Uninformed jammers are used to facilitate covert communications between a transmitter and an intended receiver under the surveillance of a warden. In reality, the signals the uniformed jammer emits to make the warden’s decision uncertain have inadvertently interfered with the detection of the intended receiver. In this paper, we apply truncated channel inversion power control (TCIPC) to both the transmitter and the uninformed jammer. The TCIPC scheme used on the uninformed jammer may help the intended receiver remove jamming signals using the successive interference cancellation (SIC) technique. Under the assumption that the warden knows the channel coefficient between two intended transceivers and achieves the optimal detection power thresho...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer...
We explore the influence of cooperative jamming on covert communication for integrated satellite–ter...
Covert communication can hide the information transmission process from the warden to prevent advers...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Abstract Covert communications hide the very existence of wireless transmissions and thus can addres...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial...
© 2018 IEEE. We consider a multi-link interference network that is tapped by an external eavesdroppe...
This work tackles the joint optimization of the modulation order L and transmit power P of pulse-pos...
In this letter, we consider physical layer security in multiple-input single-output (MISO) fading wi...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
In this paper, we address the problem of countering the control channel jamming in wireless communic...
peer reviewedThis paper studies secrecy rate optimization in a wireless network with a single-antenn...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer...
We explore the influence of cooperative jamming on covert communication for integrated satellite–ter...
Covert communication can hide the information transmission process from the warden to prevent advers...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Abstract Covert communications hide the very existence of wireless transmissions and thus can addres...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial...
© 2018 IEEE. We consider a multi-link interference network that is tapped by an external eavesdroppe...
This work tackles the joint optimization of the modulation order L and transmit power P of pulse-pos...
In this letter, we consider physical layer security in multiple-input single-output (MISO) fading wi...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
In this paper, we address the problem of countering the control channel jamming in wireless communic...
peer reviewedThis paper studies secrecy rate optimization in a wireless network with a single-antenn...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer...
We explore the influence of cooperative jamming on covert communication for integrated satellite–ter...