浏览全部资源
扫码关注微信
1. 国防科技大学电子科学学院,湖南 长沙 410073
2. 北京交通大学轨道交通控制与安全国家重点实验室,北京 100044
3. 国防科技大学信息通信学院,湖北 武汉 430019
4. 北京宇航系统工程研究所,北京 100076
[ "陈炜宇(1996- ),男,福建龙岩人,国防科技大学博士生,主要研究方向为无线隐蔽通信、无源寄生通信" ]
[ "骆俊杉(1992- ),男,重庆人,博士,国防科技大学讲师,主要研究方向为空间调制、信息安全" ]
[ "王方刚(1982- ),男,黑龙江哈尔滨人,博士,北京交通大学教授,主要研究方向为无线通信、信号处理和信息论" ]
[ "丁海洋(1980- ),男,北京人,博士,国防科技大学教授,主要研究方向为无线通信系统设计与性能分析、智能超材料、无线携能通信" ]
[ "王世练(1976- ),男,江苏徐州人,博士,国防科技大学教授,主要研究方向为抗干扰安全通信与通信对抗、武器协同数据链" ]
[ "夏国江(1981- ),男,江苏无锡人,博士,北京宇航系统工程研究所高级工程师,主要研究方向为无线测控与通信技术" ]
网络出版日期:2022-08,
纸质出版日期:2022-08-25
移动端阅览
陈炜宇, 骆俊杉, 王方刚, 等. 无线隐蔽通信容量限与实现技术综述[J]. 通信学报, 2022,43(8):203-218.
Weiyu CHEN, Junshan LUO, Fanggang WANG, et al. Survey of capacity limits and implementation techniques in wireless covert communication[J]. Journal on communications, 2022, 43(8): 203-218.
陈炜宇, 骆俊杉, 王方刚, 等. 无线隐蔽通信容量限与实现技术综述[J]. 通信学报, 2022,43(8):203-218. DOI: 10.11959/j.issn.1000-436x.2022153.
Weiyu CHEN, Junshan LUO, Fanggang WANG, et al. Survey of capacity limits and implementation techniques in wireless covert communication[J]. Journal on communications, 2022, 43(8): 203-218. DOI: 10.11959/j.issn.1000-436x.2022153.
梳理无线隐蔽通信与相关概念的区别和联系,聚焦基于假设检验理论和信息论的无线隐蔽通信研究,介绍了基本研究模型与具体模型分类,分容量限和实现技术两部分对现有工作进行综述。前者依据极限速率的量级,将极限速率揭示工作分均方根速率和非零正速率两类进行综述;后者依据应用场景的不同,对无线隐蔽通信系统性能分析与实现方案优化工作进行分类和综述。最后,探讨了具有高价值的潜在研究方向。
The differences and connections between wireless covert communication (WCC) and related concepts were clarified.The WCC research based on hypothesis testing theory and information theory was focused.The basic research model and the categories of specific models were introduced.The existing works were classified and reviewed in two parts
namely
capacity limits and implementation techniques.The former part reviewed the works that reveal the limit rate
and divided them into two categories as per the order of the limit rate: squared root rate and positive rate.The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes
and classified them as per their application scenarios.Finally
potential research directions were discussed.
王安 , 葛婧 , 商宁 , 等 . 侧信道分析实用案例概述 [J ] . 密码学报 , 2018 , 5 ( 4 ): 383 - 398 .
WANG A , GE J , SHANG N , et al . Practical cases of side-channel analysis [J ] . Journal of Cryptologic Research , 2018 , 5 ( 4 ): 383 - 398 .
LIU Y L , CHEN H H , WANG L M . Physical layer security for next generation wireless networks:theories,technologies,and challenges [J ] . IEEE Communications Surveys & Tutorials , 2017 , 19 ( 1 ): 347 - 376 .
BASH B A , GOECKEL D , TOWSLEY D , et al . Hiding information in noise:fundamental limits of covert wireless communication [J ] . IEEE Communications Magazine , 2015 , 53 ( 12 ): 26 - 31 .
ZANDER S , ARMITAGE G , BRANCH P . A survey of covert channels and countermeasures in computer network protocols [J ] . IEEE Communications Surveys & Tutorials , 2007 , 9 ( 3 ): 44 - 57 .
