Covert communications: A comprehensive survey
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …
secure techniques, covert communication emerges as a potential solution to security for …
Low probability of detection communication: Opportunities and challenges
LPD communication has recently emerged as a new transmission technology to address
privacy and security in wireless networks. Recent studies have established the fundamental …
privacy and security in wireless networks. Recent studies have established the fundamental …
Covert communication in the presence of an uninformed jammer
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …
recipient Bob without detection by warden Willie, with additive white Gaussian noise …
Achieving covert wireless communications using a full-duplex receiver
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
Covert communication over noisy channels: A resolvability perspective
MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
Delay-intolerant covert communications with either fixed or random transmit power
In this paper, we study delay-intolerant covert communications in additive white Gaussian
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Wireless covert communications aided by distributed cooperative jamming over slow fading channels
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …
receiver against a watchful warden over slow fading channels. There coexist multiple …
Multi-antenna covert communications in random wireless networks
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …
located wardens and interferers, considering both centralized and distributed antenna …
Covert communication achieved by a greedy relay in wireless networks
Covert wireless communication aims to hide the very existence of wireless transmissions in
order to guarantee a strong security in wireless networks. In this paper, we examine the …
order to guarantee a strong security in wireless networks. In this paper, we examine the …