A4 Article in conference proceedings
Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden (2021)


Chen, X., Chang, Z., Zhao, N., Chen, Y., Yu, F. R., & Hämäläinen, T. (2021). Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden. In Proceedings of the IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE. IEEE Vehicular Technology Conference. https://doi.org/10.1109/VTC2021-Spring51267.2021.9448800


JYU authors or editors


Publication details

All authors or editorsChen, Xinying; Chang, Zheng; Zhao, Nan; Chen, Yunfei; Yu, F. Richard; Hämäläinen, Timo

Parent publicationProceedings of the IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)

Place and date of conferenceVirtual Event25.-28.4.2021

eISBN978-1-7281-8964-2

Journal or seriesIEEE Vehicular Technology Conference

ISSN1090-3038

eISSN2577-2465

Publication year2021

PublisherIEEE

Publication countryUnited States

Publication languageEnglish

DOIhttps://doi.org/10.1109/VTC2021-Spring51267.2021.9448800

Publication open accessNot open

Publication channel open access


Abstract

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This problem is solved in two stages. Under this worst situation, we first maximize the connection probability over the transmit-to-jamming power ratio within the maximum allowed COP for a fixed transmission rate. Then, the Newton's method is applied to maximize the connection throughput via optimizing the transmission rate iteratively. Simulation results are presented to evaluate the effectiveness of the proposed scheme.


Keywordswireless communicationwireless data transmissioncyber security


Contributing organizations


Ministry reportingYes

Reporting Year2021

JUFO rating1


Last updated on 2024-03-04 at 19:56