Next Article in Journal
Testing Protective Clothing with an Emphasis on Subjective Opinions
Previous Article in Journal
Sequence Stratigraphic Analysis of the Volcanic Rock–Evaporite–Clastic Rock Symbiotic Zone in the Fourth Member of the Shahejie Formation in the South of Laizhou Bay
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems

School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(2), 483; https://doi.org/10.3390/app14020483
Submission received: 11 December 2023 / Revised: 31 December 2023 / Accepted: 4 January 2024 / Published: 5 January 2024
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
This research investigates the feasibility of covert and reliable communication between Alice and Bob in the presence of a vigilant adversary, Willie, employing a jammer in a complex Gaussian channel. Alice strategically manipulates the noise-power ratio along the real and imaginary axes to disrupt Willie’s detection capabilities. Covertness constraints are quantified using KL divergence, and transmission performance is assessed through mutual information. Additionally, an optimization method is introduced to enhance covert communication by fine-tuning the amplitude gain and noise-power ratio. Numerical results confirm the effectiveness and superiority of the proposed method, showcasing its ability to maximize covert transmission rates.

1. Introduction

Secure communication has traditionally centered on preventing adversaries from deciphering message content [1,2,3,4]. However, in the realm of wireless communication, traditional information security measures prove inadequate to meet current security demands [5,6]. Even when information is encrypted, the potential leakage of sensitive data through metadata, such as network traffic patterns, poses a significant concern [7].
The imperative to conceal communication behaviors has prompted the development of covert communication technology [8]. In scenarios like battlefield environments or confrontational situations, the slightest indication of exposed communication intentions can lead to significant strategic failures [5]. Consequently, the military has devised diverse techniques, including the spread spectrum technique [6,9,10], to ensure the covertness of communication, aiming to hide its presence from vigilant adversaries. Despite the multitude of proposed covert communication methods, such as encoding information onto the training sequences of WiFi [11], utilizing the cyclic prefix of WiFi OFDM symbols [12], or manipulating a perturbed WiFi QPSK constellation [13], the overarching goal remains the formulation of strategies that effectively obfuscate communication activities in high-stakes environments.
Recent research has pivoted towards the pursuit of reliable covert communication, necessitating that Willie’s detection error in discerning Alice’s transmission to Bob approaches random guessing, while Bob’s error in recovering Alice’s message becomes exceedingly small [14]. Specifically, when employing additive white Gaussian noise (AWGN) channels for both the Alice-to-Bob and Alice-to-Willie communication paths, square root law (SRL) was established by [8,15]. This SRL stipulates that, with a sufficiently lengthy pre-shared secret between Alice and Bob, covert communication can be achieved by constraining the per-symbol power to  O ( 1 n ) , which diminishes to 0 as n increases. As a consequence, Ref. [8] demonstrated the transmission of  O ( n )  bits (and no more) within n channel uses. Subsequent research has delved into various aspects, including the determination of the pre-shared secret’s optimal length in [16,17], the characterization of constants concealed by Big- O  notation in [17,18], and the theoretical and experimental exploration of covert communication over quantum channels in [19]. Moreover, this seminal theorem has subsequently been extended to various channel models, including discrete memoryless channels [17,18,20], binary symmetric channels [16] and multiuser channels [21,22,23,24,25], etc.
In traditional covert communication theory research, significant attention has been devoted to exploring theoretical boundaries over real Gaussian channels. The work presented in [9] expands the scope of covert communication theoretical research to encompass complex Gaussian channels, substantiating the boundary of covert communication over such channels. Existing works have investigated covert communication with random noise [26] and jammers [14,27]. Subsequently, jammer-aided covert communication were extended to UAV communication [28] and backscatter communication [29]. However, existing research on the theoretical boundaries of covert communication has been conducted in the context of real Gaussian channels, and for computational simplicity and optimization convenience, Gaussian input has been employed as the channel input. Nevertheless, in practical communication scenarios, the scenario of using Binary Phase Shift Keying (BPSK) as the channel input in a complex Gaussian channel has not been considered. In this work, we consider covert communication over complex Gaussian channels in the presence of an uninformed jammer. It is worth noting that jammer and Alice do not coordinate fully, similar to the scenario in [14]. As shown in Figure 1, the jammer sends asymmetric complex Gaussian noise signals, interfering with Willie’s covert communication detection. Alice can only control the signal allocation ratio of the jammer, i.e., the power ratio of noise on the real and imaginary axes. Willie cannot demodulate the jamming noise, but Willie can know the power ratio of complex Gaussian noise on the real and imaginary axes in the environment. Regarding Bob, we consider two scenarios: in one case, Bob can perfectly demodulate the jamming noise from the jammer, thereby eliminating interference. In the other case, Bob cannot fully demodulate the jamming noise from the jammer but can partially mitigate the noise interference introduced by the jammer.
Our principal contributions can be succinctly summarized as follows:
(1) We explore covert communication in a scenario with a partially cooperative jammer within a complex Gaussian channel. KL divergence serves as our metric for covertness, while mutual information quantifies the transmission rate.
(2) We adopt BPSK input instead of Gaussian input, enhancing the applicability of our theory in real-world communication systems and bolstering the feasibility of our approach.
(3) Employing Taylor series expansion, we approximate KL divergence and mutual information under BPSK input. Transforming the dual-parameter optimization problem involving transmission amplitude gain and noise allocation ratio into a single-parameter optimization task significantly simplifies the complexity of the optimization process.
(4) Through numerical simulations, we validate our proposed method and theory. The precision of the Taylor approximation and the efficacy of the single-parameter optimization are confirmed, providing robust evidence for the validity of our proposed approach.
The remainder of this paper is organized as follows. In Section 2, the modeling of asymmetric noise communication scenarios is introduced, encompassing a scenario overview and problem formalization. In Section 3, the performance analysis of covert communication is provided, including transmission rates and covertness performance. In Section 4, the optimization method of transmission amplitude and noise power ratio is proposed. Section 5 presents numerical simulations to evaluate the outcomes of the optimization. Finally, Section 6 provides the conclusion and summary of the paper.

