Covert Communication and Secure Transmission in the Presence of Multiple Antenna Untrusted Relay

被引:0
|
作者
Yari, MohammadReza [1 ]
Azmi, Paeiz [1 ]
Ghasedi, Mahyar [1 ]
Forouzesh, Moslem [2 ]
Saeedi, Hamid [3 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Amol Univ Special Modern Technol, Engn Dept, Amol, Iran
[3] Univ Doha Sci & Technol, Coll Engn & Technol, Doha, Qatar
关键词
covert communication; information-theoretical security; multiple antenna untrusted relay; NSGAII; KEY GENERATION;
D O I
10.1109/ICEE63041.2024.10668164
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this study, we investigate information-theoretical security and covert communication. In covert communication, our aim is communication via the source-relay-destination link, without noticing the existence of communication by the multiple antenna warden. For secure transmission, our aim is to prevent possible eavesdropping by multiple antenna untrusted relay. To satisfy these requirements, we proposed a cooperative jamming strategy in two phases of transmission. In the proposed scheme, the source has multiple antenna and the efficiency of the maximum-ratio transmission/maximum-ratio combining (MRT/MRC) method for sending data to the relay has been evaluated. Due to the total transmit power restriction in each phase, a constrained optimization problem is formulated. Then, it is solved by converting to a multi-objective optimization problem. Finally, we employ the non-dominated sorting genetic algorithm II (NSGAII) to solve it.
引用
收藏
页码:656 / 661
页数:6
相关论文
共 50 条
  • [41] Relay-Assisted Uplink Covert Communication in the Presence of Multi-Antenna Warden and Uninformed Jamming
    Lin, Menghan
    Liu, Chaowen
    Wang, Wenjie
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (04) : 2124 - 2137
  • [42] Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
    Zhang, Jiazhen
    Tao, Xiaofeng
    Wu, Huici
    Zhang, Xuefei
    IEEE ACCESS, 2018, 6 : 10508 - 10519
  • [43] Two-hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
    He, Xiang
    Yener, Aylin
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [44] Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    Yeoh, Phee Lep
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) : 7170 - 7181
  • [45] Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks
    Shi, Hui
    Yang, Weiwei
    Chen, Dechuan
    Luo, Yunpeng
    Cai, Yueming
    SENSORS, 2019, 19 (01)
  • [46] On Secure Communication using RF Energy Harvesting Two-Way Untrusted Relay
    Gupta, Vipul
    Kalamkar, Sanket S.
    Banerjee, Adrish
    arXiv, 2017,
  • [47] Utility Regions for DF Relay in OFDMA-Based Secure Communication With Untrusted Users
    Saini, Ravikant
    Mishra, Deepak
    De, Swades
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (11) : 2512 - 2515
  • [48] On Secure Communication using RF Energy Harvesting Two-Way Untrusted Relay
    Gupta, Vipul
    Kalamkar, Sanket S.
    Banerjee, Adrish
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [49] Jamming Power Control for Secure Communication via Untrusted Relay with Imperfect Channel Estimation
    Lee, Junseob
    Lee, Kisong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [50] Symbol separation and beamforming to improve secure transmission in multi-untrusted relay networks
    Mekkawy, Tamer
    Yao, Rugui
    Zuo, Xiaoya
    Wang, Ling
    ELECTRONICS LETTERS, 2018, 54 (04) : 252 - 254