浏览全部资源
扫码关注微信
1. 信息工程大学,河南 郑州 450002
2. 国家数字交换系统工程技术研究中心,河南 郑州 450002
[ "林钰达(1994- ),男,浙江杭州人,信息工程大学博士生,主要研究方向为隐蔽无线通信、物理层安全" ]
[ "金梁(1969- ),男,浙江上虞人,博士,国家数字交换系统工程技术研究中心教授、博士生导师,主要研究方向为移动通信技术、物理层安全、阵列信号处理等" ]
[ "周游(1986- ),男,安徽合肥人,国家数字交换系统工程技术研究中心助理研究员,主要研究方向为无线移动通信" ]
[ "楼洋明(1991- ),男,浙江义乌人,信息工程大学博士生、国家数字交换系统工程技术研究中心助理研究员,主要研究方向为信息论、物理层安全" ]
网络出版日期:2020-07,
纸质出版日期:2020-07-25
移动端阅览
林钰达, 金梁, 周游, 等. 噪声不确定时基于波束成形的隐蔽无线通信性能分析[J]. 通信学报, 2020,41(7):49-58.
Yuda LIN, Liang JIN, You ZHOU, et al. Performance analysis of covert wireless communication based on beam forming with noise uncertainty[J]. Journal on communications, 2020, 41(7): 49-58.
林钰达, 金梁, 周游, 等. 噪声不确定时基于波束成形的隐蔽无线通信性能分析[J]. 通信学报, 2020,41(7):49-58. DOI: 10.11959/j.issn.1000-436x.2020137.
Yuda LIN, Liang JIN, You ZHOU, et al. Performance analysis of covert wireless communication based on beam forming with noise uncertainty[J]. Journal on communications, 2020, 41(7): 49-58. DOI: 10.11959/j.issn.1000-436x.2020137.
为了在噪声不确定时实现瑞利衰落环境下的隐蔽无线通信,采用基于复高斯随机编码和波束成形的下行隐蔽无线通信方案,重点分析了隐蔽无线通信性能。首先,利用假设检验理论分析基于该方案通信的隐蔽概率;然后,给出并证明非法检测方的最优检测门限,并进一步得到系统的平均隐蔽概率、连接中断概率和隐蔽吞吐量闭式表达式;最后,通过联合设计发射功率和目标隐蔽速率,实现系统最大隐蔽吞吐量的优化目标,并给出了基于分步搜索的相应求解算法。仿真结果表明,波束成形技术能够为隐蔽无线通信带来一定增益;与考虑合法接收方不受噪声不确定影响的理想情形相比,考虑合法接收方非理想情形时的隐蔽吞吐量有明显下降,几乎不受环境基本噪声水平的影响。
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty
a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted
and more importantly
the performance of covert wireless communication was analysed.Firstly
the covert probability of communication was analyzed by using the hypothesis test theory.Secondly
the optimal detection threshold of the illegal detection party was given and proved
and the closed expressions of the average covert probability
connection interruption probability and covert throughput of the system were further obtained.Finally
by jointly designing the transmission power and target covert rate
the optimal goal of the maximum covert throughput of the system was achieved
and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty
the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.
LIU Z , LIU J , ZENG Y , et al . Covert wireless communications in IoT systems:hiding information in interference [J ] . IEEE Wireless Communications , 2018 , 25 ( 6 ): 46 - 52 .
BASH B A , GOECKEL D , TOWSLEY D , et al . Hiding information in noise:fundamental limits of covert wireless communication [J ] . IEEE Communications Magazine , 2015 , 53 ( 12 ): 26 - 31 .
BASH B A , GOECKEL D , TOWSLEY D . Limits of reliable communication with low probability of detection on AWGN channels [J ] . IEEE Journal on Selected Areas In Communications , 2013 , 31 ( 9 ): 1921 - 1930 .
WANG L , WORNELL G W , ZHENG L . Limits of low-probabilityof-detection communication over a discrete memoryless channel [C ] // 2015 IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2015 : 2525 - 2529 .