DILLARD R A . Detectability of spread-spectrum signals [J ] . IEEE Transactions on Aerospace and Electronic Systems , 1979 , AES-15 ( 4 ): 526 - 537 .
牟青 . 直接序列扩频信号的截获分析研究 [D ] . 成都:电子科技大学 , 2010 .
MOU Q . A study on interception and analysis of direct-sequence spread-spectrum signals [D ] . Chengdu:University of Electronic Science and Technology of China , 2010 .
HEIDARI-BATENI G , MCGILLEM C D . Chaotic sequences for spread spectrum:an alternative to PN-sequences [C ] // Proceedings of IEEE International Conference on Selected Topics in Wireless Communications . Piscataway:IEEE Press , 1992 : 437 - 440 .
HEIDARI-BATENI G , MCGILLEM C D . A chaotic direct-sequence spread-spectrum communication system [J ] . IEEE Transactions on Communications , 1994 , 42 ( 234 ): 1524 - 1527 .
SEDAGHATNEJAD S , FARHANG M . Detectability of chaotic direct-sequence spread-spectrum signals [J ] . IEEE Wireless Communications Letters , 2015 , 4 ( 6 ): 589 - 592 .
张晓彤 . 时宽和波形基联合捷变的LPD通信波形设计与性能分析 [D ] . 哈尔滨:哈尔滨工程大学 , 2020 .
ZHANG X T . Design and analysis of LPD communication waveforms based on joint-agility of time-width and waveform bases [D ] . Harbin:Harbin Engineering University , 2020 .
DIAMANT R , LAMPE L . Low probability of detection for underwater acoustic communication:a review [J ] . IEEE Access , 2018 , 6 : 19099 - 19112 .
BASH B A , GOECKEL D , TOWSLEY D . Limits of reliable communication with low probability of detection on AWGN channels [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 9 ): 1921 - 1930 .
赵华 , 林钰达 , 金梁 , 等 . 隐蔽无线通信综述 [J ] . 信息工程大学学报 , 2020 , 21 ( 5 ): 520 - 525 .
ZHAO H , LIN Y D , JIN L , et al . Covert wireless communication:a review [J ] . Journal of Information Engineering University , 2020 , 21 ( 5 ): 520 - 525 .
戴跃伟 , 刘光杰 , 曹鹏程 , 等 . 无线隐蔽通信研究综述 [J ] . 南京信息工程大学学报(自然科学版) , 2020 , 12 ( 1 ): 45 - 56 .
DAI Y W , LIU G J , CAO P C , et al . A survey of wireless covert communications [J ] . Journal of Nanjing University of Information Science and Technology (Natural Science Edition) , 2020 , 12 ( 1 ): 45 - 56 .
MAKHDOOM I , ABOLHASAN M , LIPMAN J . A comprehensive survey of covert communication techniques,limitations and future challenges [J ] . Computers & Security , 2022 ,120:102784.
LEHMANN E L , ROMANO J P . Testing statistical hypotheses [M ] . Berlin : Springer , 2005 .
YAN S H , CONG Y R , HANLY S V , et al . Gaussian signalling for covert communications [J ] . IEEE Transactions on Wireless Commun ications , 2019 , 18 ( 7 ): 3542 - 3553 .
LI K , SOBERS T V , TOWSLEY D , et al . Covert communication in continuous-time systems in the presence of a jammer [J ] . IEEE Transactions on Wireless Communications , 2022 , 21 ( 7 ): 4883 - 4897 .
CHEN W Y , DING H Y , WANG S L , et al . On the limits of covert ambient backscatter communications [J ] . IEEE Wireless Communications Letters , 2022 , 11 ( 2 ): 308 - 312 .
CORMEN T H , LEISERSON C E , RIVEST R L , et al . Introduction to algorithms [M ] . Massachusetts : MIT Press , 2007 .
ABDELAZIZ A , KOKSAL C E . Fundamental limits of covert communication over MIMO AWGN channel [C ] // Proceedings of IEEE Conference on Communications and Network Security . Piscataway:IEEE Press , 2017 : 1 - 9 .
CHE P H , BAKSHI M , JAGGI S . Reliable deniable communication:hiding messages in noise [C ] // Proceedings of 2013 IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2013 : 2945 - 2949 .
BLOCH M R . Covert communication over noisy channels:a resolvability perspective [J ] . IEEE Transactions on Information Theory , 2016 , 62 ( 5 ): 2334 - 2354 .
