers the scenario where Alice performs
metasurface that facilitates its deployment is the covert transmission with mmWave which is highly
inexpensive implementation. Because an IRS does vulnerable to blockages due to severe penetra-
not process radio waves at all, it can be fabricat- tion losses and poor diffraction of non line-of-sight
ed with low-cost components. For example, the (LoS) links. As shown, when there exists a block-
RFocus prototype [13] is a six-square-meter IRS age between Alice and Bob, deploying an IRS
comprising 3200 inexpensive elements. At this with LoS links to both Alice and Bob can be
scale, the average hardware cost of each element used to address the negative impact of blockag-
is a few cents. es for mmWave covert communication. Figure
2c depicts the scenario where the baseline sys-
IRS-Aided Covert Communication Systems tem is affected by the co-channel interference, for
By leveraging the powerful electromagnetic example, from ambient interferers or malicious
control of metasurface, an IRS can be carefully jammers. In this case, the IRS can be additionally
designed to improve the undesirable propagation configured to conduct interference cancellation
conditions to facilitate covert communication. at Bob and interference intensification at Willie
Generally, there are two functions of IRS that can to conceal the signal from Alice. In addition to
be utilized to enhance transmission covertness. the negative impact of co-channel interference,
On the one hand, an IRS can reflect the desirable legitimate users may confront an eavesdropping
signals (e.g., information transmission) in phase attack as shown in Fig. 2d. Signal cancellation at
with the ones at the intended receiver so as to both the eavesdropper and Willie needs to be
strengthen the signals, referred to as signal inten- conducted to cope with the concurrent attacks.
sification. On the other hand, an IRS can reflect
the unwanted signals (e.g., information leakage
and interference) in opposite phase with the ones Optimal Configuration for
at the unintended receiver, referred to as signal
cancellation. Usually, there exists a trade-off in
IRS-Enhanced Covert Communication under
configuring the electromagnetic responses of the Noise Uncertainty: A Case Study
IRS elements to achieve the above two objectives We show a case study of designing an IRS-en-
simultaneously. hanced covert communication system. We con-
Next, we elucidate how an IRS can be exploit- sider noise as the only cover medium with the
ed to enhance covert communication in various aim to focus on showing the effects of IRS on the
system environments (Fig. 2).3 Figure 2a illustrates covertness performance.
a baseline system model where Alice intermit-
tently transmits data to Bob in the presence of System Model
Willie. In this scenario, an IRS can be employed As shown in Fig. 3, we consider an IRS-enhanced
to perform signal intensification at Bob and sig- covert communication system where Alice intends
nal cancellation at Willie. As a result, increased to transmit to Bob with LPD by Willie. An IRS is
transmission rate at Bob and lower probability of deployed to facilitate the covert transmission of
detection at Willie could be achieved simultane- Alice. We consider that Alice, Bob, and Willie are
ously. Additionally, in a wireless-powered covert all equipped with a single antenna. Alice has a
communication system where Bob is equipped maximum transmit power budget denoted by P—A. 3 We note that Alice, Bob,

with RF energy harvesting capability, Alice can The IRS consists of N passive reflecting units, each Willie, jammer, eavesdropper
and ambient transmitters
also perform wireless power transfer or simulta- independently generating an arbitrary phase shift illustrated in Fig. 2 can be
neous wireless information and power transfer of the incident signal wave. All the channels in the any types of transceivers in
to supply energy for Bob. Other than achieving system experience both power-law path loss with practice.

