Throughput Scaling of Covert Communication Over Wireless Adhoc Networks

Cited 10 time in webofscience Cited 4 time in scopus
  • Hit : 286
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorCho, Kang-Heeko
dc.contributor.authorLee, Si-Hyeonko
dc.contributor.authorTan, Vincent Y. F.ko
dc.date.accessioned2020-12-03T08:30:03Z-
dc.date.available2020-12-03T08:30:03Z-
dc.date.created2020-11-25-
dc.date.created2020-11-25-
dc.date.issued2020-12-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION THEORY, v.66, no.12, pp.7684 - 7701-
dc.identifier.issn0018-9448-
dc.identifier.urihttp://hdl.handle.net/10203/278019-
dc.description.abstractWe consider the problem of covert communication over wireless adhoc networks in which (roughly) n legitimate nodes (LNs) and nκ for κ>0 non-communicating warden nodes (WNs) are randomly distributed in a square of unit area. Each legitimate source wants to communicate with its intended destination node while ensuring that every WN is unable to detect the presence of the communication. In this scenario, we study the throughput scaling law. Due to the covert communication constraint, the transmit powers are necessarily limited. Under this condition, we introduce a preservation region around each WN. This region serves to prevent transmission from the LNs and to increase the transmit power of the LNs outside the preservation regions. For the achievability results, multi-hop (MH), hierarchical cooperation (HC), and hybrid HC-MH schemes are utilized with some appropriate modifications. In the proposed MH and hybrid schemes, because the preservation regions may impede communication along direct data paths, the data paths are suitably modified by taking a detour around each preservation region. To avoid the concentration of detours resulting extra relaying burdens, we distribute the detours evenly over a wide region. In the proposed HC scheme, we control the symbol power and the scheduling of distributed multiple-input multiple-output transmission. We also present upper bounds on the throughput scaling under the assumption that every active LN consumes the same average transmit power over the time period in which the WNs observe the channel outputs. For 0<κ<1 , these upper bounds match with the achievable throughput scalings.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleThroughput Scaling of Covert Communication Over Wireless Adhoc Networks-
dc.typeArticle-
dc.identifier.wosid000594905600025-
dc.identifier.scopusid2-s2.0-85097407048-
dc.type.rimsART-
dc.citation.volume66-
dc.citation.issue12-
dc.citation.beginningpage7684-
dc.citation.endingpage7701-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION THEORY-
dc.identifier.doi10.1109/TIT.2020.3011895-
dc.contributor.localauthorLee, Si-Hyeon-
dc.contributor.nonIdAuthorTan, Vincent Y. F.-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCovert communication-
dc.subject.keywordAuthorlow probability of detection-
dc.subject.keywordAuthorwireless adhoc networks-
dc.subject.keywordAuthorcapacity scaling law-
dc.subject.keywordPlusCAPACITY-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 10 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0