Covert_Wireless_Communication_in_Multichannel_Systems (1)
Covert_Wireless_Communication_in_Multichannel_Systems (1)
9, SEPTEMBER 2022
Abstract—In this letter, we propose a random sub-channel Willie’s optimal detection performance with the knowledge of
selection covert transmission (RSCT) scheme in multi-channel instantaneous channel state information and statistical chan-
systems to enhance the covertness of communication. We derive nel state information, respectively. Besides, the covertness
the expression of minimum detection error probability (DEP) and
the average effective rate, based on which an optimization is con- performance with finite blocklength was investigated under
structed to maximize the average effective covertness rate (ECR). AWGN channels and the effect of blocklength was analyzed
Numerical results indicate that, compared with the single-channel in [6]. On this basis, scholars tried to improve the performance
scheme, the proposed scheme can indeed enhance the covert- of CWC through various techniques. Reference [7] considered
ness of the communication and the performance is improved a full-duplex receiver sending jamming signals to increase the
as the number of sub-channels increases. Besides, it is demon-
strated that there exists an optimal number of sub-channels for DEP at Willie. Reference [8] showed 3D beamforming can
maximizing the average ECR. improve the covertness performance. Reference [9] improved
the covertness performance by sending artificial noise to dete-
Index Terms—Covert wireless communications, multi-channel
system, finite blocklength. riorate Willie’s detection performance in a untrusted relay
network.
We note that the above investigations are based on single-
I. I NTRODUCTION channel systems. However, multi-channel systems are exten-
sively applied in wireless communications due to the advan-
ITH the rapid growth of wireless communications,
W more and more sensitive information such as personal
privacy and financial data is transmitted via wireless chan-
tage of high effective rate. As multi-channel systems can
provide a new dimension of uncertainty to CWC, it gradu-
ally aroused widespread interest in improving the covertness
nels. Naturally, people have put forward higher demands on
performance. The authors of [10] considered a frequency-
the security of wireless communication. In this context, covert
hopping system with probabilistic sub-channel selection, and
wireless communication (CWC) has drawn increasing atten-
the optimal probability vector is obtained for achieving the
tion [1], [2]. The aim of CWC is to make wireless communica-
enhanced CWC.
tion signals or communication behaviors only be detected with
However, all the above studies are based on single-channel
a ultra-low probability. Bash et al. derived the fundamental
systems, and the CWC in the widespread multi-channel
performance bounds of CWC in additive Gaussian white noise
systems such as frequency hopping systems and orthogo-
(AWGN) channels, i.e., square root law (SRL) [3]. SRT shows
nal frequency division multiplexing (OFDM) systems has not
that the transmitter can covertly and reliably transmits zero
been investigated so far. Reference [11] considered the CWC
bits per channel use when the channel uses N is sufficiently
in a multi-channel system with a full-duplex receiver and
large. Fortunately, scholars have found that positive effective
demonstrated that the ECR can be improved under the con-
covertness rate (ECR) can be achieved when Willie has uncer-
sidered scheme, while in some scenarios with strict delay
tainty on the received signals. Scholars first considered the
requirements.
