Next Article in Journal
Comparative Study of Measurement Methods for Embedded Bioimpedance Spectroscopy Systems
Next Article in Special Issue
Drone Detection and Classification Using Physical-Layer Protocol Statistical Fingerprint
Previous Article in Journal
A Hybrid Price Auction-Based Secure Routing Protocol Using Advanced Speed and Cosine Similarity-Based Clustering against Sinkhole Attack in VANETs
Previous Article in Special Issue
Secrecy Coding Analysis of Short-Packet Full-Duplex Transmissions with Joint Iterative Channel Estimation and Decoding Processes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver

1
School of Electrical Engineering, International University, Ho Chi Minh City 700000, Vietnam
2
Vietnam National University, Ho Chi Minh City 700000, Vietnam
3
Telecommunication Division, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
4
Univ Brest, CNRS, Lab-STICC, CS 93837, 6 Avenue Le Gorgeu, CEDEX 3, 29238 Brest, France
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(15), 5812; https://doi.org/10.3390/s22155812
Submission received: 3 June 2022 / Revised: 26 July 2022 / Accepted: 1 August 2022 / Published: 3 August 2022
(This article belongs to the Special Issue Physical-Layer Security for Wireless Communications)

Abstract

:
This paper considers hiding messages in overt transmissions with a full-duplex receiver, which emits artificial noise to secure its transmission connection while a transmitter opportunistically sends a covert message to a covert user. The warden’s uncertainties in decoding the overt message and artificial-noise-received power are exploited to hide messages. Then, the covert throughput accompanied with the warden’s average detection error probability are determined. The results show that increasing the transmit power of artificial noise or improving secure connection at the overt user will improve the covert performance. The results also show that the covert performance is improved when the self-interference cancellation is improved at the full-duplex receiver or when the warden is located close to the full-duplex receiver, indicating the positive impact of the overt performance on the covert performance.

1. Introduction

In wireless transmissions, the security and privacy of their broadcast nature become a critical issue as it operates not only in the civil area but also in the military. For example, privacy information in health care, the journey or location of vehicles in transportation and the position or confidential information of the targets need to be protected. Regarding security protection for wireless communications, several conventional approaches, such as cryptography [1] or physical layer security [2,3,4], have been implemented. These methods only target preventing the confidential content of messages from being stolen by eavesdroppers. Nevertheless, some scenarios are dedicated to avoiding being attacked, such as jamming when the existence (privacy) of transmissions is revealed. For example, in the case of a self-driving car, the controlling signals need to be completely secured or hidden from the adversary. Moreover, the location or itinerary of vehicles needs to be kept private. Their revelations to the attacker may cause security issues or accidents. Therefore, covert communication has emerged as a potential solution for dealing with the issue of privacy.
Covert or low-probability-of-detection communication refers to scenarios where the transmitter sends its message to the receiver such that the warden cannot detect (or can detect at a low probability) the existence of transmissions [5]. The square root law (SRL) for covert communication was firstly introduced in additive white Gaussian noise (AWGN) channels for covert or low-probability-of-detection communication with two important measures: the warden’s detection error probability ξ , defined as the sum of the probabilities of a false alarm when the transmitter is not sending and missed the detection when the transmitter is sending, and the covert throughput, defined by the number of bits transmitted reliably over N channels subject to the constraint of ξ 1 ϵ for covert requirement ϵ 0 [5]. Then, SRL can be used to preside the covert communication, in which, the O ( N ) bits can be transmitted over N channels covertly and reliably. After proving the SRL in additive white Gaussian noise (AWGN) channels [5], it was developed to discrete memoryless channels (DMCs) [6,7,8], in which, the Big-O notation characterizes the constant hidden. Then, [9] extended the study to covert communication in DMCs under some constraints related to the covertness. In [10], the authors showed that the Gaussian signalling can be optimal under only a covertness constraint. Thus, the Kullback–Leibler divergence asymmetry property can optimize the Gaussian signalling with other constraints to [10]. However, SRL has a weakness, as a positive covert rate cannot be guaranteed when the number of channels tends to infinity. This means that the covert rate O ( N ) tends to 0 when N tends to infinity. This problem of SRL was later addressed and solved by [11,12,13]. In [11], the study pointed out that a signal-to-noise ratio (SNR) threshold will impact the detection of the transmitted signal if the received signal power is less than this threshold. Thus, it can be seen as a noise uncertainty when the noise power estimation does not match the actual noise power. Hence, the noise uncertainty is useful in covert communication since it could be a medium to hide a message. The study in [12] proved that there will be a positive covert rate even for an infinite number of channels if the legitimate has noise uncertainty. Thus, the covert throughput was analyzed in [13] based on two noise uncertainty practical models under AWGN channels.
In general, two well-known approaches adopted for covert communications have been widely investigated in the literature. The key idea of the first approach is to take advantage of various sources of the adversary’s uncertainty to guarantee the covertness, e.g., adversary’s noise uncertainty in [12,13], uncertainties of transmission time [14], channel state information [15] and transmit power [16]. Later, the noise uncertainty was extended to uninformed jamming [17] and artificial noise (AN) from a friendly jammer [18] or from a full-duplex receiver [19,20,21]. Using AN at the FD receiver, the receiver receives the covert message while jamming the warden to make it harder to detect the covert message [19,20,21]. However, two critical questions arise: (1) in the case of the covert receiver being a low cost-device, i.e., IoT users with hardware that is not complex and does not have enough energy to simultaneously carry out two such roles, and (2) jamming by the covert receiver, which receives the covert message, may help the adversary to detect the presence of covert transmission. Hence, jamming while receiving the covert information by the covert receiver may not be practical in a real scenario. For the second approach, other works considered superimposing the covert message into another message of existing transmissions, termed as hiding messages into overt transmissions, and exploited transmit power control [22] and random transmit power [23]. The basic idea of the second approach is to guarantee covertness by enlarging the dynamic range of the adversary’s uncertainties via the existing transmission. Most recently, [24] showed, for the first time, that the warden cannot detect the covert message if the overt message where the covert message is superimposed onto is not decoded. This finding can be referred to as decoding uncertainty at the warden.
Inspired by [24] and the full-duplex receiver scheme in [19,20,21], we introduce a novel scheme of hiding messages into existing overt transmissions with a FD overt receiver. Different from [19,20,21], the artificial noise jamming signal is transmitted by the overt receiver with just naive intention to secure its connection with the transmitter [25] and, thus, the presence of the covert transmission will not be detected via artificial noise jamming. More specifically, the superposition signal of the covert and overt messages is transmitted at a fixed transmit power while the overt receiver emits the AN to secure its connection. With this setting, we find that, in order to detect the covert message, it is necessary for the warden to decode the overt message and, even if the overt message is decoded, the covertness still can be guaranteed due to the adversary’s uncertainty in receiving AN powers. Then, an efficient AN and the improved performance of the secure connection of the overt transmission leads to an improvement in the covertness. In this paper, performances were evaluated by using three metrics: the adversary’s average detection error probability ξ , the covert throughput η u and the overt throughput loss η v , loss . The main contributions of the paper are listed as follows:
  • We propose a scheme to hide the covert information by exploiting the existing secure connection transmission with the aid of artificial noise generated by a full-duplex overt receiver, which has not been considered in literature.
  • The artificial noise used for improving the secure connection transmission can also be exploited for improving covert transmissions.
  • The artificial noise can be further improved if the channel state information between the over receiver and the warden is unknown at the warden, which is also known as the uncertainty of artificial noise power.
This paper is organized as follows. Section 2 will describe the system model with one transmitter and two receivers, as well as a warden. Section 3 presents the optimum detection of the warden. The covert throughput and the overt throughput loss are examined in Section 4 and Section 5, respectively. The numerical results will be shown in Section 6.

