2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849852
|View full text |Cite
|
Sign up to set email alerts
|

Throughput Scaling of Covert Communication over Wireless Adhoc Networks

Abstract: We consider the problem of covert communication over wireless adhoc networks in which (roughly) n legitimate nodes (LNs) and n κ for 0 < κ < 1 non-communicating warden nodes (WNs) are randomly distributed in a square of unit area. Each legitimate source wants to communicate with its intended destination node while ensuring that every WN is unable to detect the presence of the communication. In this scenario, we study the throughput scaling law. Due the covert communication constraint, the transmit powers are n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…multiuser channels [18]- [22], channel with states [23], [24], channel with jammers [25]- [28], Rayleigh-fading channels [29]- [31], continuous-time channels [32]- [34], quantum channels [35]- [37], MIMO channels [38], adhoc networks [39], [40], etc. In addition to characterizing the information-theoretic limits, researchers have also studied covert communication from a coding perspective, and have investigated various coding techniques such as concatenated codes [41], PPM [8], multilevel coding with PPM [42]- [44], and polar codes [45].…”
Section: B Related Workmentioning
confidence: 99%
“…multiuser channels [18]- [22], channel with states [23], [24], channel with jammers [25]- [28], Rayleigh-fading channels [29]- [31], continuous-time channels [32]- [34], quantum channels [35]- [37], MIMO channels [38], adhoc networks [39], [40], etc. In addition to characterizing the information-theoretic limits, researchers have also studied covert communication from a coding perspective, and have investigated various coding techniques such as concatenated codes [41], PPM [8], multilevel coding with PPM [42]- [44], and polar codes [45].…”
Section: B Related Workmentioning
confidence: 99%
“…The fundamental limits of covert communications have been actively studied mainly for pointto-point (p-to-p) channels such as additive white Gaussian noise (AWGN) channels [2], [3], discrete memoryless channels (DMCs) [3], [4], low-complexity coding scheme based on the pulse-position modulation [5], [6], channels using multiple antennas [7], and channels with some uncertainty of statistics [8], [9]. In most interesting cases, the covertness constraint restricts the number of no "off" input symbols (for discrete channel cases [4]) or the transmit power (for continuous channel cases [2], [3]) that leads the so-called square-root law, i.e., the maximum number of bits that can be communicated reliably and covertly over n channel uses scales proportionally to √ n. Recently, this line of research has been extended to various network scenarios such as multiple access channels (MACs) [10], broadcast channels (BCs) [11], relay channels (RCs) [12]- [14], and wireless adhoc networks [15]. It turns out that in some canonical models, the covertness constraint affects This paper was submitted to IEEE Transactions on Information Forensics and Security, and a shorter version of this paper was submitted to IEEE ISIT 2020 [1].…”
Section: Introductionmentioning
confidence: 99%