BASH B A , GUHA S , GOECKEL D , et al . Quantum noise limited optical communication with low probability of detection [C ] // 2013 IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2013 : 1715 - 1719 .
ARUMUGAM K S K , BLOCH M R . Covert communication over a k-user multiple access channel [J ] . IEEE Transactions on Information Theory , 2019 ,DOI:10.1109/TIT.2019.2930484.
ZHANG Q E , BAKSHI M , JAGGI S . Covert communication over adversarially jammed channels [C ] // 2018 IEEE Information Theory Workshop . Piscataway:IEEE Press , 2018 : 1 - 5 .
FRÈCHE G , BLOCH M R , BARRET M . Polar codes for covert communications over asynchronous discrete memoryless channels [J ] . Entropy , 2018 , 20 ( 1 ):3.
KADAMPOT I A , TAHMASBI M , BLOCH M R . Multilevel-coded pulse-position modulation for covert communications [C ] // 2018 IEEE International Symposium on Information Theory (ISIT) . Piscataway:IEEE Press , 2018 : 1864 - 1868 .
LIN P H , JANDA C R , JORSWIECK E A . Stealthy secret key generation [C ] // 2017 IEEE Global Conference on Signal and Information Processing . Piscataway:IEEE Press , 2017 : 492 - 496 .
TAHMASBI M , BLOCH M R . Covert secret key generation with an active warden [J ] . IEEE Transactions on Information Forensics and Security , 2019 ,DOI:10.1109/TIFS.2019.2932906.
HE B , YAN S , ZHOU X , et al . Covert wireless communication with a Poisson field of interferers [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 9 ): 6005 - 6017 .
SHI X , WU D , YUE C , et al . Resource allocation for covert communication in D2D content sharing:a matching game approach [J ] . IEEE Access , 2019 ,DOI:10.1109/ACCESS.2019.2919453.
YAN S , HE B , ZHOU X , et al . Delay-intolerant covert communications with either fixed or random transmit power [J ] . IEEE Transactions on Information Forensics and Security , 2018 , 14 ( 1 ): 129 - 140 .
GOECKEL D , BASH B , GUHA S , et al . Covert communications when the warden does not know the background noise power [J ] . IEEE Communications Letters , 2015 , 20 ( 2 ): 236 - 239 .
LEE S , BAXLEY R J , WEITNAUER M A , et al . Achieving undetectable communication [J ] . IEEE Journal of Selected Topics in Signal Processing , 2015 , 9 ( 7 ): 1195 - 1205 .
HE B , YAN S , ZHOU X , et al . On covert communication with noise uncertainty [J ] . IEEE Communications Letters , 2017 , 21 ( 4 ): 941 - 944 .
ZHENG T X , WANG H M , NG D W K , et al . Multi-antenna covert communications in random wireless networks [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 3 ): 1974 - 1987 .
TANDRA R , SAHAI A . SNR walls for signal detection [J ] . IEEE Journal of selected topics in Signal Processing , 2008 , 2 ( 1 ): 4 - 17 .
SOBERS T V , BASH B A , GUHA S , et al . Covert communication in the presence of an uninformed jammer [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 9 ): 6193 - 6206 .
LU X B , YANG W W , CAI Y M , et al . Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems [J ] . IEEE Access , 2019 ,DOI:10.1109/ACCESS.2019.2948078.
HU J , YAN S , ZHOU X , et al . Covert communication achieved by a greedy relay in wireless networks [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 7 ): 4766 - 4779 .
SHEIKHOLESLAMI A , GHADERI M , TOWSLEY D , et al . Multi-hop routing in covert wireless networks [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 6 ): 3656 - 3669 .
WANG J , TANG W , ZHU Q , et al . Covert communication with the help of relay and channel uncertainty [J ] . IEEE Wireless Communications Letters , 2018 , 8 ( 1 ): 317 - 320 .
ZHOU X , YAN S , HU J , et al . Joint optimization of a UAV’s trajectory and transmit power for covert communications [J ] . IEEE Transactions on Signal Processing , 2019 , 67 ( 16 ): 4276 - 4290 .
0
浏览量
635
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构