Throughput Scaling of Covert Communication over Wireless Adhoc Networks

Cited 6 time in webofscience Cited 5 time in scopus
  • Hit : 84
  • Download : 0
e study the throughput scaling law of covert communication over wireless adhoc networks where (roughly) n legitimate nodes (LNs) and nκ for 0 < κ < 1 warden nodes (WNs) are randomly distributed in a unit area. Each legitimate source wants to communicate with its destination while ensuring that each WN is unable to detect the presence of communication. A preservation region, where the transmission of the LNs is not permitted, is introduced around each WN to increase the transmit power of the LNs outside the preservation regions. For achievability, multi-hop (MH), hierarchical cooperation (HC), and hybrid HC-MH schemes in the literature are utilized with some modifications. In the MH and the hybrid schemes, because the preservation regions may block the direct data paths, a detouring method that distributes the detours evenly over a wide region is proposed to avoid the concentration of relaying burdens. In the HC scheme, we properly control the symbol power and the MIMO transmission scheduling. We also present matching upper bounds on the throughput scaling under an assumption that every active LN consumes a same average transmit power over the time period that the WNs observe.
Publisher
Institute of Electrical and Electronics Engineers Inc.
Issue Date
2019-07-11
Language
English
Citation

2019 IEEE International Symposium on Information Theory, ISIT 2019, pp.2164 - 2168

DOI
10.1109/ISIT.2019.8849852
URI
http://hdl.handle.net/10203/277722
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0