Advanced Search
Volume 44 Issue 3
Mar.  2022
Turn off MathJax
Article Contents
HU Jinsong, WU Linmei, SHU Feng, CHEN Youjia, ZHENG Haifeng. UAV-relay Assisted Covert Communication with Finite Block-length[J]. Journal of Electronics & Information Technology, 2022, 44(3): 1006-1013. doi: 10.11999/JEIT211372
Citation: HU Jinsong, WU Linmei, SHU Feng, CHEN Youjia, ZHENG Haifeng. UAV-relay Assisted Covert Communication with Finite Block-length[J]. Journal of Electronics & Information Technology, 2022, 44(3): 1006-1013. doi: 10.11999/JEIT211372

UAV-relay Assisted Covert Communication with Finite Block-length

doi: 10.11999/JEIT211372
Funds:  The National Natural Science Foundation of China (62001116, 62071234, 61971139, 61771244)
  • Received Date: 2021-11-30
  • Accepted Date: 2022-02-21
  • Rev Recd Date: 2022-02-19
  • Available Online: 2022-03-01
  • Publish Date: 2022-03-28
  • To avoid the high detection in long-distance covert communications due to the large transmission power, an Unmanned Aerial Vehicle (UAV)-relay based covert communication scheme with finite block block-length is proposed in this paper. Firstly, the Signal-to -Noise-Ratio (SNR) at the legal receiver via the UAV-relay is derived, based on which the outage probability and throughput of the covert communication link are also obtained. Secondly, the detection performance of the monitor is analyzed, i.e. KL (Kullback-Leibler) scatter, and it is used as a constraint on the covert communication. Finally, to maximize the throughput of the covert communication, the transmission power at the transmitter and the UAV-relay, as well as the flight height of UAV are jointly optimized. The simulation results verify the performance of the proposed covert communication scheme, and also show its superiority to the traditional strategies without UAVs since it greatly reduces the KL divergence at the warder.
  • loading
  • [1]
    YAN Shihao, ZHOU Xiangyun, HU Jinsong, et al. Low probability of detection communication: Opportunities and challenges[J]. IEEE Wireless Communications, 2019, 26(5): 19–25. doi: 10.1109/MWC.001.1900057
    [2]
    GOECKEL D, BASH B, GUHA S, et al. Covert communications when the warden does not know the background noise power[J]. IEEE Communications Letters, 2016, 20(2): 236–239. doi: 10.1109/LCOMM.2015.2507594
    [3]
    ZHENG Tongxing, Wang Huiming, NG D W K, et al. Multi-antenna covert communications in random wireless networks[J]. IEEE Transactions on Wireless Communications, 2019, 18(3): 1974–1987. doi: 10.1109/TWC.2019.2900915
    [4]
    SHAHZAD K, ZHOU Xiangyun, and YAN Shihao. Covert wireless communication in presence of a multi-antenna adversary and delay constraints[J]. IEEE Transactions on Vehicular Technology, 2019, 68(12): 12432–12436. doi: 10.1109/TVT.2019.2948608
    [5]
    CHEN Xinying, SUN Wen, XING Chengwen, et al. Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations[J]. IEEE Transactions on Wireless Communication, 2021, 20(8): 5467–5480. doi: 10.1109/TWC.2021.3068096
    [6]
    HU Jinsong, YAN Shihao, ZHOU Xiangyun, et al. Covert communication achieved by a greedy relay in wireless networks[J]. IEEE Transactions on Wireless Communications, 2018, 17(7): 4766–4779. doi: 10.1109/TWC.2018.2831217
    [7]
    SHEIKHOLESLAMI A, GHADERI M, TOWSLEY D, et al. Multi-hop routing in covert wireless networks[J]. IEEE Transactions on Wireless Communications, 2018, 17(6): 3656–3669. doi: 10.1109/TWC.2018.2812881
    [8]
    JIANG Xu, CHEN Xinying, TANG Jie, et al. Covert communication in UAV-assisted air-ground networks[J]. IEEE Wireless Communications, 2021, 28(4): 190–197. doi: 10.1109/MWC.001.2000454
    [9]
    ZHOU Xiaobo, YAN Shihao, HU Jinsong, et al. Joint optimization of a UAV's trajectory and transmit power for covert communications[J]. IEEE Transactions on Signal Processing, 2019, 67(16): 4276–4290. doi: 10.1109/TSP.2019.2928949
    [10]
    JIANG Xu, YANG Zhutian, ZHAO Nan, et al. Resource allocation and trajectory optimization for UAV-enabled multi-user covert communications[J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1989–1994. doi: 10.1109/TVT.2021.3053936
    [11]
    CHEN Xinying, CHANG Zheng, TANG Jie, et al. UAV-aided multi-antenna covert communication against multiple wardens[C]. The 2021 IEEE International Conference on Communications, Montreal, Canada, 2021: 1–6.
    [12]
    CHEN Xinying, ZHANG Ning, TANG Jie, et al. UAV-aided covert communication with a multi-antenna jammer[J]. IEEE Transactions on Vehicular Technology, 2021, 70(11): 11619–11631. doi: 10.1109/TVT.2021.3112121
    [13]
    ZHOU Yi, YEOH P L, CHEN He, et al. Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location[J]. IEEE Transactions on Vehicular Technology, 2018, 67(11): 11280–11284. doi: 10.1109/TVT.2018.2868944
    [14]
    ALZENAD M, EL-KEYI A, and YANIKOMEROGLU H. 3-D placement of an unmanned aerial vehicle base station for maximum coverage of users with different QoS requirements[J]. IEEE Wireless Communications Letters, 2018, 7(1): 38–41. doi: 10.1109/LWC.2017.2752161
    [15]
    AL-HOURANI A, KANDEEPAN S, and LARDNER S. Optimal LAP altitude for maximum coverage[J]. IEEE Wireless Communications Letters, 2014, 3(6): 569–572. doi: 10.1109/LWC.2014.2342736
    [16]
    KRIKIDIS I, THOMPSON J, MCLAUGHLIN S, et al. Amplify-and-forward with partial relay selection[J]. IEEE Communications Letters, 2008, 12(4): 235–237. doi: 10.1109/LCOMM.2008.071987
    [17]
    SHU Feng, XU Tingzhen, HU Jinsong, et al. Delay-constrained covert communications with a full-duplex receiver[J]. IEEE Wireless Communications Letters, 2019, 8(3): 813–816. doi: 10.1109/LWC.2019.2894617
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(1)

    Article Metrics

    Article views (1300) PDF downloads(176) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return