2. System Model

We considered one transmitter (Alice) and two receivers—one (Carol) to receive overt messages, v = ( v 1 , . . . , v n ) , and one (Bob) to receive covert messages, u = ( u 1 , . . . , u n ) —and a warden (Willie) to detect the presence of covert transmission. The proposed system is illustrated in Figure 1, where Carol equipped with two antennas operates at full-duplex mode to secure its connection to the warden [19], whereas other nodes employ a half-duplex mode with a single antenna. The proposed scheme is under practical consideration of uplink transmissions, in which, the transmitter (an IoT device) opportunistically sends its covert message on top of the overt message as a camouflage while the overt receiver (a base station with an advanced receiver architecture) secures its connection. Here, the artificial noise is naively exploited to secure the connection for the overt user and, then, is opportunistically used to provide covertness for the covert user.
Considering the random coding used to generate codewords [26], the codewords u and v are independently generated by random selection symbols from a complex normal distribution. To guarantee the covertness, the codebook of u is a share secret between Alice and Bob, whereas that of v is assumed as known to all users, including Willie. The transmitted signal from Alice, from Willie’s perspective, is given by
x = P a v ,     H 0 , P a ( α v + 1 α u ) , H 1 ,
where H 0 and H 1 denote the null hypothesis that u has not been sent by Alice and the alternative hypothesis, respectively, α [ 0 , 1 ] is the ratio of power allocated to the overt message and P a is Alice’s total transmit power, which is always constant regardless of the covert transmission.
The quasi-static Rayleigh block fading channels is considered, where the channel gain is constant inside an n symbols block and changes from one block to another independently [22,24]. Let the channel gain be h i j between nodes i and j, where i { a , c } and j { b , c , w } , in which nodes a , b , c and w represent Alice, Bob, Carol and Willie, respectively, and have a Gaussian distribution with mean 0 and variance σ i j 2 . A high value of σ i j 2 means that the two users are close. Assuming that Alice sends pilot symbols for channel estimations before data transmissions, and assuming perfect channel estimation at all receiver nodes, node j perfectly knows h a j . We further denote n j , j { b , c , w } as the background noise vector at node j and assume that n j has a complex Gaussian distribution with mean 0 and variance σ n 2 , i.e., n j C N ( 0 , σ n 2 ) . It should be noted that Carol does not send their channel estimate to Alice. In addition, Bob will not send their channel estimate to Alice in order to avoid being detected by Willie. Hence, Alice does not know the channel information from them to other nodes and designs fixed transmission rates to Bob and Carol. This design is suitable for IoT applications with a requirement of strict latency as it does not require channel information feedback. For convenience, the parameter and metric notations are provided in Table 1.

3. Warden’s Optimum Detection

After receiving the transmitted signal from Alice and artificial noise from Carol, the signal to be received at Willie is expressed as
y w = P a h a w v + P c h c w z + n w ,     H 0 , P a h a w ( α v + 1 α u ) + P c h c w z + n w , H 1 ,
where z C N ( 0 , 1 ) is the AN signal transmitted by Carol and P c is the transmit AN power. It will be proven that the distribution of y w = { y w , 1 , , y w , n } is identical under H 0 and H 1 if v is not decoded, and different if v is decoded. This means that Willie cannot detect the covert message u if the overt message v cannot be decoded. Moreover, since Willie has uncertainty in the received AN power, | h c w | 2 P c , the covertness can still be guaranteed if v is decoded. In this section, the average total detection error probability, estimated over the event of Willie’s success and failure to decode v , is calculated. In detail, we considered two cases: Willie fails to decode v and Willie succeeds in decoding v , as follows.

