2023
DOI: 10.3390/s23218747
|View full text |Cite
|
Sign up to set email alerts
|

Performance Comparison of Relay-Based Covert Communications: DF, CF and AF

Jihwan Moon

Abstract: In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through a relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we optimize the power distribution between the public and covert messages to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Addressing security concerns pertaining to information transmission in multi-sensor environments emerges as a pivotal undertaking [3][4][5]. Traditional encryption methodologies and techniques in physical layer security primarily concentrate on protecting the communication content [6,7]. Nevertheless, the mere protection of communication content no longer suffices to meet contemporary information security requisites [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Addressing security concerns pertaining to information transmission in multi-sensor environments emerges as a pivotal undertaking [3][4][5]. Traditional encryption methodologies and techniques in physical layer security primarily concentrate on protecting the communication content [6,7]. Nevertheless, the mere protection of communication content no longer suffices to meet contemporary information security requisites [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, the security issues related to information transmission in the Internet of Things (IoT) will become one of the primary tasks in the future [3][4][5]. Traditional encryption methods and physical layer security techniques aim to prevent eavesdropping on communication content [6,7], but merely protecting communication content is no longer sufficient to meet the current requirements for information security [8]. Even if the information is encrypted, metadata such as network traffic patterns may still leak some sensitive information [9].…”
Section: Introductionmentioning
confidence: 99%
“…Secure communication has traditionally centered on preventing adversaries from deciphering message content [1][2][3][4]. However, in the realm of wireless communication, traditional information security measures prove inadequate to meet current security demands [5,6].…”
Section: Introductionmentioning
confidence: 99%