2. System Model

2.1. Communication Scenario

As shown in Figure 1, we consider a wireless covert communication scenario with the assistance of a jammer, involving a covert information transmitter (Alice), a covert information receiver (Bob), a covert communication detector (Willie), and a jammer assisting Alice in covert transmission. Alice, Bob, and Willie are equipped with a single antenna. We consider a quasi-static block fading model where the channel is static and frequency-flat within each coherent interval containing n symbols. The signal received by Bob and Willie can be expressed as
Z ^ b = h b D + n j , b + n ^ b ,
Z ^ w = h w D + n j , w + n ^ w ,
respectively, where D C  is the transmitted signal, and  h b C  and  h w C  are Alice-to-Bob and Alice-to-Willie channel coefficient, which are assumed acceptable to everyone.  n j , b  and  n j , w  denote the interference signals received from jammer at Bob and Willie, both of which are composed of the zero-mean complex-valued Gaussian noise vectors. And  n ^ b C  and  n ^ w C  denote the zero-mean complex-valued Gaussian noise vectors with the covariance  2 σ ^ b 2  and  2 σ ^ w 2 . Instead of adopting the conventional assumption of Gaussian input data, we let D be the symbol randomly selected from well-known BPSK constellations set with amplitude gain  β , i.e.,  { β , + β } . In practical communication systems, BPSK modulation is favored over Gaussian modulation due to its simplicity and efficiency [5,8,30]. In contrast, Gaussian modulation introduces complexity with a continuum of signal states, making it less practical for many communication scenarios. Considering the composition of jammer interference signals, we can equivalently rewrite the channel as
Z b = h b D + n b ,
Z w = h w D + n w ,
where  n b CN ( 0 , σ b 2 )  and  n w CN ( 0 , σ w 2 )  denote the equivalent noise after superimposing the interference signals. In the following context, we will analyze and optimize our problem based on equivalent channels (3) and (4).

2.2. Transmission Scheme

Alice encode a message M into a codeword  D n = D 1 , , D n C n  by random coding generation and i-th symbol D is independently drawn from  { β , β }  with equal probability [5,31]. The codeword  D n  is generated independently and identically distribution (i.i.d.) randomly as follows:
P ( D n ) = i = 1 n P D ( D i ) .
Bob employs his contextual understanding to decode the covert messages, based on the observation of  Z b n = [ Z b , 1 , , Z b , n ] C n . The quantification of the transmission rate is accomplished through the assessment of mutual information between the discrete input  D n  and the channel output  Z b n , which is given by
I ( Z b n ; D n ) = I ( Z b , 1 , , Z b , n ; D 1 , , D n ) .
Bob possesses knowledge regarding the construction of the codebook, i.e.,  { β , + β } , and he receives the symbols corrupted by AWGN. Then, we give the following joint distribution of  Z b n  and  D n  as follows:
P ( Z b n D n ) = P D n ( D n ) × W Z b n | D n ( Z b n | D n ) .
where
P Z b n D n ( x , y ) = 1 2 1 2 π σ b , x σ b , y [ exp ( x + h b , x β ) 2 2 σ b , x 2 ( y + h b , y β ) 2 2 σ b , y 2 + exp ( x h b , x β ) 2 2 σ b , x 2 ( y h b , y β ) 2 2 σ b , y 2 ] ,
with  h b , x  and  h b , y  denote the channel coefficient of complex value  h b  on x-axis and y-axis,  σ b , x 2  and  σ b , y 2  denote the variance of the complex Gaussian noise at Bob on the x-axis and y-axis.