3.1. Willie Fails to Decode v

When Willie fails to decode v , they will perform the marginalized likelihood ratio test (LRT), i.e., averaging unknown v in the likelihood functions, as its optimum detection [27], is
Λ : = E v [ Pr ( y w | v , H 1 ) ] E v [ Pr ( y w | v , H 0 ) ] H 0 H 1 λ ,
where ( E X [ f ( X ) ] denotes the expectation of the function f ( X ) with respect to the random variable X), under H 1 , by treating u = { u 1 , . . . , u n } in (2) as noise since Willie does not know the codebook of u , we have
Pr ( y w | v , H 1 )   =   i = 1 n Pr ( y w , i | v i , H 1 )   =   i = 1 n exp | y w , i h a w α P a v i | 2 σ n 2 + | h c w | 2 P c + ( 1 α ) P a | h a w | 2 π ( σ n 2 + | h c w | 2 P c + ( 1 α ) h a w 2 P a )   =   exp y w h a w α P a v 2 σ n 2 + | h c w | 2 P c + ( 1 α ) P a | h a w | 2 ( π ( σ n 2 + | h c w | 2 P c + ( 1 α ) h a w 2 P a ) ) n ,
and, under H 0 , we similarly have
Pr ( y w | v , H 0 )   =   exp | | y w h a w P a v | | 2 σ n 2 + | h c w | 2 P c ( π ( σ n 2 + | h c w | 2 P c ) ) n .
Then, we obtain from (4) and (5) that
E v [ Pr ( y w | v , H 0 ) ] = E v [ Pr ( y w | v , H 1 ) ] .
The proof of (6) is provided in Appendix A. Hence, Λ = 1 .
Let I ( v ; y w ) denote the mutual information between v and y w , and R v denote the transmission rate of the overt message. The design value of R v will be determined in Section 5. It follows from [28] (Equation (1)) that the event of I ( v ; y w ) < R v is a subset of the event that Willie fails to decode v . Then, the lower bound of the false alarm and missed detection probabilities, in the case that Willie fails to decode v , are given by
P f   =   Pr ( λ < 1 , I ( v ; y w ) < R v | H 0 ) , P m   =   Pr ( λ 1 , I ( v ; y w ) < R v | H 1 ) ,
respectively, where
I ( v ; y w ) = log 2 1 + | h a w | 2 P a σ n 2 + | h c w | 2 P c , H 0 , log 2 1 + α | h a w | 2 P a σ n 2 + ( 1 α ) | h a w | 2 P a + | h c w | 2 P c , H 1 .
To achieve a high detection performance, the strategy of the warden Willie is to minimize the sum of the false alarm and missed detection probabilities ( P f + P m ) by choosing λ properly. Since I ( v ; y w ) under H 0 is larger than that under H 1 , Willie may choose λ < 1 to obtain the minimum
P f + P m = Pr ( I ( v ; y w ) < R v | H 0 ) = 1 Pr | h a w | 2 ( 2 R v 1 ) ( σ n 2 + | h c w | 2 P c ) P a ,
which, since | h i j | 2 is distributed exponentially with a scale of 1 / σ i j 2 , yields
P f + P m = 1 0 exp ( 2 R v 1 ) ( σ n 2 + x P c ) σ a w 2 P a × exp ( x / σ c w 2 ) σ c w 2 d x = 1 exp ( ( 2 R v 1 ) σ n 2 / ( σ a w 2 P a ) ) 1 + ( 2 R v 1 ) σ c w 2 P c / ( σ a w 2 P a ) .
Remark 1.
One can see from (9) that ( P f + P m ) also represents the secure connection probability and increases as the AN transmit power P c increases. This means that the AN helps to not only secure the connection for the overt user but also to hide the message for the covert user.

3.2. Willie Succeeds in Decoding v

When Willie succeeds in decoding v , they will perform the LRT of
Λ : = 1 n ln Pr ( y w | v , H 1 ) Pr ( y w | v , H 0 ) ln σ n 2 + | h c w | 2 P c σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a   =   | | y w h a w P a v | | 2 n ( σ n 2 + | h c w | 2 P c ) | | y w h a w α P a v | | 2 n ( σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a ) H 0 H 1 λ ,
where (11) is derived from (4) and (5). As n (the best scenario for Willie’s detection), Λ converges to
Λ 2 α ( 1 α ) | h a w | 2 P a σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a ,   H 0 , 2 ( 1 α ) | h a w | 2 P a σ n 2 + | h c w | 2 P c , H 1 .
Remark 2.
One can see that, if Willie perfectly knows the channel gain h c w via channel information feedback at Carol or perfectly knows their received AN power of | h c w | 2 P c , Willie can choose the detection threshold
λ 2 α ( 1 α ) | h a w | 2 P a σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a , 2 ( 1 α ) | h a w | 2 P a σ n 2 + | h c w | 2 P c
such that, from (12), the false alarm probability and missed detection probability are zero, i.e., P f ( h a w ) = P m ( h a w ) = 0 , i.e., Willie can always detect the presence of the covert transmission if the overt message v is decoded and removed. However, this channel information feedback is not considered in our system model and, hence, Willie has uncertainty in the received AN power, which still guarantees a certain covertness even if the overt message v is decoded and removed.
Since | h c w | 2 has an exponential distribution with a mean of σ c w 2 , the false alarm and missed detection probabilities for decoding u at Willie, by assuming that Willie succeeds in decoding v , based on (8) and (12), are given by
P f ( h a w )   =   Pr ( Λ > λ , I ( v ; y w ) R v | H 0 )   =   Pr ( | h c w | 2 / σ c w 2 < min { r 0 / λ s 0 , δ 0 } )   =   1 exp min { r 0 / λ s 0 , δ 0 } ,
P m ( h a w )   =   Pr ( Λ λ , I ( v ; y w ) R v | H 1 )   =   Pr r 1 / λ s 1 | h c w | 2 / σ c w 2 δ 1   =   ( exp ( ( r 1 / λ s 1 ) ) exp ( δ 1 ) ) + ,
where ( x ) + = max ( x , 0 ) , and
r 0   =   2 α ( 1 α ) | h a w | 2 P a / ( σ c w 2 P c ) , s 0   =   ( σ n 2 + ( 1 α ) | h a w | 2 P a ) / ( σ c w 2 P c ) , r 1   =   2 ( 1 α ) | h a w | 2 P a / ( σ c w 2 P c ) , s 1   =   σ n 2 / ( σ c w 2 P c ) , δ 0   =   | h a w | 2 P a / ( ( 2 R v 1 ) σ c w 2 P c ) σ n 2 / ( σ c w 2 P c ) , δ 1   =   | h a w | 2 P a ( α ( 1 α ) 2 R v ) + / ( ( 2 R v 1 ) σ c w 2 P c ) σ n 2 / ( σ c w 2 P c ) .
Willie attempts to minimize ( P f ( h a w ) + P m ( h a w ) ) by properly choosing λ equal to
λ   =   min ln ( r 1 / r 0 ) ( s 0 s 1 ) r 1 r 0 , s 1 + δ 1 r 1 1 ,
where its proof is provided in Appendix B, and then
P f ( h a w ) + P m ( h a w )   =   1 exp s 0 r 0 / λ + exp ( s 1 r 1 / λ ) ) exp ( δ 1 ) .

