Covert Communications: A Comprehensive Survey

被引:72
|
作者
Chen, Xinying [1 ]
An, Jianping [2 ]
Xiong, Zehui [3 ]
Xing, Chengwen [4 ]
Zhao, Nan [1 ]
Yu, F. Richard [5 ]
Nallanathan, Arumugam [6 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian 116024, Peoples R China
[2] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
[4] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[5] Shenzhen Univ, Shenzhen Key Lab Digital & Intelligent Technol & S, Shenzhen 518060, Peoples R China
[6] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
来源
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Security; Uncertainty; Transmitters; Encryption; Communication system security; Fading channels; Working environment noise; Surveys; Covert communication; information hiding; low probability of detection; physical layer security; square root law; UNDERLAYING CELLULAR NETWORKS; PHYSICAL LAYER SECURITY; INVERSION POWER-CONTROL; WIRELESS COMMUNICATION; RESOURCE-ALLOCATION; ARTIFICIAL NOISE; TRANSMIT POWER; HIDING INFORMATION; BEAMFORMING DESIGN; FUNDAMENTAL LIMITS;
D O I
10.1109/COMST.2023.3263921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
引用
收藏
页码:1173 / 1198
页数:26
相关论文
共 50 条
  • [31] Multiband OFDM for Covert Acoustic Communications
    Leus, Geert
    van Walree, Paul A.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (09) : 1662 - 1673
  • [32] Covert Communications Meet 6G NTN: A Comprehensive Enabler for Safety-Critical IoT
    An, Jianping
    Kang, Bichen
    Ouyang, Qiaolin
    Pan, Jianxiong
    Ye, Neng
    IEEE NETWORK, 2024, 38 (04): : 17 - 24
  • [33] Robust Beamforming Design for Covert Communications
    Ma, Shuai
    Zhang, Yunqi
    Li, Hang
    Lu, Songtao
    Al-Dhahir, Naofal
    Zhang, Sha
    Li, Shiyin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3026 - 3038
  • [34] Covert Communications on Renewal Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 548 - 555
  • [35] Embedding Covert Information in Broadcast Communications
    Arumugam, Keerthi Suria Kumar
    Bloch, Mathieu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2787 - 2801
  • [36] Covert Communications on Poisson Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1046 - 1052
  • [37] On covert throughput performance of two-way relay covert wireless communications
    Wu, Huihui
    Zhang, Yuanyu
    Liao, Xuening
    Shen, Yulong
    Jiang, Xiaohong
    WIRELESS NETWORKS, 2020, 26 (05) : 3275 - 3289
  • [38] Multiple-Antenna Techniques for Wireless Communications - A Comprehensive Literature Survey
    Mietzner, Jan
    Schober, Robert
    Lampe, Lutz
    Gerstacker, Wolfgang H.
    Hoeher, Peter A.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 87 - 105
  • [39] A Comprehensive Survey on Seamless Mobility Management in 5G Communications
    Reddy, Somashekhara
    Venkatarama, Sreenath
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (06): : 33 - 48
  • [40] On covert throughput performance of two-way relay covert wireless communications
    Huihui Wu
    Yuanyu Zhang
    Xuening Liao
    Yulong Shen
    Xiaohong Jiang
    Wireless Networks, 2020, 26 : 3275 - 3289