Covert Communication and Secure Transmission in the Presence of Multiple Antenna Untrusted Relay

被引:0
|
作者
Yari, MohammadReza [1 ]
Azmi, Paeiz [1 ]
Ghasedi, Mahyar [1 ]
Forouzesh, Moslem [2 ]
Saeedi, Hamid [3 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Amol Univ Special Modern Technol, Engn Dept, Amol, Iran
[3] Univ Doha Sci & Technol, Coll Engn & Technol, Doha, Qatar
关键词
covert communication; information-theoretical security; multiple antenna untrusted relay; NSGAII; KEY GENERATION;
D O I
10.1109/ICEE63041.2024.10668164
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this study, we investigate information-theoretical security and covert communication. In covert communication, our aim is communication via the source-relay-destination link, without noticing the existence of communication by the multiple antenna warden. For secure transmission, our aim is to prevent possible eavesdropping by multiple antenna untrusted relay. To satisfy these requirements, we proposed a cooperative jamming strategy in two phases of transmission. In the proposed scheme, the source has multiple antenna and the efficiency of the maximum-ratio transmission/maximum-ratio combining (MRT/MRC) method for sending data to the relay has been evaluated. Due to the total transmit power restriction in each phase, a constrained optimization problem is formulated. Then, it is solved by converting to a multi-objective optimization problem. Finally, we employ the non-dominated sorting genetic algorithm II (NSGAII) to solve it.
引用
收藏
页码:656 / 661
页数:6
相关论文
共 50 条
  • [31] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks
    Lu LV
    Zan LI
    Haiyang DING
    Jian CHEN
    ScienceChina(InformationSciences), 2021, 64 (10) : 266 - 267
  • [32] Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay
    Mukherjee, Amitav
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) : 1309 - 1312
  • [33] Achieving Covert Wireless Communication With a Multi-Antenna Relay
    Lv, Lu
    Li, Zan
    Ding, Haiyang
    Al-Dhahir, Naofal
    Chen, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 760 - 773
  • [34] Secure Transmission via a Wireless-Powered Untrusted Relay in Underlay CRNs
    Hu, Hequn
    Gao, Zhenzhen
    Zhang, Chao
    Liao, Xuewen
    2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [35] Secure communication via an energy-harvesting untrusted relay with imperfect CSI
    Van Phu Tuan
    Kong, Hyung Yun
    ANNALS OF TELECOMMUNICATIONS, 2018, 73 (5-6) : 341 - 352
  • [36] Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay
    Chen, Dechuan
    Yang, Weiwei
    Hu, Jianwei
    Cai, Yueming
    Tang, Xuanxuan
    IEEE ACCESS, 2018, 6 : 11862 - 11870
  • [37] Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
    Huang, Jing
    Mukherjee, Amitav
    Swindlehurst, A. Lee
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) : 2536 - 2550
  • [38] Overloaded Wireless MIMO Switching for Secure Wireless Communication Exchanging to Untrusted Relay
    Takahashi, Arata
    Takyu, Osamu
    Sasamori, Fumihito
    Handa, Shiro
    Fujii, Takeo
    Ohtsuki, Tomoaki
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019), 2019, : 121 - 125
  • [39] Secure communication via an energy-harvesting untrusted relay with imperfect CSI
    Van Phu Tuan
    Hyung Yun Kong
    Annals of Telecommunications, 2018, 73 : 341 - 352
  • [40] Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay
    Letafati, Mehdi
    Kuhestani, Ali
    Behroozi, Hamid
    Ng, Derrick Wing Kwan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (10) : 6771 - 6785