Mobility-Assisted Covert Communication Over Wireless Ad Hoc Networks

Cited 10 time in webofscience Cited 4 time in scopus
  • Hit : 752
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorIM, Hyeonseongko
dc.contributor.authorLee, Si-Hyeonko
dc.date.accessioned2021-03-11T05:50:06Z-
dc.date.available2021-03-11T05:50:06Z-
dc.date.created2021-03-11-
dc.date.created2021-03-11-
dc.date.created2021-03-11-
dc.date.created2021-03-11-
dc.date.issued2021-03-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.16, pp.1768 - 1781-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10203/281488-
dc.description.abstractWe study the effect of node mobility on the throughput scaling of the covert communication over a wireless adhoc network. It is assumed that n mobile nodes want to communicate each other in a unit disk while keeping the presence of the communication secret from each of Theta(ns) non-colluding wardens (s > 0). The wardens can be mobile or fixed. Our results show that the node mobility greatly improves the throughput scaling, compared to the case of fixed node location. In particular, for s <= 1, the aggregate throughput scaling, i.e., the maximally achievable throughput scaling of the total network when each source-destination pair communicates with the same rate, is shown to be arbitrarily close to linear in n when the number of channel uses l that each warden uses to judge the presence of communication is not too large compared to n. More specifically, the aggregate throughput scaling is arbitrarily close to linear when s <= 1 and l = O(n((alpha-2)(1-s))), where alpha >= 2 denotes the path loss exponent. For the achievability, we modify the two-hop based scheme by Grossglauser and Tse (2002), which was proposed for a wireless ad hoc network without a covertness constraint, by introducing a preservation region around each warden in which the senders are not allowed to transmit and by carefully analyzing the effect of covertness constraint on the transmit power and the resultant transmission rates. This scheme is shown to be optimal for 0 < s <= 1 under an assumption that each node outside preservation regions around wardens uses the same transmit power.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleMobility-Assisted Covert Communication Over Wireless Ad Hoc Networks-
dc.typeArticle-
dc.identifier.wosid000616307600004-
dc.identifier.scopusid2-s2.0-85098801287-
dc.type.rimsART-
dc.citation.volume16-
dc.citation.beginningpage1768-
dc.citation.endingpage1781-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.identifier.doi10.1109/TIFS.2020.3045132-
dc.contributor.localauthorLee, Si-Hyeon-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCovert communication-
dc.subject.keywordAuthorlow probability of detection-
dc.subject.keywordAuthorwireless adhoc network-
dc.subject.keywordAuthorthroughput scaling-
dc.subject.keywordAuthornode mobility-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 10 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0