2.3. Hypothesis Test

Willie conducts a binary hypothesis test [8] based on n consecutive observations  Z w n = [ Z w , 1 , , Z w , n ] C n  to ascertain whether Alice is communicating to Bob. The total power of the jammer remains constant  P J , but Alice can adjust the power distribution ratio  α  of the jammer’s output signals along the real and imaginary axes. Specifically, the jammer’s power on the x-axis is  α P j , and on the y-axis, it is  ( 1 α ) P j . Due to the differing noise power along the two axes, this configuration results in an asymmetric jammer. Let  σ w , x , 0 2  and  σ w , y , 0 2  denote the variance of the complex Gaussian noise at Willie on the x-axis and y-axis. Specifically, the null hypothesis ( H 0 ) posits the absence of communication, where each sample  Z w , i = n w , i  is an independent and identically distributed (i.i.d.) complex-Gaussian random variable following the distribution  CN (0,  σ a 2 ) with  σ a 2 = σ w , x , 0 2 + σ w , y , 0 2 + P J . On the other hand, the alternative hypothesis ( H 1 ) suggests communication is occurring, and each sample  Z w , i = h w D i + n w , i . Willie’s objective is to discriminate between these two hypotheses:
H 0 : Z w = n w ,
H 1 : Z w = h w D + n w ,
where  h w  is the channel coefficient from Alice to Willie. Let  P 1 n  (resp.  P 0 n ) represent the input distribution corresponding to Willie’s n observations under the conditions of  H 1  (resp.  H 0 ), respectively. The probability of false alarm, rejecting  H 0  when it is true, is denoted by  P F A , while the probability of missed detection, accepting  H 0  when it is false, is denoted by  P M D . Willie has knowledge of the distributions  P 1 n  and  P 0 n , and can conduct an optimal statistical hypothesis test such that  P F A + P M D 1 D ( P 1 n P 0 n ) , where  D ( P 1 n P 0 n )  represents the KL divergence between  P 1 n  and  P 0 n . The objective is to achieve covert communication by ensuring that the sum of error probabilities is one, i.e.,  P F A + P M D = 1 . This implies making  D ( P 1 n P 0 n )  negligible [32,33,34], specifically by guaranteeing that the KL divergence satisfies the condition
D ( P 1 n P 0 n ) ϵ ,
where  ϵ  is an arbitrarily small value within the range (0,1).
Willie possesses knowledge regarding the construction of the codebook and jammer noise, both the set of all potential discrete constellation sets and input distribution, and he receives the symbols corrupted by AWGN. The distribution of  P 0 , w  can be expressed as
P 0 ( x , y ) = 1 2 π ( σ w , x , 0 2 + α P J ) ( σ w , y , 0 2 + ( 1 α ) P J ) ) × exp x 2 2 ( σ w , x , 0 2 + α P J ) y 2 2 ( σ w , y , 0 2 + ( 1 α ) P J ) .
Similarly, The distribution of  P 1 , w n  can be expressed as
P 1 ( x , y ) = 1 2 1 2 π ( σ w , x , 0 2 + α P J ) ( σ w , y , 0 2 + ( 1 α ) P J ) × [ exp ( x h w , x β ) 2 2 ( σ w , x , 0 2 + α P J ) ( y h w , y β ) 2 2 ( σ w , y , 0 2 + ( 1 α ) P J ) + exp ( x + h w , x β ) 2 2 ( σ w , x , 0 2 + α P J ) ( y + h w , y β ) 2 2 ( σ w , y , 0 2 + ( 1 α ) P J ) ] ,
where  h w , x  and  h w , y  denote the channel coefficient of complex value  h w  on x-axis and y-axis.

2.4. Problem Formulation

In this work, we aim to investigate the transmission design with the goal of maximizing the mutual information in (6) while adhering to the covertness constraint stipulated in (11). Our focus lies in the optimization of the amplitude gain  β  and the jammer noise distribution ratio  α  on the x-axis and y-axis. The problem of covert communication in jammer-assist systems is formulated as:
P 1 : max β , α I ( Z b n ; D n )
s . t . D ( P 1 n P 0 n ) ϵ ,
0 < β ,
0 < α < 1 .