WANG L G , WORNELL G W , ZHENG L Z . Fundamental limits of communication with low probability of detection [J ] . IEEE Transactions on Information Theory , 2016 , 62 ( 6 ): 3493 - 3503 .
TAHMASBI M , SAVARD A , BLOCH M R . Covert capacity of non-coherent Rayleigh-fading channels [J ] . IEEE Transactions on Information Theory , 2020 , 66 ( 4 ): 1979 - 2005 .
TAHMASBI M , BLOCH M R . Covert secret key generation [C ] // Proceedings of 2017 IEEE Conference on Communications and Network Security . Piscataway:IEEE Press , 2017 : 540 - 544 .
TAHMASBI M , BLOCH M R . First- and second-order asymptotics in covert communication [J ] . IEEE Transactions on Information Theory , 2019 , 65 ( 4 ): 2190 - 2212 .
BLOCH M R , GUHA S . Optimal covert communications using pulse-position modulation [C ] // Proceedings of IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2017 : 2825 - 2829 .
KADAMPOT I A , TAHMASBI M , BLOCH M R . Multilevel-coded pulse-position modulation for covert communications over binary-input discrete memoryless channels [J ] . IEEE Transactions on Information Theory , 2020 , 66 ( 10 ): 6001 - 6023 .
KADAMPOT I A , TAHMASBI M , BLOCH M R . Codes for covert communication over additive white Gaussian noise channels [C ] // Proceedings of IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2019 : 977 - 981 .
ARUMUGAM K S K , BLOCH M R . Covert communication over a k-user multiple-access channel [J ] . IEEE Transactions on Information Theory , 2019 , 65 ( 11 ): 7020 - 7044 .
TAN V Y F , LEE S H . Time-division is optimal for covert communication over some broadcast channels [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 5 ): 1377 - 1389 .
CHO K H , LEE S H . Treating interference as noise is optimal for covert communication over interference channels [C ] // Proceedings of 2020 IEEE International Symposium on Information Theory (ISIT) . Piscataway:IEEE Press , 2020 : 816 - 821 .
HE B , YAN S H , ZHOU X Y , et al . On covert communication with noise uncertainty [J ] . IEEE Communications Letters , 2017 , 21 ( 4 ): 941 - 944 .
SOBERS T V , BASH B A , GUHA S , et al . Covert communication in the presence of an uninformed jammer [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 9 ): 6193 - 6206 .
SOLTANI R , GOECKEL D , TOWSLEY D , et al . Covert wireless communication with artificial noise generation [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 11 ): 7252 - 7267 .
LEE S H , WANG L G , KHISTI A , et al . Covert communication with channel-state information at the transmitter [J ] . IEEE Transactions on Information Forensics and Security , 2018 , 13 ( 9 ): 2310 - 2319 .
BASH B A , GOECKEL D , TOWSLEY D . Covert communication gains from adversary’s ignorance of transmission time [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 12 ): 8394 - 8405 .
BENDARY A , ABDELAZIZ A , KOKSAL C E . Achieving positive covert capacity over MIMO AWGN channels [J ] . IEEE Journal on Selected Areas in Information Theory , 2021 , 2 ( 1 ): 149 - 162 .
YAN S H , HE B , ZHOU X Y , et al . Delay-intolerant covert communications with either fixed or random transmit power [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 1 ): 129 - 140 .
SHAHZAD K , ZHOU X Y . Covert wireless communications under quasi-static fading with channel uncertainty [J ] . IEEE Transactions on Information Forensics and Security , 2021 , 16 : 1104 - 1116 .
YU X C , LUO Y , CHEN W . Covert communication with beamforming over MISO channels in the finite blocklength regime [J ] . Science China Information Sciences , 2021 , 64 ( 9 ): 183 - 197 .
林钰达 , 金梁 , 周游 , 等 . 噪声不确定时基于波束成形的隐蔽无线通信性能分析 [J ] . 通信学报 , 2020 , 41 ( 7 ): 49 - 58 .
LIN Y D , JIN L , ZHOU Y , et al . Performance analysis of covert wireless communication based on beam forming with noise uncertainty [J ] . Journal on Communications , 2020 , 41 ( 7 ): 49 - 58 .
