Covert communications: A comprehensive survey

X Chen, J An, Z **ong, C **ng, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

Covert mmWave communications with finite blocklength against spatially random wardens

R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …

Multi-antenna covert communications in random wireless networks

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …

Aerial intelligent reflecting surface-enabled terahertz covert communications in beyond-5G Internet of Things

MT Mamaghani, Y Hong - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are envisioned to be extensively employed for assisting
wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz) …

Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation

H Navidan, PF Moshiri, M Nabati, R Shahbazian… - Computer Networks, 2021 - Elsevier
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute
an extensively-researched machine learning sub-field for the creation of synthetic data …

Performance analysis and optimization for jammer-aided multiantenna UAV covert communication

H Du, D Niyato, YA **e, Y Cheng… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their
high mobility and low cost in serving as temporary aerial base stations (BSs) and providing …

Intelligent reflecting surface enabled covert communications in wireless networks

X Lu, E Hossain, T Shafique, S Feng, H Jiang… - IEEE …, 2020 - ieeexplore.ieee.org
With growing security threats to the evolving wireless systems, protecting user privacy
becomes progressively challenging. Even if the transmitted information is encrypted and the …

Age of information for short-packet covert communication

W Yang, X Lu, S Yan, F Shu, Z Li - IEEE Wireless …, 2021 - ieeexplore.ieee.org
In this letter, we develop a new framework to jointly characterize covertness and timeliness
of short-packet communications, in which a new metric named covert age of information …