3. Design of Amplitude Gain and Jammer Noise Distribution

To compute the optimal jammer noise allocation ratio, we define
σ a 2 σ w , x 2 + σ w , y 2
σ w , x 2 μ σ a 2 = σ w , x , 0 2 + α P J ,
σ w , y 2 ( 1 μ ) σ a 2 = σ w , y , 0 2 + ( 1 α ) P J ,
where  0 < μ < 1  is a auxiliary parameters. Combining with (12) and (13), we have
P 0 ( x , y ) = 1 2 π σ w , x σ w , y exp x 2 2 σ w , x 2 y 2 2 σ w , y 2 P 1 ( x , y ) = 1 2 1 2 π σ w , x σ w , y [ exp ( x h w , x β ) 2 2 σ w , x 2 ( y h w , y β ) 2 2 σ w , y 2
+ exp ( x + h w , x β ) 2 2 σ w , x 2 ( y + h w , y β ) 2 2 σ w , y 2 ] .
Then, the problem P1 can be reformulated as
P 2 : max β , μ I ( Z b n ; D n ) s . t . ( 15 ) , ( 16 ) ,
min { σ w , x , 0 2 σ a 2 , σ w , y , 0 2 σ a 2 } μ max { σ w , x , 0 2 + P J σ a 2 , σ w , y , 0 2 + P J σ a 2 } .
The KL divergence between  P 1  and  P 0  can expressed as
D ( P 1 P 0 ) = P 1 ( x , y ) log P 1 ( x , y ) P 0 ( x , y ) d x d y
where
log P 1 ( x , y ) P 0 ( x , y ) = log 1 2 [ exp h w , x 2 β 2 2 x h w , x β 2 σ w , x 2 h w , y 2 β 2 2 h w , y β 2 σ w , y 2 + exp h w , x 2 β 2 + 2 x h w , x β 2 σ w , x 2 h w , y 2 β 2 + 2 h w , y β 2 σ w , y 2 ] .
Performing Taylor expansion, we can obtain
log P 1 ( x , y ) P 0 ( x , y ) = Z 1 β 2 + Z 2 β 4 + O ( β 5 ) ,
where
Z 1 = h w , x 2 2 σ w , x 2 h w , y 2 2 σ w , y 2 + h w , x h w , y x y σ w , x 2 σ w , y 2 + h w , y 2 y 2 2 σ w , y 4 + h w , x 2 x 2 2 σ w , x 4 ,
Z 2 = h w , x 4 x 4 12 σ w , x 8 h w , y 4 y 4 12 σ w , y 8 h w , x 2 h w , y 2 2 σ w , x 4 σ w , y 4 h w , x 3 h w , y x 3 y 3 σ w , x 6 σ w , y 2 h w , x h w , y 3 x y 3 3 σ w , x 2 σ w , y 6 .
Combining with (27)–(29), Equation (25) can be rewritten as
D ( P 1 P 0 ) = P 1 ( x , y ) Z 1 β 2 + Z 2 β 4 + O ( β 5 ) d x d y .
With some calculations, we can obtain
P 1 ( x , y ) Z 1 β 2 d x d y = h w , x 2 β 2 2 σ w , x 2 h w , y 2 β 2 2 σ w , y 2 + h w , x 2 h w , y 2 β 4 σ w , x 2 σ w , y 2 + h w , y 2 β 2 ( σ w , y 2 + h w , y 2 β 2 ) 2 σ w , y 4 + h w , x 2 β 2 ( σ w , x 2 + h w , x 2 β 2 ) 2 σ w , x 4 + O ( β 5 ) .
and
P 1 ( x , y ) Z 2 β 4 d x d y
= 3 h w , x 4 σ w , x 4 β 4 12 σ w , x 8 3 h w , y 4 σ w , y 4 β 4 12 σ w , y 8 h w , x 2 h w , y 2 σ w , x 2 σ w , y 2 β 4 2 σ w , x 4 σ w , y 4 + O ( β 5 )
= h w , x 4 β 4 4 σ w , x 4 h w , y 4 β 4 4 σ w , y 4 h w , x 2 h w , y 2 β 4 2 σ w , x 2 σ w , y 2 + O ( β 5 )
Then, the KL divergence between  P 1  and  P 0  can be expressed as
D ( P 1 P 0 ) = β 4 4 h w , x 2 σ w , x 2 + h w , y 2 σ w , y 2 2 + O ( β 5 ) .
Combining with (19) and (20), the KL divergence can be expressed as
D ( P 1 n P 0 n ) = n β 4 4 h w , x 2 μ σ a 2 + h w , y 2 ( 1 μ ) σ a 2 2 + O ( β 5 ) .
We can minimize  D ( P 1 P 0 )  by minimizing
F ( μ ) = h w , x 2 μ σ a 2 + h w , y 2 ( 1 μ ) σ a 2 .

4. Analysis of the Transmission Rate

In this section, we will analyze the transmission rate of covert communication with mutual information. Specifically, we consider two cases: (1) Bob can perfectly eliminate the influence of interference; and (2) Bob can partially eliminate the influence of interference.