3.3. Average Total Detection Error Probability

In summary, the average total detection error probability, estimated over the event of Willie’s success and failure to decode v regardless of the number of symbols n, can be determined as
ξ   =   ( P f + P m ) + E h a w [ P f ( h a w ) + P m ( h a w ) ] ,
which can be computed from (10) and (18). Here, we emphasize that the total detection error probability in (19) is the lower bound obtained from (10) and (18) and that it is necessary to consider (19) as the covertness measure, which is independent of the number of symbols under practical considerations.
Covert requirement: A covert communication can be achieved if ξ 1 ϵ for any covertness requirement ϵ > 0 . This means that the detection is ineffective, i.e., ξ 1 , at a sufficiently small ϵ 0 .

4. Covert Throughput at the Covert User Bob

In this section, the covert throughput will be determined. The covert throughput of u between Alice and Bob is the average rate correctly received over many transmission bursts, i.e., R u × ( 1 P out , B ) , because the message is only correctly received on ( 1 P out , B ) transmissions [15], with P out , B being the decoding outage probability. Since Alice does not know h a b , they will transmit u at a fixed rate R u . The received signal at Bob is given by
y b = ( 1 α ) P a h a b u + α P a h a b v + P c h c b z + n b .
Assuming successive interference cancellation receiver type at Bob [29], the covert message maximum rate is given by
I ( u ; y b ) 0 = log 2 1 + ( 1 α ) | h a b | 2 P a σ n 2 + α | h a b | 2 P a + | h c b | 2 P c
if Bob cannot decode v , i.e., I ( v ; y b ) < R v or, equivalently,
| h a b | 2 < ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + P a ,
and, otherwise,
I ( u ; y b ) 1 = log 2 1 + ( 1 α ) | h a b | 2 P a σ n 2 + | h c b | 2 P c .
Since | h a b | 2 has an exponential distribution with a mean of σ a b 2 with its cumulative distribution function (CDF) of
Pr ( | h a b | 2 < x ) = 1 exp ( x / σ a b 2 )
and | h c b | 2 has an exponential distribution with a mean of σ c b 2 with its probability density function (PDF) of
p | h c b | 2 ( x ) = exp ( x / σ c b 2 ) / σ c b 2 .
The decoding outage probability, denoted as P out , B ( P a ) , of the covert message u can be derived in a closed-form expression as
P out , B ( P a )   =   Pr I ( u ; y b ) 0 < R u , | h a b | 2 < ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + P a +   Pr I ( u ; y b ) 1 < R u , | h a b | 2 ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + P a   =   Pr | h a b | 2 < min ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + P a , ( 2 R u 1 ) ( σ n 2 + | h c b | 2 P c ) ( 1 α 2 R u ) + P a +   Pr ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + P a | h a b | 2 ( 2 R u 1 ) ( σ n 2 + | h c b | 2 P c ) ( 1 α ) P a   =   1 0 exp min ( 2 R v 1 ) ( σ n 2 + x P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a , ( 2 R u 1 ) ( σ n 2 + x P c ) ( 1 α 2 R u ) + σ a b 2 P a × p | h c b | 2 ( x ) d x +   0 ( exp ( 2 R v 1 ) ( σ n 2 + | h c b | 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a   exp ( 2 R u 1 ) ( σ n 2 + | h c b | 2 P c ) ( 1 α ) σ a b 2 P a ) p | h c b | 2 ( x ) d x   =   1 max e ( 2 R v 1 ) σ n 2 ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a 1 + ( 2 R v 1 ) σ c b 2 P c ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a , e ( 2 R u 1 ) σ n 2 ( 1 α 2 R u ) + σ a b 2 P a 1 + ( 2 R u 1 ) σ c b 2 P c ( 1 α 2 R u ) + σ a b 2 P a +   e ( 2 R v 1 ) σ n 2 ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a 1 + ( 2 R v 1 ) σ c b 2 P c ( α ( 1 α ) ( 2 R v 1 ) ) + σ a b 2 P a e ( 2 R u 1 ) σ n 2 σ a b 2 P a 1 + ( 2 R u 1 ) σ c b 2 P c σ a b 2 P a + .
As in [24], the covert throughput (bits/Hz/s) is expressed as R u × ( 1 P out , B ( P a ) ) . In this paper, the covert throughput maximization problem is formulated as
η u = max P a R u × ( 1 P out , B ( P a ) ) s . t . ξ 1 ϵ ,
where ϵ represents the covertness requirement. Since P out , B ( P a ) is a decreasing function of P a (see Figure 2), R u ( 1 P out , B ( P a ) ) is an increasing function of P a . Also, since ξ is a decreasing function of P a (see Figure 3), the constraint of ξ 1 ϵ requires P a less than a threshold P a , where P a is the solution of ξ = 1 ϵ . Hence, R u ( 1 P out , B ( P a ) ) is maximized when P a = P a . Therefore, the covert throughput (bits/Hz/s) is given by
η u = R u × ( 1 P out , B ( P a ) ) .
and its resulting maximum covert throughput is given by
η u , m a x = max R u η u
To enable a positive covert throughput, the overt user needs to sacrifice its throughput for the covert message. Consequently, the next section presents the overt throughput loss.

5. Overt Throughput Loss at the Overt User Carol

In this section, the loss of the overt throughput traded for the covert throughput is characterized. Under H 1 , the received signal at Carol is given by
y c = α P a h a c v + ( 1 α ) P a h a c u + ϕ P c h c c z + n c ,
where ϕ denotes the cancellation coefficient. Although the AN is known to Carol, it cannot be absolutely cancelled and, in practice, can be eliminated with a cancellation coefficient, ϕ , where 0 < ϕ 1 [30]. A low value of cancellation coefficient ϕ indicates that the self-interference has nearly been cancelled ( ϕ 0 : total cancellation; ϕ = 1 : no cancellation). Since Carol does not know the presence of u , the capacity of v considering u as noise is given by
I ( v ; y c ) = log 2 1 + α | h a c | 2 P a σ n 2 + ( 1 α ) | h a c | 2 P a + ϕ | h c c | 2 P c .
Alice considers transmitting the overt message at a fixed rate R v due to unknown h a c . Since | h a c | 2 has an exponential distribution with a mean of σ a c 2 with its cumulative distribution function (CDF) of
Pr ( | h a c | 2 < x ) = 1 exp ( x / σ a c 2 )
and | h c c | 2 has an exponential distribution with a mean of σ c c 2 with its probability density function (PDF) of
p | h c c | 2 ( x ) = exp ( x / σ c c 2 ) / σ c c 2 ,
the probability of overt decoding the outage probability is obtained by
P out , C   =   Pr ( I ( v ; y c ) < R v )   =   Pr | h a c | 2 < ( 2 R v 1 ) ( σ n 2 + ϕ h c c 2 P c ) ( α ( 1 α ) ( 2 R v 1 ) ) P a   =   1 0 exp ( 2 R v 1 ) ( σ n 2 + x ϕ P c ) ( α ( 1 α ) ( 2 R v 1 ) ) + σ a c 2 P a p | h c c | 2 ( x ) d x   =   1 exp ( 2 R v 1 ) σ n 2 ( α ( 1 α ) ( 2 R v 1 ) ) + P a σ a c 2 1 + ( 2 R v 1 ) ϕ P c σ c c 2 ( α ( 1 α ) ( 2 R v 1 ) ) + P a σ a c 2 .
The throughput (bits/Hz/s) of the overt message is given by
η v = R v × ( 1 P out , C ) .
To maximize the throughput of the overt message, the overt transmission rate R v should be chosen properly by numerical search. When α = 1 (no transmission of covert message), the overt throughput, denoted as η v , n c , can be obtained from (34) and (35),
η v , n c   =   max R v R v × exp ( 2 R v 1 ) σ n 2 / ( P a σ a c 2 ) 1 + ( 2 R v 1 ) ϕ P c σ c c 2 / ( P a σ a c 2 ) .
Therefore, we obtain from (35) and (36) that the overt throughput loss (bits/Hz/s) is given by
η v , loss = η v , n c η v ,
which can be found by numerical search.

6. Numerical Results

The numerical results of the average detection error probability, ξ , the covert throughput, η u , and the overt throughput loss, η v , loss , under different values of the transmit SNR P a / σ n 2 , the AN transmit SNR P c / σ n 2 and the cancellation coefficient ϕ are shown. For simplicity, we set σ i j 2 = 1 for all i , j and, for any figure with a different value of σ i j 2 , it will be mentioned. Note that, throughout the simulation, the transmission rate R v used to maximize the overt throughput η v in (36) was firstly calculated and then used to compute the average detection error probability and the covert throughput.

6.1. Average Detection Error Probability at Warden Willie

Figure 3 illustrates the average detection error probability ξ versus P a / σ n 2 for different values of the AN transmit SNR, P c / σ n 2 . It can be observed that the average detection error probability ξ decreases and converges to 0 as Alice’s transmit power increases. The average detection error probability significantly increases as the AN transmit SNR, P c / σ n 2 , increases, even if Willie perfectly knows the AN power, and converges to 1 for a high AN transmit SNR, as also shown in Figure 4 of ξ versus P c / σ n 2 for different values of ϕ . This indicates that the AN helps to improve the covertness because the warden fails to decode the covert message u when the AN power increases. It can also be observed that the warden’s uncertainty (imperfect knowledge) in the received AN power can significantly increases the detection error (for example, a comparison between the line at P c / σ n 2 = 0 dB and that with perfect knowledge of the received AN power) and, thus, the mutual impact of decoding and AN uncertainty on the warden’s detection error is critical.
Figure 3. The average detection error probability, ξ , versus Alice’s transmit power, P a / σ n 2 , for different values of P c / σ n 2 ; α = 0.8 and ϕ = 0.01 .
Figure 3. The average detection error probability, ξ , versus Alice’s transmit power, P a / σ n 2 , for different values of P c / σ n 2 ; α = 0.8 and ϕ = 0.01 .
Sensors 22 05812 g003
Figure 4 illustrates the average detection error probability versus Carol’s AN transmit SNR, P c / σ n 2 , for different values of ϕ . It can be observed that the average detection error probability increases as the cancellation coefficient, ϕ , decreases. This means that the improved performance of Carol’s self-interference cancellation can also help to improve the covertness.
Figure 5 illustrates the average detection error probability, ξ , versus σ c w 2 for different values of P c / σ n 2 . It can be observed that the average detection error probability increases as σ c w 2 increases (the warden is located close to the overt user) and that the increase is more significant for larger P c / σ n 2 . This indicates the efficiency of the AN generated by the overt user to improve the covertness and also emphasizes that the improvement in the secure connection for the overt user results in an improvement in covertness for the covert user.

6.2. Covert Throughput and Overt Throughput Loss

Figure 6 presents the covert throughput versus R u (bits/Hz/s) for different values of ϵ . It can be observed that there exists a unique transmission rate of the covert message to maximize the covert throughput; for example, regarding the covertness requirement of 0.1 ( ϵ = 0.1 ), the covert throughput is maximized at R u 0.42 . It can also be observed that the maximum covert throughput decreases significantly for a stricter covert requirement ( ϵ decreases). For example, the maximum covert throughput of 0.028 (bits/Hz/s) for ϵ = 0.05 is increased to 0.053 (bits/Hz/s) for ϵ = 0.1 .
Figure 7 presents the maximum covert throughput η u , max versus σ c w 2 for different values of ϕ . It can be observed that η u , max increases significantly as σ c w 2 increases and, thus, the AN will be more effective when Willie is located closer to Carol. It can also be observed that the covert throughput increases as ϕ decreases and the increase provided by the better performance of the self-interference cancellation is nearly constant. This indicates the positive impact of the overt receiver’s performance of self-interference cancellation on the covert performance.
Figure 8 presents the maximum covert throughput η u , max versus σ c b 2 for different values of ϕ . It can be observed that η u , max decreases significantly as σ c b 2 increases and, thus, the AN makes more interference when Bob is located closer to Carol. It can also be observed that the maximum covert throughput increases as ϕ decreases and the increase is more significant for smaller σ c b 2 . This indicates the mutual positive impact of the overt receiver’s performance of self-interference cancellation and the location between Bob and Carol on the covert performance.
Figure 9 and Figure 10 show the maximum covert throughput η u , max with the overt throughput, η v , and the overt throughput loss η v , l o s s versus the AN transmit SNR P c / σ n 2 , respectively, for different values of ϵ . It can be observed in Figure 9 that the covert throughput as well as the overt throughput increases as the transmit AN power, P c / σ n 2 , increases. The increase in the covert and overt throughput is due to the increase in the maximum allowed transmission power P a . However, in Figure 10, the overt throughput loss also increases significantly as the AN transmit SNR, P c / σ n 2 , increases. This means that, in order to achieve a significant increase in the covert throughput by increasing AN’s transmit power, it requires a trade of high overt throughput loss. For example, regarding P c / σ n 2 = 30 (dB) and ϵ = 0.1 , in order to obtain 0.12 (bits/Hz/s) of covert throughput, it requires an overt throughput loss of 0.22 (bits/Hz/s), which is higher than the covert throughput. It can be observed in both Figure 9 and Figure 10 that the increase in covert throughput and overt throughput loss is less significant for stricter covert requirements (smaller ϵ ).
In summary, the highlighted results are summarized in Table 2.

7. Conclusions and Discussion

This paper exploited the secure connection transmissions with a FD receiver to hide the covert information. The warden’s uncertainties in decoding the overt message and AN-received power were used to guarantee the covertness. The average detection error probability, the covert throughput and the overt throughput loss were calculated. The results showed that AN generated by the overt user can help to improve the covertness and increase the maximum allowed transmit power, and, hence, the covert throughput. The covertness was further improved for the larger transmit power of AN; however, it requires the trade of high overt throughput loss. The result also showed that the improved performance of self-interference cancellation and secure connection at the overt receiver can help to improve the covertness, indicating the positive impact of the improved existing transmissions on the covert performance. In practice, FD communication is still understudied due to its hardware limitations and the requirement of modifying or creating/updating to a new protocol [31]. Consequently, our proposed scheme also has the potential to be implemented and tested on a hardware platform for civil or military applications, and the implementation can be more or less costly, depending on the techniques chosen and the scale of application.

Author Contributions

Conceptualization, L.L.N., T.-T.N., R.G. and H.Q.T.; data curation, L.L.N., T.-T.N., A.F. and H.Q.T.; formal analysis, L.L.N., A.F., R.G. and H.Q.T.; funding acquisition, A.F. and R.G.; investigation, L.L.N., R.G. and H.Q.T.; methodology, L.L.N., T.-T.N., R.G. and H.Q.T.; project administration, R.G.; resources, L.L.N.; software, L.L.N.; supervision, H.Q.T.; validation, T.-T.N., A.F., R.G. and H.Q.T.; visualization, L.L.N. and H.Q.T.; writing—original draft, L.L.N.; writing—review and editing, A.F., R.G. and H.Q.T. All authors have read and agreed to the published version of the manuscript.

Funding

This study was carried out in close international collaboration between the School of Electrical Engineering, International University, Vietnam National University of Ho Chi Minh city and Lab-STICC, University of Brest, France. This research is supported by the Brest Institute of Computer Science and Mathematics (IBNM) CyberIoT Chair of Excellence of the University of Brest.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In this Appendix, we prove (6). Since v i , 1 i n , is identical and has a complex normal distribution with a PDF of
f ( v i | H 0 ) = exp ( | v i | 2 ) / π .
Then, we obtain from (5) that
E v Pr ( y w | v , H 0 )   =   E v exp | | y w h a w P a v | | 2 σ n 2 + | h c w | 2 P c ( π ( σ n 2 + | h c w | 2 P c ) ) n
  =   i = 1 n v i exp | y w , i h a w P a v i | 2 σ n 2 + | h c w | 2 P c exp ( | v i | 2 ) d v i ( π 2 ( σ n 2 + | h c w | 2 P c ) ) n .
Let h a w = | h a w | e j ρ and v ˜ i = v i e j ρ . Then, the PDF of v ˜ i is identical to (A1) and, hence, we obtain
E v Pr ( y w | v , H 0 )   =   i = 1 n v i exp | y w , i | h a w | P a v ˜ i | 2 σ n 2 + | h c w | 2 P c exp ( | v ˜ i | 2 ) d v i ( π 2 ( σ n 2 + | h c w | 2 P c ) ) n .
For real values of t and z, one can show that
exp ( ( t | h a w | 2 P a z ) 2 / a ) exp ( z ) d z = π a P a a + | h a w | 2 P a exp ( t / ( a + | h a w | 2 P a ) ) .
Then, it can be obtained from (A4) that
E v Pr ( y w | v , H 0 )   =   i = 1 n exp | y w , i | 2 σ n 2 + | h c w | 2 P c + | h a w | 2 P a ( π ( σ n 2 + | h c w | 2 P c + | h a w | 2 P a ) ) n
  =   exp | | y w | | 2 σ n 2 + | h c w | 2 P c + | h a w | 2 P a ( π ( σ n 2 + | h c w | 2 P c + | h a w | 2 P a ) ) n .
Similarly,
E v Pr ( y w | v , H 1 )   =   i = 1 n v i exp | y w , i h a w α P a v i | 2 σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a exp ( | v i | 2 ) d v i ( π 2 ( σ n 2 + | h c w | 2 P c + ( 1 α ) | h a w | 2 P a ) ) n
  =   exp | | y w | | 2 σ n 2 + | h c w | 2 P c + | h a w | 2 P a ( π ( σ n 2 + | h c w | 2 P c + | h a w | 2 P a ) ) n ,
where (A9) is also derived following (A5).

Appendix B

In this Appendix, we find the optimal detection threshold used to minimize ( P f ( h a w ) + P m ( h a w ) ) and its resulting minimum. Let x = 1 / λ . Since r 1 r 0 , s 0 s 1 , δ 0 δ 1 , it follows from (14) and (15) that
P f ( h a w ) + P m ( h a w )   =   1 exp ( δ 0 ) , x s 0 + δ 0 r 0 , 1 exp ( ( r 0 x s 0 ) ) , s 1 + δ 1 r 1 x < s 0 + δ 0 r 0 , 1 exp ( ( r 0 x s 0 ) ) + exp ( ( r 1 x s 1 ) ) exp ( δ 1 ) , x < s 1 + δ 1 r 1 .
It follows from the second function of (A10) that ( P f ( h a w ) + P m ( h a w ) ) is an increasing function of x for ( s 1 + δ 1 ) / r 1 x < ( s 0 + δ 0 ) / r 0 and, hence, ( P f ( h a w ) + P m ( h a w ) ) is minimized at x = ( s 1 + δ 1 ) / r 1 and maximized at x = ( s 0 + δ 0 ) / r 0 . Then, the minimum of ( P f ( h a w ) + P m ( h a w ) ) can be found by finding the optimum detection threshold and minimum of
P f ( h a w ) + P m ( h a w )   =   1 exp ( s 0 r 0 x ) + exp ( s 1 r 1 x ) exp ( δ 1 ) ,
for x < ( s 1 + δ 1 ) / r 1 . Taking the first derivative and setting (A11) to zero yields
x = min { ln ( r 1 / r 0 ) ( s 0 s 1 ) / ( r 1 r 0 ) , ( s 1 + δ 1 ) / r 1 }
and, then, the resulting minimum of ( P f ( h a w ) + P m ( h a w ) ) .

