DC Field | Value | Language |
---|---|---|
dc.contributor.author | IM, Hyeonseong | ko |
dc.contributor.author | Lee, Si-Hyeon | ko |
dc.date.accessioned | 2021-03-11T05:50:06Z | - |
dc.date.available | 2021-03-11T05:50:06Z | - |
dc.date.created | 2021-03-11 | - |
dc.date.created | 2021-03-11 | - |
dc.date.created | 2021-03-11 | - |
dc.date.created | 2021-03-11 | - |
dc.date.issued | 2021-03 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.16, pp.1768 - 1781 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10203/281488 | - |
dc.description.abstract | We study the effect of node mobility on the throughput scaling of the covert communication over a wireless adhoc network. It is assumed that n mobile nodes want to communicate each other in a unit disk while keeping the presence of the communication secret from each of Theta(ns) non-colluding wardens (s > 0). The wardens can be mobile or fixed. Our results show that the node mobility greatly improves the throughput scaling, compared to the case of fixed node location. In particular, for s <= 1, the aggregate throughput scaling, i.e., the maximally achievable throughput scaling of the total network when each source-destination pair communicates with the same rate, is shown to be arbitrarily close to linear in n when the number of channel uses l that each warden uses to judge the presence of communication is not too large compared to n. More specifically, the aggregate throughput scaling is arbitrarily close to linear when s <= 1 and l = O(n((alpha-2)(1-s))), where alpha >= 2 denotes the path loss exponent. For the achievability, we modify the two-hop based scheme by Grossglauser and Tse (2002), which was proposed for a wireless ad hoc network without a covertness constraint, by introducing a preservation region around each warden in which the senders are not allowed to transmit and by carefully analyzing the effect of covertness constraint on the transmit power and the resultant transmission rates. This scheme is shown to be optimal for 0 < s <= 1 under an assumption that each node outside preservation regions around wardens uses the same transmit power. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Mobility-Assisted Covert Communication Over Wireless Ad Hoc Networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000616307600004 | - |
dc.identifier.scopusid | 2-s2.0-85098801287 | - |
dc.type.rims | ART | - |
dc.citation.volume | 16 | - |
dc.citation.beginningpage | 1768 | - |
dc.citation.endingpage | 1781 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.identifier.doi | 10.1109/TIFS.2020.3045132 | - |
dc.contributor.localauthor | Lee, Si-Hyeon | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Covert communication | - |
dc.subject.keywordAuthor | low probability of detection | - |
dc.subject.keywordAuthor | wireless adhoc network | - |
dc.subject.keywordAuthor | throughput scaling | - |
dc.subject.keywordAuthor | node mobility | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.