4.1. Derivation of Mutual Information at Bob

For the two cases we mentioned, the mutual information in (6) can be expressed as
I ( Z b n ; D n ) = n I ( Z b ; D ) .
Considering the codebook in Section 2.2, we have
I ( Z b ; D ) = H ( Z b ) H ( Z b | D )
= p b ( x , y ) log p b ( x , y ) d x d y + i = 1 2 1 2 p b , i ( x , y ) log p b , i ( x , y ) d x d y
= j = 1 2 1 2 p b , j ( x , y ) log i = 1 2 1 2 p b , i ( x , y ) d x d y
+ j = 1 2 1 2 p b , j ( x , y ) log p b , j ( x , y ) d x d y
= j = 1 2 1 2 p b , j ( x , y ) log i = 1 2 1 2 p b , i ( x , y ) p b , j ( x , y ) d x d y ,
where
p b , 1 ( x , y ) = 1 2 π σ b 2 exp ( x + h b , x β ) 2 2 σ b , x 2 ( y + h b , y β ) 2 2 σ b , y 2 ,
p b , 2 ( x , y ) = 1 2 π σ b 2 exp ( x h b , x β ) 2 2 σ b , x 2 ( y h b , y β ) 2 2 σ b , y 2 .
Performing Taylor expansion, we have
log i = 1 2 1 2 p b , i ( x , y ) p b , 1 ( x , y ) = β h b , x x σ b , x 2 + h b , y y σ b , y 2 + β 2 h b , x 2 x 2 2 σ b , x 4 + h b , y y 2 2 σ b , y 4 + h b , x h b , y x y σ b , x 2 σ b , y 2 + O ( β 3 ) ,
and
log i = 1 2 1 2 p b , i ( x , y ) p b , 2 ( x , y ) = β h b , x x σ b , x 2 + h b , y y σ b , y 2 + β 2 h b , x 2 x 2 2 σ b , x 4 + h b , y y 2 2 σ b , y 4 + h b , x h b , y x y σ b , x 2 σ b , y 2 + O ( β 3 ) .
With some calculations, we can obtain
j = 1 2 1 2 p b , j ( x , y ) log i = 1 2 1 2 p b , i ( x , y ) p b , j ( x , y ) d x d y
= h b , x 2 β σ b , x 2 + h b , y 2 β σ b , y 2 β + ( h b , x 2 2 σ b , x 2 + h b , y 2 2 σ b , y 2 ) β 2 + O ( β 3 )
= h b , x 2 2 σ b , x 2 + h b , y 2 2 σ b , y 2 β 2 + O ( β 3 ) ,
and the mutual information can be expressed as
I ( Z b ; D ) = h b , x 2 2 σ b , x 2 + h b , y 2 2 σ b , y 2 β 2 + O ( β 3 ) .

4.2. Problem Reformulation for Two Cases

To measure the influence of interference, we define
σ b , x 2 σ b , x , 0 2 + α Δ P J ,
σ b , y 2 σ b , y , 0 2 + ( 1 α ) Δ P J .
where  Δ P J  denotes the jammer interference power after interference elimination.
Case 1: if Bob can perfectly eliminate the influence of interference,  Δ P J = 0 . Taking the derivative of the function  F ( μ ) , the minimal value  F ( μ )  can be obtained when
μ = h w , x h w , y + h w , x .
Considering the range of  μ  given in (24), the minimization of the KL divergence can be achieved when
μ = max { σ w , x , 0 2 + P J σ a 2 , σ w , y , 0 2 + P J σ a 2 } max { σ w , x , 0 2 + P J σ a 2 , σ w , y , 0 2 + P J σ a 2 } h w , x h w , y + h w , x h w , x h w , y + h w , x min { σ w , x , 0 2 σ a 2 , σ w , y , 0 2 σ a 2 } < h w , x h w , y + h w , x < max { σ w , x , 0 2 + P J σ a 2 , σ w , y , 0 2 + P J σ a 2 } min { σ w , x , 0 2 σ a 2 , σ w , y , 0 2 σ a 2 } h w , x h w , y + h w , x min { σ w , x , 0 2 σ a 2 , σ w , y , 0 2 σ a 2 }
Combining with (35), (36) and the optimal  μ , the constraint (15) can be rewritten as
n β 4 4 F 2 ( μ ) ϵ ,
and the optimal amplitude gain  β  is given by
β = 4 ϵ n F 2 ( μ ) 1 4 .
Then, we can obtain the maximum mutual information as
I ( Z b n ; D n ) = 4 n ϵ F 2 ( μ ) h b , x 2 2 σ b , x , 0 2 + h b , y 2 2 σ b , y , 0 2 .
Case 2: Bob can partially eliminate the influence of interference,  Δ P J = η P J  where  η ( 0 , 1 )  denotes the coefficient of Bob’s interference cancellation capability. Combining with (19) and (20), the ratio  α  is given by
α = μ σ a 2 σ w , x , 0 2 P J .
Then, the mutual information can be expressed as
I ^ ( Z b n ; D n ) = n ϵ F 2 ( μ ) h b , x 2 ( σ b , x , 0 2 + α η P J ) + h b , y 2 ( σ b , y , 0 2 + ( 1 α ) η P J ) .
Combining with (23), (16), (17) and (24), the problem P2 can be equivalently transformed to
P 3 : max μ I ^ ( Z b n ; D n )
s . t . ( 24 ) .
Clearly, the optimal value of  μ  and the maximization of mutual information can be effortlessly obtained through an iterative exploration algorithm for  α . Then, we can obtain the optimal amplitude gain  β , and the original problem P1 has been fully addressed.