References

  1. Talbot, J.; Welsh, D. Complexity and Cryptograhpy: An Introduction; Cambrige University Press: Cambrige, UK, 2006. [Google Scholar]
  2. Phan, V.D.; Nguyen, T.N.; Le, A.V.; Voznak, M. A Study of Physical Layer Security in SWIPT-Based Decode-and-Forward Relay Networks with Dynamic Power Splitting. Sensors 2021, 21, 5692. [Google Scholar] [CrossRef] [PubMed]
  3. Youn, J.; Son, W.; Jung, B.C. Physical-layer security improvement with reconfigurable intelligent surfaces for 6G wireless communication systems. Sensors 2021, 21, 1439. [Google Scholar] [CrossRef] [PubMed]
  4. Silva, A.; Gomes, M.; Vilela, J.P.; Harrison, W.K. SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security. Sensors 2021, 21, 856. [Google Scholar] [CrossRef] [PubMed]
  5. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
  6. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable deniable communication: Hiding messages in noise. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2945–2949. [Google Scholar]
  7. Bloch, M.R. Covert communication over noisy channels: A resolvability perspective. IEEE Trans. Inf. Theory 2016, 62, 2334–2354. [Google Scholar] [CrossRef] [Green Version]
  8. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef] [Green Version]
  9. Tahmasbi, M.; Bloch, M.R. First-and second-order asymptotics in covert communication. IEEE Trans. Inf. Theory 2018, 65, 2190–2212. [Google Scholar] [CrossRef] [Green Version]
  10. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian signalling for covert communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef] [Green Version]
  11. Tandra, R.; Sahai, A. SNR walls for signal detection. IEEE J. Sel. Top. Signal Process. 2008, 2, 4–17. [Google Scholar] [CrossRef] [Green Version]
  12. Lee, S.; Baxley, R.J.; Weitnauer, M.A.; Walkenhorst, B. Achieving Undetectable Communication. IEEE J. Sel. Top. Signal Process. 2015, 9, 1195–1205. [Google Scholar] [CrossRef]
  13. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication With Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef] [Green Version]
  14. Bash, B.A.; Goeckel, D.; Towsley, D. Covert communication gains from adversary’s ignorance of transmission time. IEEE Trans. Wirel. Commun. 2016, 15, 8394–8405. [Google Scholar] [CrossRef]
  15. Ta, H.Q.; Kim, S.W. Covert communication under channel uncertainty and noise uncertainty. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  16. Yan, S.; He, B.; Zhou, X.; Cong, Y.; Swindlehurst, A.L. Delay-intolerant covert communications with either fixed or random transmit power. IEEE Trans. Inf. Forensics Secur. 2018, 14, 129–140. [Google Scholar] [CrossRef] [Green Version]
  17. Goeckel, D.; Bash, B.; Guha, S.; Towsley, D. Covert Communications When the Warden Does Not Know the Background Noise Power. IEEE Commun. Lett. 2016, 20, 236–239. [Google Scholar] [CrossRef]
  18. Shmuel, O.; Cohen, A.; Gurewitz, O. Multi-Antenna Jamming in Covert Communication. IEEE Trans. Commun. 2021, 69, 4644–4658. [Google Scholar] [CrossRef]
  19. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving covert wireless communications using a full-duplex receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef] [Green Version]
  20. Shu, F.; Xu, T.; Hu, J.; Yan, S. Delay-constrained covert communications with a full-duplex receiver. IEEE Wirel. Commun. Lett. 2019, 8, 813–816. [Google Scholar] [CrossRef] [Green Version]
  21. Yang, L.; Yang, W.; Xu, S.; Tang, L.; He, Z. Achieving Covert Wireless Communications Using a Full-Duplex Multi-Antenna Receiver. In Proceedings of the 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China, 6–9 December 2019; pp. 912–916. [Google Scholar]
  22. Hu, J.; Yan, S.; Zhou, X.; Shu, F.; Li, J.; Wang, J. Covert communication achieved by a greedy relay in wireless networks. IEEE Trans. Wirel. Commun. 2018, 17, 4766–4779. [Google Scholar] [CrossRef] [Green Version]
  23. Tao, L.; Yang, W.; Yan, S.; Wu, D.; Guan, X.; Chen, D. Covert communication in downlink NOMA systems with random transmit power. IEEE Wirel. Commun. Lett. 2020, 9, 2000–2004. [Google Scholar] [CrossRef]
  24. Kim, S.W.; Ta, H.Q. Covert Communications over Multiple Overt Channels. IEEE Trans. Commun. 2021, 70, 1112–1124. [Google Scholar] [CrossRef]
  25. Zhou, X.; McKay, M.R. Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 2010, 59, 3831–3842. [Google Scholar] [CrossRef] [Green Version]
  26. Arumugam, K.S.K.; Bloch, M.R. Embedding covert information in broadcast communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef] [Green Version]
  27. Axell, E.; Leus, G.; Larsson, E.G.; Poor, H.V. Spectrum sensing for cognitive radio: State-of-the-art and recent advances. IEEE Signal Process. Mag. 2012, 29, 101–116. [Google Scholar] [CrossRef] [Green Version]
  28. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar]
  29. Shi, L.; Li, Z.; Bi, X.; Liao, L.; Xu, J. Full-duplex multi-hop wireless networks optimization with successive interference cancellation. Sensors 2018, 18, 4301. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  30. Everett, E.; Sahai, A.; Sabharwal, A. Passive self-interference suppression for full-duplex infrastructure nodes. IEEE Trans. Wirel. Commun. 2014, 13, 680–694. [Google Scholar] [CrossRef] [Green Version]
  31. Kolodziej, K.E. In-Band Full-Duplex Wireless Systems Handbook; Artech House: Norwood, MA, USA, 2021. [Google Scholar]
Figure 1. Alice tries to hide a covert message to Bob within overt transmissions to Carol toward Willie; a warden looks for covert message.
Figure 1. Alice tries to hide a covert message to Bob within overt transmissions to Carol toward Willie; a warden looks for covert message.
Sensors 22 05812 g001
Figure 2. Bob’s decoding outage probability, P out , B ( P a ) , versus Alice’s transmit power P a , for different values of R v ; α = 0.8 and P c = 5 dB.
Figure 2. Bob’s decoding outage probability, P out , B ( P a ) , versus Alice’s transmit power P a , for different values of R v ; α = 0.8 and P c = 5 dB.
Sensors 22 05812 g002
Figure 4. The average detection error probability, ξ , versus Carol’s AN-transmit SNR, P c / σ n 2 , for different values of ϕ ; α = 0.8 and P a / σ n 2 = 5 dB.
Figure 4. The average detection error probability, ξ , versus Carol’s AN-transmit SNR, P c / σ n 2 , for different values of ϕ ; α = 0.8 and P a / σ n 2 = 5 dB.
Sensors 22 05812 g004
Figure 5. The average detection error probability, ξ , versus σ c w 2 for different values of P c / σ n 2 ; α = 0.8 , ϕ = 0.01 and P a / σ n 2 = 5 dB.
Figure 5. The average detection error probability, ξ , versus σ c w 2 for different values of P c / σ n 2 ; α = 0.8 , ϕ = 0.01 and P a / σ n 2 = 5 dB.
Sensors 22 05812 g005
Figure 6. The covert throughput, η u (bits/Hz/s), versus R u , for different values of ϵ ; α = 0.8 , ϕ = 0.01 and P c / σ n 2 = 5 dB.
Figure 6. The covert throughput, η u (bits/Hz/s), versus R u , for different values of ϵ ; α = 0.8 , ϕ = 0.01 and P c / σ n 2 = 5 dB.
Sensors 22 05812 g006
Figure 7. The maximum covert throughput, η u , max (bits/Hz/s), versus σ c w 2 , for different values of ϕ ; ϵ = 0.1 , α = 0.8 and P c / σ n 2 = 5 dB.
Figure 7. The maximum covert throughput, η u , max (bits/Hz/s), versus σ c w 2 , for different values of ϕ ; ϵ = 0.1 , α = 0.8 and P c / σ n 2 = 5 dB.
Sensors 22 05812 g007
Figure 8. The maximum covert throughput, η u , max (bits/Hz/s), versus σ c b 2 , for different values of ϕ ; ϵ = 0.1 , α = 0.8 and P c / σ n 2 = 5 dB.
Figure 8. The maximum covert throughput, η u , max (bits/Hz/s), versus σ c b 2 , for different values of ϕ ; ϵ = 0.1 , α = 0.8 and P c / σ n 2 = 5 dB.
Sensors 22 05812 g008
Figure 9. The maximum covert throughput, η u , max (bits/Hz/s), and the overt throughput, η v , versus the AN transmit SNR, P c / σ n 2 , for different values of ϵ ; ϕ = 0.1 and α = 0.8 .
Figure 9. The maximum covert throughput, η u , max (bits/Hz/s), and the overt throughput, η v , versus the AN transmit SNR, P c / σ n 2 , for different values of ϵ ; ϕ = 0.1 and α = 0.8 .
Sensors 22 05812 g009
Figure 10. The overt throughput loss, η v , loss (bits/Hz/s), versus the AN transmit SNR, P c / σ n 2 , for different values of ϵ ; ϕ = 0.1 and α = 0.8 .
Figure 10. The overt throughput loss, η v , loss (bits/Hz/s), versus the AN transmit SNR, P c / σ n 2 , for different values of ϵ ; ϕ = 0.1 and α = 0.8 .
Sensors 22 05812 g010
Table 1. Table of parameter and metric notations.
Table 1. Table of parameter and metric notations.
ParameterNotation
Alice’s transmit power P a
Carol’s transmit power or the transmit AN power P c
The power allocation ratio α
The cancellation coefficient at Carol ϕ
The channel gain between nodes i and j h i j
The channel gain variance between nodes i and j σ i j 2
The background noise variance σ n 2
The transmission rate of the overt message, v R v
The transmission rate of the covert message, u R u
Covertness requirement ϵ
Average detection error probability ξ
Covert throughput η u
Maximum covert throughput η u , max
Overt throughput η v
Overt throughput loss η v , loss
Received signal at Bob y b
Received signal at Carol y c
Received signal at Willie y w
Table 2. Summary of key results.
Table 2. Summary of key results.
ProsCons
Average detection error probability
-
increases when the AN power P C increases
-
increases when the self-interference cancellation is improved (the cancel coefficient ϕ decreases)
-
increases when the warden is located close to the overt user ( σ c w 2 increases)
Covert throughput
-
increases when the AN power P C increases
-
increases when the self-interference cancellation is improved (the cancel coefficient ϕ decreases)
-
increases when the warden is located close to the overt user ( σ c w 2 increases)
-
decreases when the covert user is located close to the overt user ( σ c b 2 increases)
Overt throughput loss
-
high loss to increase the covert throughput
-
increases when ϵ increases
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, L.L.; Nguyen, T.-T.; Fiche, A.; Gautier, R.; Ta, H.Q. Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver. Sensors 2022, 22, 5812. https://doi.org/10.3390/s22155812

AMA Style

Nguyen LL, Nguyen T-T, Fiche A, Gautier R, Ta HQ. Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver. Sensors. 2022; 22(15):5812. https://doi.org/10.3390/s22155812

Chicago/Turabian Style

Nguyen, Lap Luat, Tien-Tung Nguyen, Anthony Fiche, Roland Gautier, and Hien Q. Ta. 2022. "Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver" Sensors 22, no. 15: 5812. https://doi.org/10.3390/s22155812

APA Style

Nguyen, L. L., Nguyen, T. -T., Fiche, A., Gautier, R., & Ta, H. Q. (2022). Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver. Sensors, 22(15), 5812. https://doi.org/10.3390/s22155812

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop