2019
DOI: 10.1109/tvt.2019.2948608
|View full text |Cite
|
Sign up to set email alerts
|

Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(25 citation statements)
references
References 18 publications
2
23
0
Order By: Relevance
“…We expect a high covert probability for situations in which Willie cannot correctly detect the model transmission of any device in the network. For this, the cover probability for the device in the FL network needs to be greater than a security requirement (1 − ǫ) [15], where ǫ is the security threshold. This is the CC constraint.…”
Section: ) System Modelmentioning
confidence: 99%
“…We expect a high covert probability for situations in which Willie cannot correctly detect the model transmission of any device in the network. For this, the cover probability for the device in the FL network needs to be greater than a security requirement (1 − ǫ) [15], where ǫ is the security threshold. This is the CC constraint.…”
Section: ) System Modelmentioning
confidence: 99%
“…The authors in [25] further explored the benefits of both centralized and distributed multi-antenna transmitters on covert communications against randomly located wardens. The authors in a recent work [26] considered a multi-antenna warden scenario, showing that even a slight increase in the antenna number at the warden side can result in a dramatic deterioration in covert throughput.…”
Section: A Previous Workmentioning
confidence: 99%
“…where n w [i] is the AWGN at W with variance σ 2 w , i.e., n w [i] ∼ CN (0, σ 2 w ). We follow a commonly used assumption in literature on covert communications that W adopts a radiometer to detect the covert communication from T to R [19], [20], [24]- [26]. This is not only because the radiometer is easy to implement and is of low complexity in practice, but also because of its sufficiency in detecting covert communications for the scenario under investigation as justified in Appendix A.…”
Section: Detection Strategy At Wardenmentioning
confidence: 99%
“…The advantages of multiple antennas have also been exploitedat different users to improve the their own performance in covert communication [19]- [23]. In [19], Shahzad et al found that increasing the antennas equipped at the adversary Willie can reduce the covert throughput with the delay constraint.…”
Section: Introductionmentioning
confidence: 99%
“…The advantages of multiple antennas have also been exploitedat different users to improve the their own performance in covert communication [19]- [23]. In [19], Shahzad et al found that increasing the antennas equipped at the adversary Willie can reduce the covert throughput with the delay constraint. Zheng et al investigated the covert communication with a multi-antenna transmitter and randomly distributed interferers and wardens under the centralized and distributed antenna systems in [20].…”
Section: Introductionmentioning
confidence: 99%