5. Numerical Results

In this section, we initiate the validation of our proposed KL divergence and mutual information approximation methods, operating within two distinct scenarios that encompass diverse  h w  and  h b  channel coefficients, along with varying interferer total power levels. Following the confirmation of the precision of these approximation methods, we conduct a thorough performance analysis, assessing both covertness and transmission rate using our proposed methodology. Subsequently, we ascertain the optimal noise allocation ratio for interferers. Finally, through a comparative performance evaluation between the optimal interference noise allocation ratio and alternative ratios, we establish the efficacy and superiority of the optimization method we have introduced.
In Figure 2a, the graph illustrates the KL divergence versus amplitude gain ( β ). We compare two scenarios with distinct parameters:  h w , x , 0 = h w , y , 0 = 0.5 P J = 3  and  h w , x , 0 = h w , y , 0 = 0.3 P J = 5 . As depicted in Figure 2a, with the increase in amplitude gain ( β ), KL divergence gradually increases, indicating a deterioration in covertness. The Taylor expansion results obtained for KL divergence exhibit high fidelity with the precise values as  β  increases, affirming the precision and effectiveness of our proposed method in characterizing KL divergence in covert communication. Figure 2b presents the KL divergence versus amplitude gain ( β ) graph. We compare two scenarios with parameters  h b , x , 0 = h b , y , 0 = 0.5 P J = 3 η = 0.3  and  h b , x , 0 = h b , y , 0 = 0.2 P J = 5 η = 0.3 . As illustrated in Figure 2b, with the increase in amplitude gain ( β ), mutual information and transmission rate gradually increase. The Taylor expansion results for transmission rate exhibit high fidelity with the precise values as  β  increases, demonstrating the precision and effectiveness of our proposed method in characterizing transmission rate in covert communication.
In Figure 3 and Figure 4, we design three distinct scenarios for comparative experiments. The parameters for the three scenarios are provided in Table 1.
In Figure 3a, Scenarios 1, 2, and 3 achieve optimal covertness ( α = 0.48 α = 0.58 α = 0.45 , respectively) with minimal KL divergence values. In Figure 3b, Scenarios 1, 2, and 3 achieve maximum transmission rates ( α = 1 α = 0 α = 0 , respectively). To obtain the globally optimal value for  α  that maximizes transmission rate under the same amplitude gain and covertness constraints, we utilize our proposed method and obtain the results of transmission rate versus noise allocation ratio  α  for the three scenarios.
As depicted in Figure 4, the results show the transmission rate versus noise allocation ratio  α  for  β = 0.1 . In Scenario 1, the maximum covert transmission rate is achieved at  α = 0.78 ; in Scenario 2, it is at  α = 0.7 , and in Scenario 3, it is at  α = 0.3 . Subsequently, based on the parameters of Scenario 3 and the obtained optimal noise allocation ratio  α = 0.3 , we conduct a theoretical validation.
Figure 5a presents the KL divergence versus amplitude gain ( β ) results. We compare the results with the globally optimal allocation ratio  α = 0.3  against samples with  α = 0.5  and  α = 0.8 . As  β  increases,  α = 0.3  consistently maintains optimal covertness (lower KL divergence values). Figure 5b displays the mutual information versus amplitude gain ( β ) results. We select the transmission rate at the globally optimal allocation ratio  α = 0.3  and compare it with samples at  α = 0.5  and  α = 0.8 . As  β  increases,  α = 0.8  exhibits the lowest transmission rate. However,  α = 0.5  achieves a higher transmission rate than the globally optimal allocation ratio  α = 0.3 . Considering the substantial degradation in covertness at  α = 0.5 , further comparison under the same covertness constraints is necessary.
Figure 6 depicts the covert transmission rate versus covertness constraint  ϵ . We select the results at the globally optimal allocation ratio  α = 0.3  and compare them with samples at  α = 0.5  and  α = 0.8 . With an increasing covertness constraint  ϵ , the covert transmission rate gradually increases. Under the same covertness constraint,  α = 0.3  attains the highest covert transmission rate. Combining the results from Figure 5a,b, our proposed optimization method achieves the globally optimal noise allocation ratio, realizing the maximum covert transmission rate under the same covertness constraints. Simulation results validate the effectiveness and superiority of our proposed method.

6. Conclusions

In this work, we investigate covert communication in a complex Gaussian channel with a partially coordinate jammer. Specifically, Alice aims to transmit covert information to Bob using BPSK codebook, while remaining undetected by Willie throughout the covert communication process. A jammer is present to assist Alice in covert communication, but Alice has limited control over the jammer, with adjustments constrained to the power allocation ratio along the real and imaginary axes in the complex Gaussian channel.
We employ KL divergence as a metric for covertness and mutual information as a metric for transmission rate. The optimization task involves adjusting both the amplitude of Alice’s transmitted signal and the power allocation ratio of the jammer. Leveraging Taylor series expansion techniques, we approximate KL divergence and mutual information. Combining our approximation results, we degrade the complex dual-parameter optimization problem into a single-parameter traversal problem, simplifying the optimization complexity.
Numerical simulations validate the effectiveness of our proposed theory. In future work, we plan to extend the study to include different modulation schemes adopted by Alice, such as 16-QAM, 64-QAM, and other scenarios.

