In this work, we consider a covert communication scenario, where a transmitter Alice communicates to a receiver Bob with the aid of a probabilistic and uninformed jammer against an adversary warden's detection. The transmission status and power of the jammer are random and follow some priori probabilities. We first analyze the warden's detection performance as a function of the jammer's transmission probability, transmit power distribution, and Alice's transmit power. We then maximize the covert throughput from Alice to Bob subject to a covertness constraint, by designing the covert communication strategies from three different perspectives: Alice's perspective, the jammer's perspective, and the global perspective. Our analysis reveals that...
This dissertation investigates covert communication in dynamic wireless communication environments. ...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Covert communication can hide the information transmission process from the warden to prevent advers...
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Uninformed jammers are used to facilitate covert communications between a transmitter and an intende...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while g...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequ...
This dissertation studies covert wireless communications where a transmitter (Alice) intends to tran...
A covert communication system under block fading channels is considered, where users experience unc...
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the...
This dissertation investigates covert communication in dynamic wireless communication environments. ...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Covert communication can hide the information transmission process from the warden to prevent advers...
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Uninformed jammers are used to facilitate covert communications between a transmitter and an intende...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while g...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequ...
This dissertation studies covert wireless communications where a transmitter (Alice) intends to tran...
A covert communication system under block fading channels is considered, where users experience unc...
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the...
This dissertation investigates covert communication in dynamic wireless communication environments. ...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...