Covert Transmission with Antenna Selection and Using an External Jammer

Document Type : Case Study

Authors

1 Morteza Sarkheil is with the Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran

2 Department of Electrical Engineering, Tarbiat Modares University

3 Moslem Forouzesh is with the Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran

4 Ali Kuhestani is with the Department of Electrical Engineering, Sharif University, Tehran, Iran

Abstract

This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination, an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the jammer transmits an artificial noise signal. For this system model, we consider a scenario where the source is forced to select one or several of its antennas to transmit its confidential information due to its limited RF chains. Furthermore, we consider two different jamming scenarios to support our covert communication: 1) The destination is unable to cancel the jamming signal; 2) The destination can subtract the jamming signal. For such a communication network, our aim is to maximize the covert rate subject to power constraint and covert communication requirement. In the first scenario, the optimization problem is non-convex, and hence, it can be solved through using Difference of Convex function (DC) method while the optimization problem of the second scenario is intrinsically convex.  Our numerical results show that the higher the number of selected antennas at the transmitter, the higher the covert rate will be achieved.

Keywords


[1] Y. Liang, H. V. Poor, and L. Ying, “Wireless broadcast networks: reliability, security, and stability,” Inf. Theory and App. Work. , USA, pp. 249-255, Feb. 2008.
[2] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,”   IEEE Commun. Surveys Tuts. , Vol. 16, no. 3, pp. 1550-1573, Feb. 2014.
[3] A. Kuhestani, A. Mohammadi and M. Mohammadi “ Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers,” IEEE Trans. Inf. Foren. Sec., vol. 13, no. 2, pp. 341-355, Feb. 2018.
[4] M. Tatar Mamaghani, A. Kuhestani and K.-K. Won “Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer,”   IEEE Trans. Veh. Tech., pp. 1-1, Jul. 2018.
[5] A. Kuhestani, A. Mohammadi and P. L. Yeoh, “Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer,” IEEE Trans. Commun. ,Vol. 66, no.6, pp. 2671-2684,  Jun. 2018 .                         
[6] A. Yener and S. Ulukus, “Wireless physical-layer security: Lessons learned from information theory,” Proc. IEEE, Vol. 103, no. 10, pp. 1814-1825, Oct. 2015.
[7] E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory ,Vol. 54, no. 6, pp. 2735-2751,  Jun. 2008 .
[8] R. Diamant and L. Lampe, “Low Probability of Detection for Underwater Acoustic Communication: A Review,” IEEE Access, Vol. 6, pp. 19099-19112, Mar. 2018.
[9] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,”   IEEE 85th Veh. Tech.Conf. (VTC Spring), Sydney, NSW, Australia, pp. 1-5, Nov. 2017.
[10] A. Abdelaziz and C. Emre Koksal, “Fundamental Limits of Covert Communication over MIMO AWGN Channel,” IEEE Conf. on Commun. and Net. Security (CNS), Las Vegas, NV, USA, pp. 1-9, Dec. 2017.
[11] M. Forouzesh, P. Azmi, N. Mokari, and K.-K. Wong,” Covert Communications Versus Physical Layer Security,” arXiv: 1803.06608.
[12] J. Zhang and M. C. Gursoy, “Collaborative relay beamforming for secure broadcasting,” IEEE Wireless Commun. and Net. Conf. (WCNC), Sydney, NSW, Australia, pp. 1-6, Apr. 2010.
[13] J. Hu, S. Yan, X. Zhou, F. and J. Wang, “Covert Communication in Wireless Relay Networks,” IEEE GLOBECOM 2017, Singapore, pp. 1-6, Jan. 2018.
[14] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication,” IEEE Commun. Magazine, Vol. 53, no. 12, pp. 26-31, Dec. 2015.
[15] P. E. Oguntunde, O.A.  Odetunmibi and A.O. Adejumo, “On the Sum of Exponentially Distributed Random Variables: A Convolution Approac”,’ European Journal of Statistics and Probability, Vol. 1, no. 2, pp. 1-8, Dec 2013.
[16] M. Forouzesh, P. Azmi, and A. Kuhestani, “Secure transmission with covert requirement in untrusted relaying networks”, arXiv: 1809.00312 [cs.CR], 2018.
[17] S. Boyd and L. Vandenberghe, “Convex Optimization”, Cambridge University Press, 2004.
[18] M. Moltafet, P. Azmi, M.R. Javan, and A.Mokdad, “Optimal and fair energy efficient resource allocation for energy harvesting-enabled-PD-NOMA-based HetNets”,  IEEE Transactions on Wireless Communications, Vol. 17, no. 3, pp. 2054-2067, Mar. 2018.
[19] D. T. Ngo, S. Khakurel, T. Le-Ngoc, “Joint subchannel assignment and power allocation for OFDMA femtocell networks”,  IEEE Transactions on Wireless Communications, Vol. 13 no. 1, pp. 342-355, Jan. 2014.