林钰达 , 金梁 , 黄开枝 , 等 . 基于3D波束成形的隐蔽无线通信威胁区域构建 [J ] . 中国科学:信息科学 , 2021 , 51 ( 8 ): 1360 - 1374 .
LIN Y D , JIN L , HUANG K Z , et al . Threat region development of covert wireless communication based on 3D beamforming [J ] . Scientia Sinica (Informationis) , 2021 , 51 ( 8 ): 1360 - 1374 .
SHAHZAD K , ZHOU X Y , YAN S H . Covert wireless communication in presence of a multi-antenna adversary and delay constraints [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 12 ): 12432 - 12436 .
EVERETT E , SAHAI A , SABHARWAL A . Passive self-interference suppression for full-duplex infrastructure nodes [J ] . IEEE Transactions on Wireless Communications , 2014 , 13 ( 2 ): 680 - 694 .
SHAHZAD K , ZHOU X Y , YAN S H , et al . Achieving covert wireless communications using a full-duplex receiver [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 12 ): 8517 - 8530 .
SHU F , XU T Z , HU J S , et al . Delay-constrained covert communications with a full-duplex receiver [J ] . IEEE Wireless Communications Letters , 2019 , 8 ( 3 ): 813 - 816 .
HE B , YAN S H , ZHOU X Y , et al . Covert wireless communication with a Poisson field of interferers [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 9 ): 6005 - 6017 .
ZHENG T X , WANG H M , NG D W K , et al . Multi-antenna covert communications in random wireless networks [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 3 ): 1974 - 1987 .
LIU Z H , LIU J J , ZENG Y , et al . Covert wireless communication in IoT network:from AWGN channel to THz band [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 4 ): 3378 - 3388 .
JIANG Y E , WANG L M , CHEN H H . Covert communications in D2D underlaying cellular networks with antenna array assisted artificial noise transmission [J ] . IEEE Transactions on Vehicular Technology , 2020 , 69 ( 3 ): 2980 - 2992 .
李赞 , 廖晓闽 , 石嘉 , 等 . 面向认知物联网的隐蔽通信智能功率控制 [J ] . 物联网学报 , 2020 , 4 ( 1 ): 52 - 58 .
LI Z , LIAO X M , SHI J , et al . Intelligent power control for covert communication in cognitive Internet of things [J ] . Chinese Journal on Internet of Things , 2020 , 4 ( 1 ): 52 - 58 .
JIANG X , CHEN X Y , TANG J , et al . Covert communication in UAV-assisted air-ground networks [J ] . IEEE Wireless Communications , 2021 , 28 ( 4 ): 190 - 197 .
ZHOU X B , YAN S H , HU J S , et al . Joint optimization of a UAV’s trajectory and transmit power for covert communications [J ] . IEEE Transactions on Signal Processing , 2019 , 67 ( 16 ): 4276 - 4290 .
YAN S H , HANLY S V , COLLINGS I B . Optimal transmit power and flying location for UAV covert wireless communications [J ] . IEEE Journal on Selected Areas in Communications , 2021 , 39 ( 11 ): 3321 - 3333 .
HU J S , WU Y P , CHEN R Q , et al . Optimal detection of UAV’s transmission with beam sweeping in covert wireless networks [J ] . IEEE Transactions on Vehicular Technology , 2020 , 69 ( 1 ): 1080 - 1085 .
ZHOU X B , YAN S H , SHU F , et al . UAV-enabled covert wireless data collection [J ] . IEEE Journal on Selected Areas in Communications , 2021 , 39 ( 11 ): 3348 - 3362 .
CHEN X Y , SHENG M , ZHAO N , et al . UAV-relayed covert communication towards a flying warden [J ] . IEEE Transactions on Communications , 2021 , 69 ( 11 ): 7659 - 7672 .
SHEIKHOLESLAMI A , GHADERI M , TOWSLEY D , et al . Multi-hop routing in covert wireless networks [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 6 ): 3656 - 3669 .
WANG H M , ZHANG Y , ZHANG X , et al . Secrecy and covert communications against UAV surveillance via multi-hop networks [J ] . IEEE Transactions on Communications , 2020 , 68 ( 1 ): 389 - 401 .
RENZO D M , ZAPPONE A , DEBBAH M , et al . Smart radio environments empowered by reconfigurable intelligent surfaces:how it works,state of research,and the road ahead [J ] . IEEE Journal on Selected Areas in Communications , 2020 , 38 ( 11 ): 2450 - 2525 .
卢汉成 , 王亚正 , 赵丹 , 等 . 智能反射表面辅助的无线通信系统的物理层安全综述 [J ] . 通信学报 , 2022 , 43 ( 2 ): 171 - 184 .
LU H C , WANG Y Z , ZHAO D , et al . Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems [J ] . Journal on Communications , 2022 , 43 ( 2 ): 171 - 184 .
LU X , HOSSAIN E , SHAFIQUE T , et al . Intelligent reflecting surface enabled covert communications in wireless networks [J ] . IEEE Network , 2020 , 34 ( 5 ): 148 - 155 .
WU C Y , YAN S H , ZHOU X B , et al . Intelligent reflecting surface (IRS)-aided covert communication with warden’s statistical CSI [J ] . IEEE Wireless Communications Letters , 2021 , 10 ( 7 ): 1449 - 1453 .
KONG J , DAGEFUS F T , CHOI J , et al . Intelligent reflecting surface assisted covert communication with transmission probability optimization [J ] . IEEE Wireless Communications Letters , 2021 , 10 ( 8 ): 1825 - 1829 .
ZHOU X B , YAN S H , WU Q Q , et al . Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint [J ] . IEEE Transactions on Wireless Communications , 2022 , 21 ( 1 ): 532 - 547 .
SI J B , LI Z , ZHAO Y , et al . Covert transmission assisted by intelligent reflecting surface [J ] . IEEE Transactions on Communications , 2021 , 69 ( 8 ): 5394 - 5408 .
WANG C , LI Z , SHI J , et al . Intelligent reflecting surface-assisted multi-antenna covert communications:joint active and passive beamforming optimization [J ] . IEEE Transactions on Communications , 2021 , 69 ( 6 ): 3984 - 4000 .
CHEN X , ZHENG T X , DONG L M , et al . Enhancing MIMO covert communications via intelligent reflecting surface [J ] . IEEE Wireless Communications Letters , 2022 , 11 ( 1 ): 33 - 37 .
ZHENG M F , HAMILTON A , LING C . Covert communications with a full-duplex receiver in non-coherent Rayleigh fading [J ] . IEEE Transactions on Communications , 2021 , 69 ( 3 ): 1882 - 1895 .
AGHDAM S R , DUMAN T M . Joint precoder and artificial noise design for MIMO wiretap channels with finite-alphabet inputs based on the cut-off rate [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 6 ): 3913 - 3923 .
KANG X , LIANG Y C , YANG J . Riding on the primary:a new spectrum sharing paradigm for wireless-powered IoT devices [C ] // Proceedings of 2017 IEEE International Conference on Communications . Piscataway:IEEE Press , 2017 : 1 - 6 .
GUO S S , LV S H , ZHANG H X , et al . Reflecting modulation [J ] . IEEE Journal on Selected Areas in Communications , 2020 , 38 ( 11 ): 2548 - 2561 .
HU J S , YAN S H , ZHOU X Y , et al . Covert wireless communications with channel inversion power control in Rayleigh fading [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 12 ): 12135 - 12149 .
HU J S , YAN S H , ZHOU X B , et al . Covert communications without channel state information at receiver in IoT systems [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 11 ): 11103 - 11114 .
SUN L L , XU T Z , YAN S H , et al . On resource allocation in covert wireless communication with channel estimation [J ] . IEEE Transactions on Communications , 2020 , 68 ( 10 ): 6456 - 6469 .
李啸天 , 雷菁 , 刘伟 , 等 . 平坦慢衰落信道下基于HOS的PSK调制盲信道估计 [J ] . 通信学报 , 2015 , 36 ( 5 ): 144 - 151 .
LI X T , LEI J , LIU W , et al . High-order statistics based blind channel estimation for PSK modulation in flat and slow fading channels [J ] . Journal on Communications , 2015 , 36 ( 5 ): 144 - 151 .
HUANG K W , WANG H M , TOWSLEY D , et al . LPD communication:a sequential change-point detection perspective [J ] . IEEE Transactions on Communications , 2020 , 68 ( 4 ): 2474 - 2490 .
HUANG K W , WANG H M , POOR H V . On covert communication against sequential change-point detection [J ] . IEEE Transactions on Information Theory , 2021 , 67 ( 11 ): 7285 - 7303 .
0
浏览量
955
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构