noise uncertainty at Willie and [4] investigated how to jointly
This letter investigates the CWC in multi-channel systems
optimize the UAV’s trajectory and transmit power to maximize
with finite blocklength. During a fixed transmission period,
the covert rate with noise uncertainty. After that, the uncer-
the transmitter can pick one of K sub-channels to deliver pri-
tainty in channel estimation is inevitable and [5] investigated
vate messages, which further disturbs the warden and raises
Manuscript received 23 March 2022; revised 5 May 2022; accepted the covertness of the communication. However, more sub-
3 June 2022. Date of publication 8 June 2022; date of current version channels imply that the system is occupying up more resources
9 September 2022. This work was supported in part by the National Natural and the average ECR is reduced. In this regard, the num-
Science Foundation of China under Grant 62071486; in part by the Key
Research and Development Program of Jiangsu Province Key Project and ber of sub-channels should be designed carefully in order to
Topics under Grant BE2021095; and in part by the Natural Science Foundation balance the covertness and effectiveness of the system. We
on Frontier Leading Technology Basic Research Project of Jiangsu under derive the closed-form expressions of the minimum detection
Grant BK20212001. The associate editor coordinating the review of this
article and approving it for publication was M. Kishk. (Corresponding author: error probability (DEP), the packet error probability and the
Chang Gao.) average effective rate. And the optimization of transmit power
Bohan Che, Ruiqian Ma, Xueqiang Zheng, and Weiwei Yang are and number of sub-channels is tackled to maximize the aver-
with the College of Communications Engineering, Army Engineering
University of PLA, Nanjing 210007, China (e-mail: [email protected]; age ECR. Through our research, we find that the covertness
[email protected]; [email protected]; [email protected]). performance can be enhanced as the number of sub-channels
Chang Gao is with the College of Information and Communication increases and there exists an optimal number of sub-channels
Engineering, Beijing University of Posts and Telecommunications, Beijing
100876, China (e-mail: [email protected]). to maximize the ECR. It is worth noting that there are some
Digital Object Identifier 10.1109/LWC.2022.3180993 differences between the model considered in this letter and the
2162-2345
c 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Military Institute of Science and Technology. Downloaded on January 02,2025 at 04:35:41 UTC from IEEE Xplore. Restrictions apply.
CHE et al.: COVERT WIRELESS COMMUNICATION IN MULTICHANNEL SYSTEMS 1791
Authorized licensed use limited to: Military Institute of Science and Technology. Downloaded on January 02,2025 at 04:35:41 UTC from IEEE Xplore. Restrictions apply.
1792 IEEE WIRELESS COMMUNICATIONS LETTERS, VOL. 11, NO. 9, SEPTEMBER 2022
σ2 N
where Ψ = K1 ( P +σ w
2 ) . The logarithm of (7) is the log-
2 Then, we can obtain the minimum DEP P∗E as
a w
likelihood ratio given as follows. ∗ ∗
γ(N , Nστ2 ) γ(N , PN+σ
τ
2 )
K
P∗E =1−( w K
) (1 − a
∗
w
), (13)
log Λ(Yw ) = log Ψ + log e μYk
,
Γ(N ) γ(N , Nστ2 )
w
k =1 and the corresponding optimal threshold τ ∗ are denoted as
= log Ψ + LogSumExp(μ{Yk }K
k =1 ), 2 2 2
(Pa + σw )σw P a + σw
(a) τ∗ = ln
≈ log Ψ + max(μ{Yk }K Pa σ2
k =1 ), ⎛ w ⎞
τ∗
= log Ψ + μ max (Yk ), (8) (Pa + σw 2 2
)σw (K − 1)γ(N , PN+σ 2 )
ln⎝K − ⎠. (14)
a
k ∈{1,...,K } + ∗
w
N Pa γ(N , Nστ2 )
w
tolerance equals to 0.003. In the figure, we can first observe [7] M. Zheng, A. Hamilton, and C. Ling, “Covert communications with
that, as the number of sub-channels K increases, the aver- a full-duplex receiver in non-coherent Rayleigh fading,” IEEE Trans.
Commun., vol. 69, no. 3, pp. 1882–1895, Mar. 2021.
age ECR first increases and then decreases, which implies [8] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert com-
that there exists an optimal number of sub-channels K ∗ for munication using null space and 3D beamforming: Uncertainty of
maximizing the average ECR. This is due to the fact that Willie’s location information,” IEEE Trans. Veh. Technol., vol. 69, no. 8,
pp. 8568–8576, Aug. 2020.
increasing the number of sub-channels K improves the covert- [9] M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Covert commu-
ness performance of the communication but deteriorates the nication and secure transmission over untrusted relaying networks in the
communication performance. The optimal number of sub- presence of multiple wardens,” IEEE Trans. Commun., vol. 68, no. 6,
pp. 3737–3749, Jun. 2020.
channels K ∗ reflects the trade-off between covertness and [10] B. Ning, L. Guan, and H. Huang, “A novel frequency-hopping sequence
effectiveness under the RSCT scheme. for covert communication,” IEEE Access, vol. 5, pp. 20157–20163,
2017.
