2020
DOI: 10.1109/mnet.011.1900579
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 118 publications
(62 citation statements)
references
References 13 publications
0
62
0
Order By: Relevance
“…In [201], the authors study an RIS-based system in which the secrecy of the communication link is enhanced by making the signal transmission covert to potential eavesdroppers. This is achieved by using an RIS that focuses the transmit signal only towards the direction of the intended receiver.…”
Section: K Physical Layer Securitymentioning
confidence: 99%
“…In [201], the authors study an RIS-based system in which the secrecy of the communication link is enhanced by making the signal transmission covert to potential eavesdroppers. This is achieved by using an RIS that focuses the transmit signal only towards the direction of the intended receiver.…”
Section: K Physical Layer Securitymentioning
confidence: 99%
“…The former focuses on improving the secrecy rate (SR) of legitimate users by exploiting the dynamic features of wireless communications, for example, random channel, fading, interference, and noise, etc., to prevent the eavesdropper from decoding leaked data while ensuring that the legitimate user can decode it successfully. The covert communications direction, on the other hand, considers hiding the existence of communication from being detected by an enemy [12], [16]. In this survey, we will focus on the first direction, and for simplicity, it will be referred to as PLS.…”
Section: Introductionmentioning
confidence: 99%
“…Among related open problems, we mention the design of low-complexity joint encoding and decoding strategies that approach capacity, the derivation of the capacity for channels with imperfect a priori CSI [28]- [30] or noisy RIS [31], and extensions to RIS systems with multiple users/surfaces [1], [15], [16], [18] or with security constraints [32]- [34].…”
Section: Discussionmentioning
confidence: 99%