A4 Article in conference proceedings
Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden (2021)
Chen, X., Chang, Z., Zhao, N., Chen, Y., Yu, F. R., & Hämäläinen, T. (2021). Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden. In Proceedings of the IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE. IEEE Vehicular Technology Conference. https://doi.org/10.1109/VTC2021-Spring51267.2021.9448800
JYU authors or editors
Publication details
All authors or editors: Chen, Xinying; Chang, Zheng; Zhao, Nan; Chen, Yunfei; Yu, F. Richard; Hämäläinen, Timo
Parent publication: Proceedings of the IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)
Place and date of conference: Virtual Event, 25.-28.4.2021
eISBN: 978-1-7281-8964-2
Journal or series: IEEE Vehicular Technology Conference
ISSN: 1090-3038
eISSN: 2577-2465
Publication year: 2021
Publisher: IEEE
Publication country: United States
Publication language: English
DOI: https://doi.org/10.1109/VTC2021-Spring51267.2021.9448800
Publication open access: Not open
Publication channel open access:
Abstract
Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This problem is solved in two stages. Under this worst situation, we first maximize the connection probability over the transmit-to-jamming power ratio within the maximum allowed COP for a fixed transmission rate. Then, the Newton's method is applied to maximize the connection throughput via optimizing the transmission rate iteratively. Simulation results are presented to evaluate the effectiveness of the proposed scheme.
Keywords: wireless communication; wireless data transmission; cyber security
Contributing organizations
Ministry reporting: Yes
Reporting Year: 2021
JUFO rating: 1