[11] B. Che, W. Yang, and X. Lu, “Covert communication for multi-channel
V. C ONCLUSION transmission with a full-duplex receiver,” in Proc. 13th Int. Conf.
Wireless Commun. Signal Process. (WCSP), Oct. 2021, pp. 1–5.
In this letter, we first investigate CWC in multi-channel [12] R. Ma, X. Yang, G. Pan, X. Guan, Y. Zhang, and W. Yang, “Covert
systems with the RSCT scheme. Analysis and numerical communications with channel inversion power control in the finite
results indicated that, compared with the single-channel trans- blocklength regime,” IEEE Commun. Lett., vol. 10, no. 4, pp. 835–839,
Apr. 2021.
mission scheme, the proposed RSCT scheme in multi-channel [13] E. Lehmann and J. Romano, Testing Statistical Hypotheses, 3rd ed. New
systems can indeed improve the covertness performance. York, NY, USA: Springer, 2005.
Furthermore, there exists an optimal number of sub-channels [14] B. Yu, Y. Cai, and D. Wu, “Joint access control and resource allocation
for short-packet-based mMTC in status update systems,” IEEE J. Sel.
for maximizing the ECR. Areas Commun., vol. 39, no. 3, pp. 851–865, Mar. 2021.
[15] S. Yan, B. He, X. Zhou, Y. Cong, and A. L. Swindlehurst, “Delay-
R EFERENCES intolerant covert communications with either fixed or random transmit
power,” IEEE Trans. Inf. Forensics Security, vol. 14, pp. 129–140, 2019.
[1] W. Yang, X. Lu, S. Yan, F. Shu, and Z. Li, “Age of information for short- [16] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
packet covert communication,” IEEE Wireless Commun. Lett., vol. 10, Cambridge Univ. Press, 2004.
no. 9, pp. 1890–1894, Sep. 2021. [17] M. H. DeGroot and M. J. Schervish, Probability and Statistics. London,
[2] X. Jiang et al., “Covert communication in UAV-assisted air-ground U.K.: Pearson Educ., 2012.
networks,” IEEE Wireless Commun., vol. 28, no. 4, pp. 190–197, [18] B. A. Bash, D. Goeckel, and D. Towsley, “Covert communication gains
Aug. 2021. from adversary’s ignorance of transmission time,” IEEE Trans. Wireless
[3] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communi- Commun., vol. 15, no. 12, pp. 8394–8405, Dec. 2016.
cation with low probability of detection on AWGN channels,” IEEE J. [19] X. Lu, W. Yang, S. Yan, L. Tao, and D. W. K. Ng, “Joint packet
Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013. generation and covert communication in delay-intolerant status update
[4] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint optimization systems,” IEEE Trans. Veh. Technol., vol. 71, no. 2, pp. 2170–2175,
of a UAV’s trajectory and transmit power for covert communica- Feb. 2022.
tions,” IEEE Trans. Signal Process., vol. 67, no. 16, pp. 4276–4290, [20] R. Ma, W. Yang, L. Tao, X. Lu, Z. Xiang, and J. Liu, “Covert
Aug. 2019. communications with randomly distributed wardens in the finite block-
[5] K. Shahzad and X. Zhou, “Covert wireless communications under length regime,” IEEE Trans. Veh. Technol., vol. 71, no. 1, pp. 533–544,
quasi-static fading with channel uncertainty,” IEEE Trans. Inf. Forensics Jan. 2022.
Security, vol. 16, pp. 1104–1116, 2021. [21] X. Lu, W. Yang, S. Yan, Z. Li, and D. W. K. Ng, “Covertness
[6] X. Yu, S. Wei, and Y. Luo, “Finite blocklength analysis of Gaussian and timeliness of data collection in UAV-aided wireless-powered
random coding in AWGN channels under covert constraint,” IEEE Trans. IoT,” IEEE Internet Things J., early access, Dec. 23, 2021,
Inf. Forensics Security, vol. 16, pp. 1261–1274, 2021. doi: 10.1109/JIOT.2021.3137846.
Authorized licensed use limited to: Military Institute of Science and Technology. Downloaded on January 02,2025 at 04:35:41 UTC from IEEE Xplore. Restrictions apply.