Author Contributions

Conceptualization, S.Q. and R.Z.; methodology, S.Q. and R.Z.; software, J.Z. and X.J.; validation, S.Q. and X.J.; writing—original draft preparation, H.D. and R.Z.; writing—review and editing, J.Z. and H.D.; visualization, H.D. and X.J.; supervision, S.Q. and J.Z.; funding acquisition, R.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China grant number U1836104, 61801073, 61931004, 62072250, National Key Research and Development Program of China grant number 2021QY0700, and The Startup Foundation for Introducing Talent of NUIST grant number 2021r039.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available in the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
WIFIWireless Fidelity
OFDMOrthogonal frequency-division multiplexing
BPSKBinary Phase Shift Keying
AWGNAdditive White Gaussian Noise
QPSKQuadrature Phase Shift Keying

References

  1. Wu, Z.; Liu, R.; Shuai, H.; Zhu, S.; Li, C. Covert performance for integrated satellite multiple terrestrial relay networks with partial relay selection. Sensors 2022, 22, 5524. [Google Scholar] [CrossRef]
  2. Moon, J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors 2023, 23, 8747. [Google Scholar] [CrossRef]
  3. Iqbal, A.; Al-Habashna, A.; Wainer, G.; Bouali, F.; Boudreau, G.; Wali, K. Deep Reinforcement Learning-Based Resource Allocation for Secure RIS-aided UAV Communication. In Proceedings of the 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, China, 10–13 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
  4. Iqbal, A.; Tham, M.L.; Wong, Y.J.; Al-Habashna, A.; Wainer, G.; Zhu, Y.X.; Dagiuklas, T. Empowering Non-Terrestrial Networks With Artificial Intelligence: A Survey. IEEE Access 2023, 11, 100986–101006. [Google Scholar] [CrossRef]
  5. Qiao, S.; Cao, D.; Zhang, Q.; Xu, Y.; Liu, G. Covert Communication Gains From Adversary’s Uncertainty of Phase Angles. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2899–2912. [Google Scholar] [CrossRef]
  6. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef]
  7. Hu, J.; Lin, C.; Li, X. Relationship Privacy Leakage in Network Traffics. In Proceedings of the 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–9. [Google Scholar] [CrossRef]
  8. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  9. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1173–1198. [Google Scholar] [CrossRef]
  10. Çek, M.E.; Savaci, F. Stable non-Gaussian noise parameter modulation in digital communication. Electron. Lett. 2009, 45, 1256–1257. [Google Scholar] [CrossRef]
  11. Classen, J.; Schulz, M.; Hollick, M. Practical covert channels for WiFi systems. In Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 209–217. [Google Scholar] [CrossRef]
  12. Grabski, S.; Szczypiorski, K. Steganography in OFDM Symbols of Fast IEEE 802.11n Networks. In Proceedings of the 2013 IEEE Security and Privacy Workshops, San Francisco, CA, USA, 23–24 May 2013; pp. 158–164. [Google Scholar] [CrossRef]
  13. D’Oro, S.; Restuccia, F.; Melodia, T. Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 1585–1593. [Google Scholar] [CrossRef]
  14. Sobers, T.V.; Bash, B.A.; Guha, S.; Towsley, D.; Goeckel, D. Covert communication in the presence of an uninformed jammer. IEEE Trans. Wirel. Commun. 2017, 16, 6193–6206. [Google Scholar] [CrossRef]
  15. Bash, B.A.; Goeckel, D.; Towsley, D. Square root law for communication with low probability of detection on AWGN channels. In Proceedings of the 2012 IEEE International Symposium on Information Theory Proceedings, Cambridge, MA, USA, 1–6 July 2012; pp. 448–452. [Google Scholar]
  16. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable deniable communication: Hiding messages in noise. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2945–2949. [Google Scholar]
  17. Bloch, M.R. Covert communication over noisy channels: A resolvability perspective. IEEE Trans. Inf. Theory 2016, 62, 2334–2354. [Google Scholar] [CrossRef]
  18. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef]
  19. Bash, B.A.; Gheorghe, A.H.; Patel, M.; Habif, J.L.; Goeckel, D.; Towsley, D.; Guha, S. Quantum-secure covert communication on bosonic channels. Nat. Commun. 2015, 6, 8626. [Google Scholar] [CrossRef] [PubMed]
  20. Tahmasbi, M.; Bloch, M.R. First- and Second-Order Asymptotics in Covert Communication. IEEE Trans. Inf. Theory 2019, 65, 2190–2212. [Google Scholar] [CrossRef]
  21. Arumugam, K.S.K.; Bloch, M.R. Covert Communication Over a K-User Multiple-Access Channel. IEEE Trans. Inf. Theory 2019, 65, 7020–7044. [Google Scholar] [CrossRef]
  22. Kumar Arumugam, K.S.; Bloch, M.R. Embedding Covert Information in Broadcast Communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef]