IEEE Network • Accepted for Publication 6


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

7 ly optimizing the phases of the IRS units and the


=5, with IRS transmit power of Alice subject to:
6 =2, with IRS • The covertness constraint that the sum of the
=5, without IRS false alarm probability and miss-detection
=2, without IRS
probability of Willie is greater than a target

Covert rate (bps/Hz)


5

4
threshold x
• The phase operation constraint that the
3 phase shifts of the IRS units are within [0, 2p)
• The transmit power constraint that Alice

2 should transmit at a power level below PA.
1 Numerical Results
Next, we perform Monte Carlo simulations to
0
-25 -20 -15 -10 -5 0 5 10 15 study the formulated optimization problem. In
the simulations, Alice, Bob, the IRS, and Willie
are located at (0, 0), (d, 0), (d/2, 0), and (0, 15)
FIGURE 4. Covert rate as a function of —
PA (N = 25,
in a two-dimensional area, respectively. Alice is
2 2
d = 10, sn = sB = – 60 dBm, x = 99 percent,
considered to transmit with a probability of 50
a = 3).
percent. For each simulation realization, we gen-
erate independent and identically distributed
6 2
N=16
noise power at Willie sW and fading gains for all
N=25 the channels which are exponentially distributed
5
N=36 with unit mean.
N=49 Figure 4 depicts the covert rate RAB as a func-
Covert rate (bps/Hz)

N=64 —
4
N=81
tion of the maximum transmit power PA. For the
N=100 comparison purpose, we also present the results
3
of RAB without the use of an IRS. It can be found
that RAB can be dramatically improved with the
2 aid of an IRS. Moreover, R AB reaches a steady

value at much larger PA in the case with an IRS
1 compared to that without an IRS. The reason that
RAB stops increasing at a steady value is that given
0 a certain noise level, the covertness constraint
5 6 7 8 9 10 11 12 13 14 15
d (m)
can no longer be maintained with the help of
the IRS if the transmit power of Alice is above a

FIGURE 5. Covert rate as a function of d ( PA = 25 dBm, certain level. Another observation is that greater
2 2
r = 5, sn = sB = – 30 dBm, x = 99 percent, a = 3). noise uncertainty at Willie (represented by larger
r) helps to improve R AB. The performance gap
between the cases with r = 5 and r = 2 becomes

exponent a and block Rayleigh fading. Similar to much more conspicuous with the increase of PA.
[14], we assume the CSI of all the channels are Figure 5 demonstrates the impact of the num-
available at Alice and the IRS for the joint optimi- ber of IRS elements N under varying transmission
zation, which yields the best system performance distance. The results show that larger N renders
benchmark. It is worth noting that the CSI of Wil- better performance, especially when d is large.
lie can be reasonably estimated when Willie is an For instance, the ratio of RAB with N = 100 to that
active transmitter. with N = 16 is 176.7 percent when d = 5 and is
We consider a bounded uncertainty model increased to 584.9 percent when d = 10. This also
2
for the noise observed by Willie sW , the PDF of implies that employing more IRS elements is an
which is given by [15, eqn. 3]: effective way to improve the covert transmission
distance. For instance, if the target covert rate
fσ 2 (x) = 1 (2 ln(ρ)x), if σ 2n ρ ≤ σW
2
≤ σ 2nρ
W is 1 bps/Hz, the covert transmission distance is
and fσ 2 (x) = 0, otherwise. extended from about 8 m to about 12 m when N
W
is increased from 16 to 100.
2
Here, sn is the nominal noise power, r ∈ [1, ∞) is
the uncertainty parameter which determines the Concluding Remarks and Future Directions
2
range of s W . Note that a larger value of r rep- With the integration of the IRS to covert com-
2
resents larger uncertainty of sW . Similar to [15], munication systems, the previously unused envi-
the noise uncertainty at Bob is not considered ronment resources can be recycled to enhance
as it does not affect the covertness performance. communication covertness. This article reviews
Specifically, the noise power at Willie is consid- the existing covertness techniques and envisions
ered as Gaussian white noise with zero mean and the use of the IRS to revolutionize covert commu-
2
variance s B. Moreover, Willie is considered to nication systems in various aspects. A case study
2
know a priori distributions of sW and the received has also been presented to demonstrate that a
signals from Alice, however, is unaware of the considerable improvement in covert performance
existence and operation of the IRS. Thus, Willie can be achieved through the joint configuration
can only set its detection threshold based on the of the IRS and the covert communication system.
available a priori knowledge. We firmly believe that the emerging IRS technol-
We consider the optimization problem to ogy will open up broad opportunities in designing
maximize the covert rate between Alice and Bob and developing future wireless security, not limit-
measured by the Shannon capacity through joint- ed to covertness techniques. The scope of future

7 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

research topics on IRS-enhanced covert commu- [11] S. Hu, F. Rusek, and O. Edfors, “Beyond Massive MIMO:
The Potential of Data Transmission with Large Intelligent
nication is broad. Some open issues and research Surfaces,” IEEE Trans. Signal Process., vol. 66, no. 10, May
directions are as follows. 2018, pp. 2746–58.
Estimation of IRS Channels: As the wave [12] N. Kaina et al., “Shaping Complex Microwave Fields in
manipulation of an IRS is dependent on the CSI to Reverberating Media with Binary Tunable Metasurfaces,”
Scientific Reports, 4, 6693. Oct. 2014.
enhance covert communication, the system per- [13] V. Arun and H. Balakrishnan, “RFocus: Beamforming Using
formance is heavily dependent on the availabili- Thousands of Passive Antennas,” Proc. USENIX Symposium
ty and accuracy of CSI. However, instantaneous on Networked Systems Design and Implementation, Santa
CSI of the reflection channels is difficult to be Clara, CA, USA, Feb. 2020.
[14] M. Cui, G. Zhang, and R. Zhang, “Secure Wireless Com-
acquired due to the nearly passive operation of munication via Intelligent Reflecting Surface,” IEEE Wireless
an IRS. In this context, the machine learning-based Commun. Letters, vol. 8, no. 5, Oct. 2019, pp. 1410–14.
approach that allows estimating channels without [15] B. He et al., “On Covert Communication with Noise Uncer-
explicit feedback/detection is worth exploring to tainty,” IEEE Commun. Letters, vol. 21, no. 4, Apr. 2017, pp.
941–44.
devise feasible solutions.
IRS-Based Information/Communication The- Biographies
oretic Models: With the signal intensification and Xiao Lu (lu9@ualberta.ca) received the Ph.D. degree at the Uni-
cancellation capabilities of the IRS, an IRS-enhanced versity of Alberta, Canada, the M.Eng. degree in computer engi-
neering from Nanyang Technological University, and the B.Eng.
covert channel is expected to transport a larger vol- degree in communication engineering from Beijing University
ume of information bits. Hence, the conventional of Posts and Telecommunications. His current research interests
covert channel capacity needs to be revisited by are in the area of stochastic modeling and analysis of wireless
taking into account channel programmability. More- communications systems.
over, scaling laws of IRS-enhanced covert channel E kram H ossain [F’15] (Ekram.Hossain@umanitoba.ca) is a
capacity need to be derived for a fundamental professor and the Associate Head (Graduate Studies) with the
understanding of achievable performance limits. Department of Electrical and Computer Engineering, University
Impact of Multiple IRSs: IRSs are anticipat- of Manitoba, Canada. He is a member (Class of 2016) of the
College of the Royal Society of Canada and a Fellow of the
ed to be deployed on the superficies of environ- Canadian Academy of Engineering. His current research inter-
mental objects located with perplexing spatial ests include design, analysis, and optimization beyond 5G cel-
patterns. Therefore, it is a common scenario that lular wireless networks. He was elevated to an IEEE Fellow “for
the propagation environment is jointly shaped by contributions to spectrum management and resource allocation
in cognitive and cellular radio networks.”
multiple IRSs. The aggregated impact of the oper-
ation of ambient IRSs on IRS-enhanced covert Taniya Shafique [St M] (shafiqut@myumanitoba.ca) received
communication is worth investigating by consider- the M.Sc. and M.Phil. degrees from the Department of Electron-
ing their spatial distribution. ics, Quaid-i-Azam University, Islamabad, Pakistan, in 2012 and
2015, respectively. She is currently pursuing her Ph.D. degree at
the University of Manitoba, Canada. She was with King Abdullah
References University of Science and Technology as a masters research
[1] I. Ahmad et al., “Overview of 5G Security Challenges and intern and with Texas A&M University at Qatar as a research
Solutions,” IEEE Commun. Standards Mag., vol. 2, no. 1, Mar. associate for six months each, in 2016 and 2017. Her research
2018, pp. 36–43. interests span the areas of wireless retransmission techniques,
[2] Y. Liang, H. V. Poor, and S. Shamai, “Information Theoretic adaptive modulation and coding, and UAV-aided cellular com-
Security,” Foundations and Trends in Commun. and Informa- munications.
tion Theory, vol. 5, June 2009, pp. 355–580.
[3] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of Reli- Shaohan Feng [St M] (FENG0089@e.ntu.edu.sg) received the
able Communication with Low Probability of Detection on B.S. degree from the School of Mathematics and Systems Sci-
AWGN Channels,” IEEE JSAC, vol. 31, no. 9, Sept. 2013, ence, Beihang University, Beijing, China in 2014, and the M.S.
pp. 1921–30. degree from the School of Mathematical Sciences, Zhejiang
[4] T. X. Zheng et al., “Multi-Antenna Covert Communications in University, Hangzhou, China in 2016. He is currently pursu-
Random Wireless Networks,” IEEE Trans. Wireless Commun., ing the Ph.D. degree with the School of Computer Science
vol. 18, no. 3, Mar. 2019, pp. 1974–87. and Engineering, Nanyang Technological University, Singapore.
[5] E. Bjornson et al., “Massive MIMO Systems with Non-Ideal His current research interest includes resource management in
Hardware: Energy Efficiency, Estimation, and Capacity Lim- cloud computing and communication networks.
its,” IEEE Trans. Information Theory, vol. 60, no. 11, Nov.
2014, pp. 7112–39. Hai Jiang [SM’15] (hai1@ualberta.ca) received the B.Sc. and
[6] R. Soltani et al., “Covert Wireless Communication with Arti- M.Sc. degrees in electronics engineering from Peking University,
ficial Noise Generation,” IEEE Trans. Wireless Commun., vol. Beijing, China, in 1995 and 1998, respectively, and the Ph.D.
17, no. 11, Nov. 2018, pp. 7252–67. degree in electrical engineering from the University of Waterloo,
[7] X. Tan et al., “Enabling Indoor Mobile Millimeter-Wave Net- Waterloo, ON, Canada, in 2006. He is currently a professor
works Based on Smart Reflect-Arrays,” IEEE Int’l. Conf. Com- with the Department of Electrical and Computer Engineering,
puter Commun., Honolulu, HI, USA, Apr. 2018. University of Alberta, Canada. His research interests include
[8] S. V. Hum and J. P. Carrier, “Reconfigurable Reflect-arrays radio resource management, cognitive radio networking, and
and Array Lenses for Dynamic Antenna Beam Control: A cooperative communications.
Review,” IEEE Trans. Antennas and Propagation, vol. 62, no.
1, Jan. 2014, pp. 183–98. D usit N iyato [M’09, SM’15, F’17] (dniyato@ntu.edu.sg)
[9] M. D. Renzo et al., “Smart Radio Environments Empowered received the B.Eng. degree from the King Mongkuts Institute
by Reconfigurable AI Meta-Surfaces: An Idea Whose Time of Technology Ladkrabang, Thailand, in 1999, and the Ph.D.
Has Come,” EURASIP J. Wireless Commun. Networking, vol. degree in electrical and computer engineering from the Univer-
1, May 2019, pp. 1–20. sity of Manitoba, Canada, in 2008. He is currently a professor
[10] NTT DOCOMO, “DOCOMO Conducts World’s First with the School of Computer Science and Engineering, Nanyang
Successful Trial of Transparent Dynamic Metasurface,” Jan. Technological University, Singapore. His research interests are
2020; available: https://www.nttdocomo.co.jp/english/info/ in the area of energy harvesting for wireless communication,
media center/pr/2020/0117 00.html. Internet of Things, and sensor networks.

IEEE Network • Accepted for Publication 8


Authorized licensed use limited to: University of Edinburgh. Downloaded on June 14,2020 at 07:57:27 UTC from IEEE Xplore. Restrictions apply.

You might also like