Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer (Jammer) tries to attract a multi-antenna adversary (Willie) and degrade the adversary's reception ability for the signal from a transmitter (Alice). For this strategy, we formulate an optimization problem to maximize the covert rate when three different types of channel state information (CSI) are available. The total power is optimally allocated between Alice and Jammer subject to Kullback-Leibler (KL) divergence constraint. Different from the existing literature, in our proposed strategy, we also determine the optimal transmission power at the jammer when Alice is silent, while existing works always assume that the jammer's power is fixed...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
With the rapid development of wireless communications, security becomes extremely important. In man...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequ...
Covert communication can hide the information transmission process from the warden to prevent advers...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast...
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial...
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmi...
In cooperative communication, a source communicates with a destination over indirect links through r...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
With the rapid development of wireless communications, security becomes extremely important. In man...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequ...
Covert communication can hide the information transmission process from the warden to prevent advers...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast...
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial...
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmi...
In cooperative communication, a source communicates with a destination over indirect links through r...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
With the rapid development of wireless communications, security becomes extremely important. In man...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...