  23. Cho, K.H.; Lee, S.H. Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels. IEEE Trans. Inf. Forensics Secur. 2021, 16, 322–332. [Google Scholar] [CrossRef]
  24. Kibloff, D.; Perlaza, S.M.; Wang, L. Embedding Covert Information on a Given Broadcast Code. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 2169–2173. [Google Scholar] [CrossRef]
  25. Tan, V.Y.F.; Lee, S.H. Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1377–1389. [Google Scholar] [CrossRef]
  26. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving Covert Wireless Communications Using a Full-Duplex Receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef]
  27. Li, K.; Kelly, P.A.; Goeckel, D. Optimal power adaptation in covert communication with an uninformed jammer. IEEE Trans. Wirel. Commun. 2020, 19, 3463–3473. [Google Scholar] [CrossRef]
  28. Du, H.; Niyato, D.; Xie, Y.A.; Cheng, Y.; Kang, J.; Kim, D.I. Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication. IEEE Trans. Wirel. Commun. 2022, 40, 2962–2979. [Google Scholar] [CrossRef]
  29. Wang, Y.; Yan, S.; Yang, W.; Huang, Y.; Liu, C. Energy-Efficient Covert Communications for Bistatic Backscatter Systems. IEEE Trans. Veh. Commun. 2021, 70, 2906–2911. [Google Scholar] [CrossRef]
  30. Bash, B.A.; Goeckel, D.; Towsley, D. Covert communication gains from adversary’s ignorance of transmission time. IEEE Trans. Wirel. Commun. 2016, 15, 8394–8405. [Google Scholar] [CrossRef]
  31. Chen, W.; Ding, H.; Wang, S.; Gong, F. On the limits of covert ambient backscatter communications. IEEE Wirel. Commun. Lett. 2021, 11, 308–312. [Google Scholar] [CrossRef]
  32. Abdelaziz, A.; Koksal, C.E. Fundamental limits of covert communication over MIMO AWGN channel. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; pp. 1–9. [Google Scholar] [CrossRef]
  33. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef]
  34. Wang, H.M.; Zhang, Y.; Zhang, X.; Li, Z. Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks. IEEE Trans. Commun. 2020, 68, 389–401. [Google Scholar] [CrossRef]
Figure 1. Covert communication in jammer-assist systems.
Figure 1. Covert communication in jammer-assist systems.
Applsci 14 00483 g001
Figure 2. Performance analysis of covert communication in jammer-assist system. (a) KL divergence versus amplitude gain. (b) Transmission rate versus amplitude gain.
Figure 2. Performance analysis of covert communication in jammer-assist system. (a) KL divergence versus amplitude gain. (b) Transmission rate versus amplitude gain.
Applsci 14 00483 g002
Figure 3. Performance analysis of covert communication in jammer-assist system. (a) KL divergence versus jammer noise ratio. (b) Transmission rate versus jammer noise ratio.
Figure 3. Performance analysis of covert communication in jammer-assist system. (a) KL divergence versus jammer noise ratio. (b) Transmission rate versus jammer noise ratio.
Applsci 14 00483 g003
Figure 4. Transmission rate versus jammer noise ratio in three scenarios.
Figure 4. Transmission rate versus jammer noise ratio in three scenarios.
Applsci 14 00483 g004
Figure 5. Performance comparison of difference jammer noise ratio. (a) KL divergence versus amplitude gain. (b) Transmission rate versus amplitude gain.
Figure 5. Performance comparison of difference jammer noise ratio. (a) KL divergence versus amplitude gain. (b) Transmission rate versus amplitude gain.
Applsci 14 00483 g005
Figure 6. Covert transmission rate versus covertness constraint.
Figure 6. Covert transmission rate versus covertness constraint.
Applsci 14 00483 g006
Table 1. Parameters for comparative experiments.
Table 1. Parameters for comparative experiments.
Scenario P J σ w , x , 0 σ w , y , 0 h w , x h w , y η σ b , x , 0 σ b , y , 0 h b , x h b , y
153.52.50.460.380.33.82.20.220.56
254.53.50.450.440.33.52.00.410.52
355.51.50.150.130.32.84.20.150.18
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qiao, S.; Zhu, R.; Ji, X.; Zhao, J.; Ding, H. The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems. Appl. Sci. 2024, 14, 483. https://doi.org/10.3390/app14020483

AMA Style

Qiao S, Zhu R, Ji X, Zhao J, Ding H. The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems. Applied Sciences. 2024; 14(2):483. https://doi.org/10.3390/app14020483

Chicago/Turabian Style

Qiao, Sen, Ruizhi Zhu, Xiaopeng Ji, Junjie Zhao, and Huihui Ding. 2024. "The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems" Applied Sciences 14, no. 2: 483. https://doi.org/10.3390/app14020483

APA Style

Qiao, S., Zhu, R., Ji, X., Zhao, J., & Ding, H. (2024). The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems. Applied Sciences, 14(2), 483. https://doi.org/10.3390/app14020483

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop