Next Article in Journal
Effectiveness of Nanotechnology Treatments in Composite Aircraft Applications
Previous Article in Journal
Xylene versus Isopropanol for Paraffin Wax Processing of Lung Tissue
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems

School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(5), 1727; https://doi.org/10.3390/app14051727
Submission received: 10 January 2024 / Revised: 19 February 2024 / Accepted: 19 February 2024 / Published: 20 February 2024
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
This study investigates covert communication in multi-sensor systems employing Intelligent Reflecting Surfaces (IRSs). Different from previous works, we focus on optimizing transmission amplitudes and phase angles for a 2-BPSK codebook in the presence of asymmetric noise over complex Gaussian channels. We adopt KL divergence as a covertness constraint and mutual information as a metric for transmission rate. We employ Taylor series expansion to approximate KL divergence and mutual information. Leveraging these approximations, we derive optimal phase angles through a proposed gradient descent algorithm. The numerical simulations validate the effectiveness and precision of our Taylor approximation method. Through validation in different scenarios, our algorithm demonstrates robust convergence, deriving all optimal phase angles. Comparing initial phase angles from prior works to those obtained via our algorithm, we observe a higher covert transmission rate.

1. Introduction

In the era of the Internet of Things (IoT), the surge in demand for the transmission of sensor information is witnessing exponential growth [1,2]. Addressing security concerns pertaining to information transmission in multi-sensor environments emerges as a pivotal undertaking [3,4,5]. Traditional encryption methodologies and techniques in physical layer security primarily concentrate on protecting the communication content [6,7]. Nevertheless, the mere protection of communication content no longer suffices to meet contemporary information security requisites [8,9]. To hide the communication behaviors, covert communication, also known as low probability of detection (LPD) communication, was proposed [10].
Extensive research has been conducted on covert communication techniques in military communication, with a focus on methods like spread spectrum and frequency-hopping communication [9,11,12,13]. These techniques aim to conceal the existence of communication from vigilant adversaries. However, the theoretical boundaries of covert communication were initially explored in [14], where the square root law (SRL) in additive white Gaussian noise (AWGN) channels was discovered. This seminal discovery was subsequently expanded to various channel models, encompassing binary symmetric channels [15], discrete memoryless channels [16,17,18], and multi-user channels [19,20,21,22,23], among others.
In this work, we investigate IRS-enabled covert communication in multi-sensor systems, comprising a central processing unit (CPU) and a sensor cluster with N independent sensors, as shown in Figure 1. Alice utilizes IRS-reflected signals to covertly access one of the sensors, while Willie, as the detecting entity, aims to ascertain the presence of covert access. To reduce operational complexity and communication costs, Alice employs the 2-BPSK codebook proposed in [8] for covert communication. The main contributions of this paper are summarized as follows:
(1)
We conducted the first theoretical study on IRS-enabled covert communication in multi-sensor systems with a 2-BPSK codebook. We provided closed-form solutions for the KL divergence and mutual information analysis of the target system.
(2)
We introduced a gradient descent algorithm, which, when employed, yields optimal initial phase angles for 2-BPSK. This algorithm both ensures covertness and maximizes the transmission rate.
(3)
We proposed a physical layer optimization method for IRS-enabled covert communication, transforming the multi-parameter optimization problem of transmission amplitude and phase angles into a phase-angle optimization problem. Based on the optimized phase angles, we obtained the optimal transmission amplitude.
(4)
Through experimental simulations, we validated the effectiveness of the proposed gradient descent algorithm. Comparative analysis with traditional phase angle parameters demonstrated that our optimization method achieves a better covert transmission rate under the same covertness constraints.
The subsequent sections of this paper are structured as follows. Section 2 introduces related works. In Section 3, the system model of IRS covert communication in multi-sensor systems is introduced. The achievability and the transmission performance analysis of covert communication are provided in Section 4 and Section 5. In Section 6, the optimization problem is reformulated and a gradient descent optimization algorithm is proposed to solve the problem. Section 7 provides numerical simulations to verify the effectiveness and superiority of our method. Finally, Section 8 provides the discussion and conclusions of this paper.

2. Related Works

In previous works, a myriad of strategies have been presented to enhance the efficacy of covert communication across diverse scenarios. These approaches span a spectrum, including the utilization of relaying networks [24,25], multiple interference networks [26,27], and multi-user networks [28]. Particularly noteworthy is the observation by Lu et al. [29], who recognized the potential of the intelligent reflecting surface, also referred to as the reconfigurable intelligent surface (RIS), in amplifying the received signal at the intended receiver while concurrently attenuating the signal at potential eavesdroppers. In their system model, Alice covertly transmits messages by either reflecting her signal to Bob or introducing additional noise to confuse potential eavesdroppers through IRS devices. Recent studies [30,31,32] have built upon this foundation, demonstrating that exploiting uncertainty about noise can effectively enhance covert performance in IRS covert communication. Furthermore, research has delved into the optimization of transmission power and reflection beamforming in IRS networks [30,33,34,35,36,37]. Additionally, covert communication within Unmanned-Aerial-Vehicle-mounted IRS (UIRS) communication systems has garnered attention in recent investigations [38,39].
In [40,41], the spectrum and time resources have been adopted to improve the performance of covert communication. Moreover, in [8], the authors have proved that phase resources can also be utilized to enhance the performance of covert communication. They extended IRS covert communication to the complex Gaussian channel and introduced a novel codebook, i.e., the N-BPSK codebook. This codebook is derived from the traditional BPSK codebook, and a simple reflect operation allows obtaining the full phase gain. This gain is crucial as traditional IRS covert communication requires biased reflection operations for each symbol, imposing high hardware demands and increased complexity on the IRS [8].
While their work and findings are significant, their analysis of IRS covert communication is limited to scenarios with symmetric noise, specifically where the noise variances on the real and imaginary axes are equal. However, in multi-sensor scenarios, channel noise is typically asymmetric due to the dispersed positions of sensors and varying signal transmission intervals. The performance boundaries of covert communication under such conditions merit further investigation.

3. System Model

3.1. Communication Scenario and Equivalent Channel

We examine a discrete-time additive white Gaussian noise channel model with complex values, as depicted in Figure 1. The central processing unit (CPU) broadcasts n complex-valued symbols S R = { S R , i } i = 1 n to N sensors, and each sensor, denoted as the k-th sensor, transmits feedback information to the CPU in n complex-valued symbols S F , k = { S F , k , i } i = 1 n . To optimize the transmission rate, both the broadcast and feedback signals follow Gaussian distributions, where S R , i CN ( 0 , 2 σ R 2 ) and S F , k , i CN ( 0 , 2 σ F , k 2 ) . The transmitter, represented by the intelligent reflecting surface (IRS) or Alice, aims to transmit n complex-valued symbols c = { c i } i = 1 n to reach the target sensor, Bob. Meanwhile, the detector, Willie, endeavors to detect any access attempts. All transmission and feedback activities occur within a single time slot. Consequently, the i-th symbol received by Bob and Willie can be expressed as:
Y ^ B , i = h R B S R , i + h R A h A B S R , i c i + k = 1 N h F B , k S F , k , i + N ^ B , i ,
Y ^ W , i = h R W S R , i + h R A h A W S R , i c i + k = 1 N h F W , k S F , k , i + N ^ W , i ,
where N ^ B , i and N ^ W , i represent independent and identically distributed (i.i.d.) Gaussian noise components with variances 2 σ ^ B 2 and 2 σ ^ W 2 , respectively. Specifically, N ^ B , i CN ( 0 , 2 σ ^ B 2 ) and N ^ W , i CN ( 0 , 2 σ ^ W 2 ) . The channel coefficients from the central processing unit (CPU) to Alice, Bob, and Willie are denoted by h R A , h R B , and  h R W , respectively. Additionally, the channel coefficients from Alice to Bob and from Alice to Willie are represented by h A B and h A W , respectively. The channel coefficients from the k-th sensor to Bob and Willie are denoted by h F B , k and h F W , k , respectively. For simplicity, we assume that the CPU broadcasts n symbols with a phase angle of zero, and all channel coefficients are universally known. Given the multitude of sensors, Bob and Willie face challenges in demodulating all signals. Consequently, the feedback signals from the sensors are treated as interference. Considering the composition of feedback signals from N sensors, the channel can be equivalently expressed as:
Y B , i = h R B S R , i + h R A h A B S R , i c i + N B , i ,
Y W , i = h R W S R , i + h R A h A W S R , i c i + N W , i ,
where N B , i CN ( 0 , 2 σ B 2 ) and N W , i CN ( 0 , 2 σ W 2 ) with σ B 2 = E ( | k = 1 N h F B , k S F , k , i | 2 ) + σ ^ B 2 and σ W 2 = E ( | k = 1 N h F W , k S F , k , i | 2 ) + σ ^ W 2 .
Based on the scenario and actual situation considerations, we assume that Bob and Willie can recover the broadcast information S R and perform a subtraction operation on their observations to improve transmission performance and detection performance. Then, the i-th symbol received by Bob and Willie can be equivalently rewritten as
Y B , i = h R A h A B S R , i c i + N B , i
Y W , i = h R A h A W S R , i c i + N W , i .
In the following context, our problem will be analyzed on equivalent channels (5) and (6).

3.2. Construction of 2-BPSK Codebook

Alice employs a covert communication strategy with Bob by manipulating the reflection coefficient of the IRS, adjusting both its amplitude and phase. Alice transmits a message W uniformly distributed in the range [ [ 1 , M ] ] to Bob by encoding it into a codeword c n = c 1 , c 2 , , c n with a blocklength of n. In this work, we adopt the 2-BPSK codebook, proposed in [8], instead of the conventional Gaussian codebook or BPSK codebook. To construct the 2-BPSK codebook, we need to construct a BPSK codebook first.
In the BPSK codebook, each symbol c i exhibits a consistent amplitude β and two potential phases, denoted as θ ˜ 1 and θ ˜ 1 + π . Specifically, the expression for each symbol c i can be either ( β , θ ˜ 1 ) or ( β , θ ˜ 1 + π ) . The codeword c n is independently and randomly generated based on the distribution P B n ( c n ) = i = 1 n P B ( c i ) , where P B ( c i = ( β , θ ˜ 1 ) ) = P B ( c i = ( β , θ ˜ 1 + π ) ) = 1 / 2 . The 2-BPSK codebook is constructed by reflecting the BPSK codebook. By introducing a fixed phase angle θ ^ to each symbol c i , Alice can create another BPSK codebook with varying phase angles. In other words, Alice transmits each codeword in BPSK with an additional phase angle θ ^ , and each symbol c i can be expressed as either ( β , θ ˜ 1 + θ ^ ) or ( β , θ ˜ 1 + θ ^ + π ) . For the sake of simplicity in notation, we redefine the symbols ( β , θ ˜ 1 + π ) and ( β , θ ˜ 1 + θ ^ + π ) as ( β , θ ˜ 1 ) and ( β , θ ˜ 1 + θ ^ ) .
Assuming that Alice may optionally append an additional phase angle θ ^ or choose not to perform this operation, we can obtain two independent BPSK codebooks. By combining these two codebooks, we can construct a 2-BPSK codebook. In the 2-BPSK codebook, each codeword can be represented as either ( β , θ ˜ 1 ) and ( β , θ ˜ 1 ) or ( β , θ ˜ 2 ) and ( β , θ ˜ 2 ) , where θ ˜ 2 = θ ˜ 1 + θ ^ . It is assumed that the codebook is revealed to Willie, including the value of amplitude gain β and the set of all possible angles, i.e.,  { θ ˜ 1 , θ ˜ 2 } .

3.3. Transmission Scheme

By employing random coding generation of the 2-BPSK codebook, Alice encodes a message W into a codeword c 1 n = c 1 , 1 , , c 1 , n C n or c 2 n = c 2 , 1 , , c 2 , n C n , where c 1 , i { ( β , θ ˜ 1 ) , ( β , θ ˜ 1 ) } and c 2 , i { ( β , θ ˜ 2 ) , ( β , θ ˜ 2 ) } with i [ 1 , n ] . For the i-th symbol, its amplitude is independently selected from ± β and its phase angle is independently selected from { θ ˜ 1 , θ ˜ 2 } equiprobably [8,42]. The codeword c n is generated independently and identically distributed according to the following probability distribution:
P ( c n ) = 1 2 i = 1 n P c 1 ( c 1 , i ) + 1 2 i = 1 n P c 2 ( c 2 , i ) .
Then, the mutual information can be expressed as
I ( Y b n ; c n ) = I ( Y b , 1 , , Y b , n ; c 1 , , c n ) .
where c n denotes the discrete input and Y b n denotes the channel output. Combined with the construction o the 2-BPSK codebook, the mutual information in (8) can be expressed as
I ( Y b n ; c n ) = 1 2 I ( Y b , 1 , 1 , , Y b , 1 , n ; c 1 , 1 , , c 1 , n ) + 1 2 I ( Y b , 2 , 1 , , Y b , 2 , n ; c 2 , 1 , , c 2 n ) .

3.4. Hypothesis Test

In the analysis of a quasi-static flat fading channel characterized by coefficients h R A and h A W , the anticipated amplitude of the complex-value h R A h A W S R , i is denoted as A, and the expected phase angle is represented as θ 0 . The determination of Alice’s communication activity involves Willie conducting a binary hypothesis test [43] based on a sequence of n observations Y W = { Y W , i } i = 1 n . Specifically, the null hypothesis ( H 0 ) and alternative hypothesis ( H 1 ) are formulated as:
H 0 : Y W , i = N W , i ,
H 1 : Y W , i = h R A h A W S R , i c i + N W , i .
Let Q 0 n (resp. Q ¯ 1 ( n ) ) denote the probability distribution of Willie’s n observations when H 0 (resp. H 1 ) is true. Willie has knowledge of the distributions Q 1 ( n ) and Q 0 n and can conduct an optimal statistical hypothesis test such that the sum of the probability of missed detection P F A and the probability of false alarm has a lower bound, which is given by
P F A + P M D 1 D ( Q 1 ( n ) Q 0 n ) ,
where D ( Q 1 ( n ) Q 0 n ) represents the KL divergence between Q 1 ( n ) and Q 0 n . The objective of covert communication is to ensure the KL divergence is negligible, i.e., guaranteeing
D ( Q 1 ( n ) Q 0 n ) ϵ ,
where ϵ is an arbitrarily small value within the range (0,1).
Given the non-uniform distribution of sensors in the target scenario, the noise generated in the complex Gaussian channel is asymmetric, i.e.,  σ W 2 = σ w , x 2 + σ w , y 2 and σ w , x 2 σ w , y 2 . Willie possesses knowledge regarding the construction of the codebook 2-BPSK and channel coefficient from Alice to Willie. The probability distributions of Y W under H 0 and H 1 are given by
Q 0 n ( x , y ) = i = 1 n 1 2 π σ w , x σ w , y exp x 2 2 σ w , x 2 y 2 2 σ w , y 2 , Q 1 ( n ) ( x , y ) = 1 2 t = 1 2 i = 1 n 1 2 1 2 π σ w , x σ w , y [ exp ( x i + A β cos θ t ) 2 2 σ w , x 2 ( y i + A β sin θ t ) 2 2 σ w , y 2
+ exp ( x i A β cos θ t ) 2 2 σ w , x 2 ( y i A β sin θ t ) 2 2 σ w , y 2 ] ,
where θ t = θ 0 + θ ˜ t , σ w , x 2 and σ w , y 2 represent the variances of the Gaussian noise at Willie on the x-axis and y-axis.

3.5. Problem Formulation and Optimization Method Proposed

In this work, we aim to maximize the transmission rate in (9) while satisfying the covertness constraint in (13). To alleviate the complexity and burden associated with IRS covert communication, we employ the 2-BPSK codebook proposed in [8] instead of the Gaussian codebook or the BPSK codebook. Alice randomly selected either sub-codebook from the 2-BPSK codebook for communication. To maximize the transmission rate, optimization is performed on the transmission amplitudes β and phase angles of the two sub-codebooks, i.e.,  θ 1 and θ 2 . The problem in this work can be formulated as:
P 1 : max β , { θ } I ( Y b n ; c n )
s . t . D ( Q 1 ( n ) Q 0 n ) ϵ ,
0 < β ,
0 < θ 1 < π ,
0 < θ 2 < π .
To solve the problem P1, we adopted an optimization approach different from previous works, as illustrated in Figure 2. In Section 3, we formulated this problem, which is a two-parameter optimization problem. We decomposed the problem into scaling the optimization objective (16) and constraints (17) and approximated mutual information and KL divergence in Section 4 and Section 5. In Section 4, we approximated KL divergence using a Taylor series expansion method, transforming the complex integration process for computing KL divergence into a summation. Similarly, in Section 5, we approximated mutual information using a Taylor series expansion method, converting the intricate integration process for computing mutual information into a summation. In Section 6, we integrated the approximated optimization objective mutual information and the constraint KL divergence, reformulating the problem into P2. Then, we proposed a gradient descent optimization algorithm with random initialization to solve problem P2. Finally, by combining the optimal results from P2, the original problem P1 can be completely resolved.

4. Achievability Analysis of 2-BPSK Codebook at Willie

According to the definition of the KL divergence, we have
D ( Q 1 ( n ) Q 0 n ) = Q 1 ( n ) log Q 1 ( n ) Q 0 n d x d y
= 1 2 t = 1 2 Q t n ( x , y ) log 1 2 p = 1 2 Q p n ( x , y ) Q 0 n ( x , y ) d x d y ,
where
Q t = 1 2 1 2 π σ w , x σ w , y [ exp ( x i + A β cos θ t ) 2 2 σ w , x 2 ( y i + A β sin θ t ) 2 2 σ w , y 2 + exp ( x i A β cos θ t ) 2 2 σ w , x 2 ( y i A β sin θ t ) 2 2 σ w , y 2 ] .
It is worth noting that Q 1 ( n ) ( x n , y n ) is the sum of two n-letter product distributions, not an n-letter product distribution. Thus, we cannot adopt the chain rule like some previous works [10,42,44,45]. We use a Taylor series expansion of lim x 1 log ( x ) to approximate it, which has been adopted in [8].
Let us define χ 1 2 t = 1 2 Q t n ( x , y ) Q 0 n ( x , y ) . Following from Taylor series expansion, when χ 1 , we have the fact:
log ( χ ) = ( χ 1 ) 1 2 ( χ 1 ) 2 + O ( ( χ 1 ) 3 ) .
Then, we can rewrite the KL divergence in (22) as
D ( Q 1 ( n ) Q 0 n ) = Q 1 ( n ) log ( χ ) d x d y
= Q 1 ( n ) ( χ 1 ) 1 2 ( χ 1 ) 2 + O ( ( χ 1 ) 3 ) d x d y .
We can calculate the first term Q 1 ( n ) ( χ 1 ) d x d y as
Q 1 ( n ) ( χ 1 ) d x d y
= 1 2 t = 1 2 Q t n ( x , y ) × p = 1 2 1 2 Q p n ( x , y ) Q 0 n ( x , y ) 1 d x d y
= 1 4 t = 1 2 Q t n ( x , y ) p = 1 2 Q p n ( x , y ) Q 0 n ( x , y ) d x d y 2 Q t n ( x , y ) d x d y
= 1 4 t = 1 2 p = 1 2 Q t n ( x , y ) Q p n ( x , y ) Q 0 n ( x , y ) d x d y 1 = n A 4 β 4 4 ( cos 4 ( θ 1 ) 2 σ w , x 4 + cos 4 ( θ 2 ) 2 σ w , x 4 + sin 4 ( θ 1 ) 2 σ w , y 4 + sin 4 ( θ 2 ) 2 σ w , y 4 + sin 2 ( θ 1 ) sin 2 ( θ 2 ) σ w , y 4 + cos 2 ( θ 1 ) sin 2 ( θ 1 ) σ w , x 2 σ w , y 2 + cos 2 ( θ 2 ) sin 2 ( θ 2 ) σ w , x 2 σ w , y 2
+ cos 2 ( θ 1 ) cos 2 ( θ 2 ) σ w , x 4 + 2 cos ( θ 1 ) cos ( θ 2 ) sin ( θ 1 ) sin ( θ 2 ) σ w , x 2 σ w , y 2 ) + O ( β 6 ) .
With some transformation, the term Q 1 ( n ) ( χ 1 ) 2 d x d y can be expressed as
Q 1 ( n ) ( χ 1 ) 2 d x d y = Q 1 ( n ) χ 2 2 Q 1 ( n ) χ + Q 1 ( n ) d x d y .
Then, we can calculate the term Q 1 ( n ) χ 2 d x d y as
Q 1 ( n ) χ 2 d x d y
= Q 1 ( n ) p = 1 2 1 2 Q p n ( x , y ) Q 0 n ( x , y ) z = 1 2 1 2 Q z n ( x , y ) Q 0 n ( x , y ) d x d y
= t = 1 2 Q t n ( x ) × p = 1 2 1 2 Q p n ( x , y ) Q 0 ( x , y ) × z = 1 2 1 2 Q z n ( x , y ) Q 0 ( x , y ) d x d y
= 1 8 t = 1 2 p = 1 2 z = 1 2 i = 1 n Q t ( x , y ) Q z ( x , y ) Q p ( x , y ) Q 0 2 ( x , y ) d x d y = 1 + n A 4 β 4 2 ( 3 cos ( θ 1 ) 4 σ w , x 4 + 3 cos ( θ 2 ) 4 σ w , x 4 + 3 sin ( θ 1 ) 4 σ w , y 4 + 3 sin ( θ 2 ) 4 σ w , y 4 + 6 cos ( θ 1 ) 2 cos ( θ 2 ) 2 σ w , x 4 + 6 sin ( θ 1 ) 2 sin ( θ 2 ) 2 σ w , y 4 + 6 cos ( θ 1 ) 2 sin ( θ 1 ) 2 σ w , x 2 σ w , y 2
+ 6 cos ( θ 2 ) 2 sin ( θ 2 ) 2 σ w , x 2 σ w , y 2 + 12 cos ( θ 1 ) cos ( θ 2 ) sin ( θ 1 ) sin ( θ 2 ) σ w , x 2 σ w , y 2 ) + O ( β 6 )
Finally, we re-arrange the third term Q 1 ( n ) ( χ 1 ) 3 as:
Q 1 ( n ) ( χ 1 ) 3 d x d y = Q 1 ( n ) χ 3 3 Q 1 ( n ) χ 2 + 3 Q 1 ( n ) χ Q 1 ( n ) d x d y .
With some calculation, we can obtain Q 1 ( n ) χ 3 d x d y as follows:
Q 1 ( n ) χ 3 d x d y
= Q 1 ( n ) p = 1 2 1 2 Q p n ( x , y ) Q 0 n ( x , y ) z = 1 2 1 2 Q z n ( x , y ) Q 0 n ( x , y ) s = 1 2 1 2 Q s n ( x , y ) Q 0 n ( x , y ) d x d y
= t = 1 2 Q t n ( x , y ) × p = 1 2 1 2 Q p n ( x , y ) Q 0 ( x , y ) × z = 1 2 1 2 Q z n ( x , y ) Q 0 ( x , y ) × s = 1 2 1 2 Q s n ( x , y ) Q 0 ( x , y ) d x d y
= 1 16 t = 1 2 p = 1 2 z = 1 2 s = 1 2 i = 1 n Q t ( x , y ) Q p ( x , y ) Q z ( x , y ) Q s ( x , y ) Q 0 3 ( x , y ) d x d y = 1 + n A 4 β 4 16 ( 12 cos ( θ 1 ) 4 σ w , x 4 + 12 cos ( θ 2 ) 4 σ w , x 4 + 12 sin ( θ 1 ) 4 σ w , y 4 + 12 sin ( θ 2 ) 4 σ w , y 4 + 24 cos ( θ 1 ) 2 cos ( θ 2 ) 2 σ w , x 4 + 24 sin ( θ 1 ) 2 sin ( θ 2 ) 2 σ w , y 4 + 24 cos ( θ 1 ) 2 sin ( θ 1 ) 2 σ w , x 2 σ w , y 2
+ 24 cos ( θ 2 ) 2 sin ( θ 2 ) 2 σ w , x 2 σ w , y 2 + 48 cos ( θ 1 ) cos ( θ 2 ) sin ( θ 1 ) sin ( θ 2 ) σ w , x 2 σ w , y 2 ) + O ( β 6 ) .
Combined with (25)–(40), we can rewrite the KL divergence D ( Q 1 ( n ) Q 0 n ) as
D ( Q 1 ( n ) Q 0 n )
= x y Q 1 ( n ) ( χ 1 ) 1 2 ( χ 1 ) 2 + 1 3 ( χ 1 ) 3 d x d y = A 4 β 4 n 16 σ w , x 4 σ w , y 4 ( σ w , x 4 cos ( θ 1 ) 4 4 σ w , x 4 cos ( θ 2 ) 2 4 σ w , x 4 cos ( θ 1 ) 2 + σ w , x 4 cos ( θ 2 ) 4 + σ w , y 4 cos ( θ 1 ) 4 + σ w , y 4 cos ( θ 2 ) 4 + 4 σ w x 4 + 2 σ w x 2 σ w y 2 cos ( θ 1 ) 2 + 2 σ w x 2 σ w y 2 cos ( θ 2 ) 2 2 σ w x 2 σ w y 2 cos ( θ 1 ) 4 2 σ w x 2 σ w y 2 cos ( θ 2 ) 4 + 2 σ w x 4 cos ( θ 1 ) 2 cos ( θ 2 ) 2
+ 2 σ w y 4 cos ( θ 1 ) 2 cos ( θ 2 ) 2 + 4 σ w x 2 σ w y 2 cos ( θ 1 ) cos ( θ 2 ) sin ( θ 1 ) sin ( θ 2 ) ) .

5. Performance Analysis of the Covert Transmission

In (9), we have rewritten the mutual information as
I ( Y b n ; c n ) = 1 2 I ( Y b , 1 , 1 , , Y b , 1 , n ; c 1 , 1 , , c 1 , n ) + 1 2 I ( Y b , 2 , 1 , , Y b , 2 , n ; c 2 , 1 , , c 2 n ) .
Following from the chain rule, the mutual information I ( Y b n ; c n ) can be expressed as
I ( Y b n ; c n ) = n 2 I ( Y b , 1 ; c 1 ) + n 2 I ( Y b , 2 ; c 2 ) .
For j = 1 or j = 2 , we have
I ( Y b , j ; c j ) = H ( Y b , j ) H ( Y b , j | c j )
= Q b , j ( x , y ) log Q b , j ( x , y ) d x d y + t = 1 2 1 2 Q b , j , t ( x , y ) log Q b , j , t ( x , y ) d x d y
= s = 1 2 1 2 Q b , j , s ( x , y ) log t = 1 2 1 2 Q b , j , t ( x , y ) d x d y
+ s = 1 2 1 2 Q b , j , s ( x , y ) log Q b , j , s ( x , y ) d x d y
= s = 1 2 1 2 Q b , j , s ( x , y ) log t = 1 2 1 2 Q b , j , t ( x , y ) Q b , j , s ( x , y ) d x d y ,
with
Q b , j , 1 ( x , y ) = 1 2 π σ b 2 exp ( x + B β cos ( Δ b , w + θ j ) ) 2 2 σ b , x 2 ( y + B β sin ( Δ b , w + θ j ) ) 2 2 σ b , y 2 ,
Q b , j , 2 ( x , y ) = 1 2 π σ b 2 exp ( x B β cos ( Δ b , w + θ j ) ) 2 2 σ b , x 2 ( y B β sin ( Δ b , w + θ j ) ) 2 2 σ b , y 2 ,
where σ b , x 2 and σ b , y 2 represent noise variances at Bob on the x-axis and y-axis, and Δ b , w is the phase difference value between h R A h A W S R , i and h R A h A B S R , i .
Performing Taylor expansion, we have
log t = 1 2 1 2 Q b , j , t ( x , y ) Q b , j , 1 ( x , y ) = β B cos ( Δ b , w + θ j ) x σ b , x 2 + B sin ( Δ b , w + θ j ) y σ b , y 2 + β 2 ( B 2 cos ( Δ b , w + θ j ) 2 x 2 2 σ b , x 4 + B 2 sin ( Δ b , w + θ j ) 2 y 2 2 σ b , y 4 + B 2 cos ( Δ b , w + θ j ) sin ( Δ b , w + θ j ) x y σ b , x 2 σ b , y 2 ) + O ( β 3 ) ,
and
log i = 1 2 1 2 Q b , i ( x , y ) Q b , j , 2 ( x , y ) = β B cos ( Δ b , w + θ j ) x σ b , x 2 + B sin ( Δ b , w + θ j ) y σ b , y 2 + β 2 ( B 2 cos ( Δ b , w + θ j ) 2 x 2 2 σ b , x 4 + B 2 sin ( Δ b , w + θ j ) 2 y 2 2 σ b , y 4 + B 2 cos ( Δ b , w + θ j ) sin ( Δ b , w + θ j ) x y σ b , x 2 σ b , y 2 ) + O ( β 3 ) .
With some calculations, we can obtain
s = 1 2 1 2 Q b , j , s ( x , y ) log t = 1 2 1 2 Q b , j , t ( x , y ) Q b , j , s ( x , y ) d x d y = B 2 cos ( Δ b , w + θ j ) 2 β σ b , x 2 + B 2 sin ( Δ b , w + θ j ) 2 β σ b , y 2 β
+ ( B 2 cos ( Δ b , w + θ j ) 2 2 σ b , x 2 + B 2 sin ( Δ b , w + θ j ) 2 2 σ b , y 2 ) β 2 + O ( β 3 )
= B 2 cos ( Δ b , w + θ j ) 2 2 σ b , x 2 + B 2 sin ( Δ b , w + θ j ) 2 2 σ b , y 2 β 2 + O ( β 3 ) .
Combined with (46)–(56), the term I ( Y b , j ; c j ) can be expressed as
I ( Y b , j ; c j ) = β 2 2 B 2 cos ( Δ b , w + θ j ) 2 σ b , x 2 + B 2 sin ( Δ b , w + θ j ) 2 σ b , y 2 .
Then, we can obtain the mutual information as
I ( Y b n ; c n ) = n 2 j = 1 2 I ( Y b , j ; c j ) .

6. Problem Reformulation

In Section 4 and Section 5, we derive KL divergence and mutual information in our problem. Combined with (17) and (43), the covertness constraint can be expressed as
A 4 β 4 n 16 σ w , x 4 σ w , y 4 G ( θ 1 , θ 2 ) ϵ ,
where
G ( θ 1 , θ 2 ) = σ w , x 4 cos ( θ 1 ) 4 4 σ w , x 4 cos ( θ 2 ) 2 4 σ w , x 4 cos ( θ 1 ) 2 + σ w , x 4 cos ( θ 2 ) 4 + σ w , y 4 cos ( θ 1 ) 4 + σ w , y 4 cos ( θ 2 ) 4 + 4 σ w x 4 + 2 σ w x 2 σ w y 2 cos ( θ 1 ) 2 + 2 σ w x 2 σ w y 2 cos ( θ 2 ) 2 2 σ w x 2 σ w y 2 cos ( θ 1 ) 4 2 σ w x 2 σ w y 2 cos ( θ 2 ) 4 + 2 σ w x 4 cos ( θ 1 ) 2 cos ( θ 2 ) 2 + 2 σ w y 4 cos ( θ 1 ) 2 cos ( θ 2 ) 2 + 4 σ w x 2 σ w y 2 cos ( θ 1 ) cos ( θ 2 ) sin ( θ 1 ) sin ( θ 2 ) .
Then, we can obtain the maximum amplitude gain as
β = 2 σ w , x σ w , y A ϵ n G ( θ 1 , θ 2 ) 1 4 .
Combined with (57) and (58), the mutual information (16) can be expressed as
I ( Y b n ; c n ) = σ w , x 2 σ w , y 2 T ( θ 1 , θ 2 ) A 2 n ϵ G ( θ 1 , θ 2 ) 1 2 ,
where
T ( θ 1 , θ 2 ) = j = 1 2 B 2 cos ( Δ b , w + θ j ) 2 σ b , x 2 + B 2 sin ( Δ b , w + θ j ) 2 σ b , y 2 .
Combined with (59)–(63), we can reformulate the problem as
P 2 : max { θ } σ w , x 2 σ w , y 2 T ( θ 1 , θ 2 ) A 2 n ϵ G ( θ 1 , θ 2 ) 1 2
s . t . 0 θ 1 π ,
0 θ 2 π .
Then, we define the objective function as R ( θ 1 , θ 2 ) σ w , x 2 σ w , y 2 T ( θ 1 , θ 2 ) A 2 n ϵ G ( θ 1 , θ 2 ) 1 2 . To solve the problem (64), we adopted a gradient descent optimization algorithm with random initialization; the details are summarized in Algorithm 1.
In Algorithm 1, the final output R t + 1 represents the ultimate transmission rate, while the outputs θ 1 t + 1 and θ 2 t + 1 denote the optimal values for the phase angles. Combined with the outputs θ 1 t + 1 and θ 2 t + 1 and (61), we can obtain the optimal amplitude gain as β * = 2 σ w , x σ w , y A ϵ n G ( θ 1 t + 1 , θ 2 t + 1 ) 1 4 .
Algorithm 1 Gradient Descent Optimization Algorithm with Random Initialization
  1:
Input: Learning rate α , maximum iterations T, convergence threshold ϵ
  2:
Initialization: Randomly initialize θ 1 0 and θ 2 0 in interval [ 0 , π ]
  3:
Compute gradients:
  4:
    θ 1 R ( θ 1 , θ 2 ) θ 1
  5:
    θ 2 R ( θ 1 , θ 2 ) θ 2
  6:
Compute the covert transmission rate:
  7:
    R 0 = R ( θ 1 0 , θ 2 0 )
  8:
for  t = 0 to T do
  9:
    Update parameters:
10:
        θ 1 t + 1 θ 1 t α · θ 1 ( θ 2 t )
11:
        θ 2 t + 1 θ 2 t α · θ 2 ( θ 1 t )
12:
    Update the covert transmission rate:
13:
     R t + 1 = R ( θ 1 t + 1 , θ 2 t + 1 )
14:
    Check for convergence:
15:
       if  ( R t + 1 , R t ) < ϵ  then break
16:
end for
17:
Output:  R t + 1 , θ 1 t + 1 and θ 2 t + 1

7. Numerical Results

In this section, we first consider scenarios characterized by noise symmetry along the x and y axes. Leveraging theoretical results from the referenced paper [8], we validate the efficacy of our proposed KL divergence and mutual information approximation methods. After establishing the accuracy of our approximation results, we proceed to validate the algorithm in two distinct scenarios utilizing our proposed approximation methods. We assess whether the gradient descent algorithm, as articulated, successfully converges to optimal angles θ 1 * and θ 2 * . Finally, through a comprehensive exploration of all angles in the target scenarios, we confirm the efficacy and superiority of our proposed algorithm.
Figure 3 illustrates the simulation results for scenario 1, with specific parameters detailed in Table 1. As depicted in Figure 3a, under common conditions of noise symmetry along the x and y axes, the mutual information remains constant at 40 bit/Hz/s as the phase angles θ 1 and θ 2 vary. This observation aligns with the theorem in [8], indicating that altering the initial phase angles does not affect the transmission rate when the variances of noise along the x-axes and y-axes are equal. This result validates the correctness and effectiveness of our approximation for mutual information.
Figure 3b,c provide the main view and top view of the KL divergence concerning the variation of phase angles θ 1 and θ 2 . As illustrated, the KL divergence reaches its maximum when θ 1 equals θ 2 (i.e., θ 1 = θ 2 ), indicating the poorest covertness performance. Conversely, the KL divergence achieves its minimum when θ 1 and θ 2 have a 90-degree separation (i.e., θ 1 θ 2 = 90 ° ), representing optimal covertness performance. For example, the simulation reveals that the minimum KL divergence occurs at θ 1 = 97 ° and θ 2 = 7 ° . This finding aligns with the conclusion in [8] that, under equal x-axis and y-axis noise variances, the optimal angle for 2-BPSK is 90 degrees. At θ 1 = θ 2 , the KL divergence is 6 × 10 4 , while at θ 1 θ 2 = 90 ° , the KL divergence is 3 × 10 4 , showing a halving of the KL divergence, consistent with the results in [8]. Therefore, the simulation results validate the effectiveness and accuracy of our proposed approximation method, serving as a basis for further validation of our optimization strategy based on this approximation method.
Figure 4 presents the results of covert communication performance versus amplitude gain β for scenarios 2 and 3, with specific simulation parameters and optimization outcomes detailed in Table 1. For performance comparison, we conducted experiments using phase angles adopted in [8,10], specifically, θ 1 = 45 ° , θ 2 = 135 ° and θ 1 = 0 ° , θ 2 = 90 ° .
Figure 4a,b depict the KL divergence versus amplitude gain and the transmission rate versus amplitude gain in scenario 2. As shown, based on our proposed gradient descent algorithm, the optimal covertness performance can be achieved under the same amplitude at θ 1 * = 27 ° and θ 2 * = 162 ° . However, at θ 1 * = 27 ° and θ 2 * = 162 ° , the transmission rate is lower than the two comparative results. Figure 4c,d illustrate the KL divergence versus transmission amplitude and the transmission rate versus transmission amplitude in scenario 3. In scenario 3, the phase angle difference Δ b , w is 20 degrees, and based on our proposed gradient descent algorithm, optimal covertness performance can be achieved at θ 1 * = 25.2 ° and θ 2 * = 176.4 ° . However, at θ 1 * = 25.2 ° , θ 2 * = 176.4 ° or θ 1 * = 27.1 ° , θ 2 * = 0 ° , the transmission rate is lower than the two comparative results. To further compare the effectiveness of the optimization results, a re-evaluation is needed under the same covert communication constraint ϵ .
Figure 5 illustrates the covert transmission rate versus the covert constraint ϵ in scenarios 2 and 3. As depicted in Figure 5a, in scenario 1, leveraging our proposed gradient descent algorithm, the covert transmission rate is maximized at θ 1 * = 27 ° and θ 2 * = 162 ° under the same covert constraint ϵ . In scenario 2, although the transmission rate is not maximized at θ 1 * = 27 ° and θ 2 * = 162 ° for the same transmission amplitude, considering the covert constraint, this phase angle pair is optimal. For Scenario 3, our algorithm yields two optimal phase configurations: θ 1 * = 25.2 ° , θ 2 * = 176.4 ° and θ 1 * = 27.1 ° , θ 2 * = 0 ° . As shown in Figure 5b, both optimal configurations yield the same covert transmission rate under the same covert constraint, confirming their optimality in scenario 3. To further validate the effectiveness of the algorithm, we exhaustively traverse all phase angle options to verify if the algorithm obtains all optimal results.
Figure 6a,b present the main and top views of the maximum covert transmission rate versus the phase angles θ 1 and θ 2 variations in scenario 2. In Figure 6, it is evident that there are two options for achieving the maximum covert transmission rate. Considering the symmetry of phase angles, our proposed algorithm has successfully identified all optimal phase angle options, validating the convergence and effectiveness of the algorithm. When employing conventional phase angles for covert communication, namely, at the moments when θ 1 = 45 ° and θ 2 = 135 ° , the covert transmission rate is 35 bits/Hz/s. However, after optimization, the maximum covert rate reaches 45 bits/Hz/s, representing a nearly 30 % increase in the transmission rate, which is a substantial improvement.
Figure 7a,b depict the main and top views of the maximum covert transmission rate versus the phase angles θ 1 and θ 2 variations in scenario 3. It can be observed that there are four options for achieving the maximum covert transmission rate, reduced to two when considering the symmetry of phase angles. Through multiple random initializations, the proposed algorithm effectively converges and identifies all optimal phase angle pairs. The validity and convergence of the proposed algorithm have been thoroughly validated through the numerical simulations mentioned above. When employing conventional phase angles for covert communication, i.e., θ 1 = 45 ° and θ 2 = 135 ° , the covert transmission rate is 40 bits/Hz/s. After optimization, the maximum covert rate achieves 60 bits/Hz/s, indicating an almost 50 % increase in the transmission rate, which is a significant enhancement.

8. Discussion and Conclusions

In this work, we investigated covert communication in multi-sensor systems employing intelligent reflecting surfaces. Diverging from prior works, we examined the optimization of transmission amplitudes and optimal phase angles for a 2-BPSK codebook under the condition of asymmetric noise over complex Gaussian channels. We employed KL divergence as a metric for the covertness constraint and mutual information as a metric for the transmission rate. We approximated KL divergence and mutual information with Taylor series expansion. Leveraging the approximated KL divergence and mutual information, we solved for the optimal phase angles. Specifically, we proposed a gradient descent algorithm to obtain all optimal phase angles. Based on the optimal phase angles, we could achieve the optimal transmission amplitude gain. With numerical simulations, we verified the effectiveness and precision of our adopted Taylor approximation method. Validating our algorithm across two distinct scenarios, we demonstrated its robust convergence and capability to derive all optimal phase angles. Comparing the initial phase angles from existing works to the optimal phase angles obtained via the gradient descent algorithm, we observed a higher covert transmission rate.
In previous covert communication studies, along with the optimization of transmission power, phase angles change. However, phase angles are rarely considered as an independent optimization parameter. In this work, we employ a 2-BPSK codebook and optimize the phase angles. Simulation results demonstrate that by solely optimizing the phase angles, a significant enhancement in covert transmission rates can be achieved. In scenarios 2 and 3, the improvement in covert transmission rates is 30% and 50%, respectively. Unlike traditional IRS covert communication, the 2-BPSK codebook we utilize offers greater feasibility, requiring no intricate flipping operations to achieve substantial enhancements in IRS covert communication rates. In future work, we plan to extend the codebook to an N-BPSK codebook and optimize all initial phase angles.

Author Contributions

Conceptualization, H.F. and X.J.; methodology, H.F. and R.Z.; software, H.F. and R.Z.; validation, H.F. and X.J.; writing—original draft preparation, H.F. and R.Z.; writing—review and editing, X.H. and S.Q.; visualization, X.H. and S.Q.; supervision, S.Q. and X.J.; funding acquisition, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant numbers U1836104, 61801073, 61931004, 62072250; the National Key Research and Development Program of China, grant number 2021QY0700; and the Startup Foundation for Introducing Talent of NUIST, grant number 2021r039.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
IRSIntelligent Reflecting Surface
UAVUnmanned Aerial Vehicle (UAV)
BPSKBinary Phase-Shift Keying
AWGNAdditive White Gaussian Noise
RISReconfigurable Intelligent Surface
LPDLow Probability of Detection

References

  1. Liu, Z.; Liu, J.; Zeng, Y.; Ma, J. Covert wireless communication in IoT network: From AWGN channel to THz band. IEEE Internet Things J. 2020, 7, 3378–3388. [Google Scholar] [CrossRef]
  2. Gao, C.; Yang, B.; Jiang, X.; Inamura, H.; Fukushi, M. Covert Communication in Relay-Assisted IoT Systems. IEEE Internet Things J. 2021, 8, 6313–6323. [Google Scholar] [CrossRef]
  3. Frustaci, M.; Pace, P.; Aloi, G.; Fortino, G. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. IEEE Internet Things J. 2018, 5, 2483–2495. [Google Scholar] [CrossRef]
  4. Lu, Y.; Xu, L.D. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2019, 6, 2103–2115. [Google Scholar] [CrossRef]
  5. Miao, Y.; Liu, X.; Choo, K.K.R.; Deng, R.H.; Wu, H.; Li, H. Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 2019, 6, 7201–7212. [Google Scholar] [CrossRef]
  6. Wu, Z.; Liu, R.; Shuai, H.; Zhu, S.; Li, C. Covert performance for integrated satellite multiple terrestrial relay networks with partial relay selection. Sensors 2022, 22, 5524. [Google Scholar] [CrossRef] [PubMed]
  7. Moon, J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors 2023, 23, 8747. [Google Scholar] [CrossRef] [PubMed]
  8. Qiao, S.; Cao, D.; Zhang, Q.; Xu, Y.; Liu, G. Covert Communication Gains From Adversary’s Uncertainty of Phase Angles. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2899–2912. [Google Scholar] [CrossRef]
  9. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef]
  10. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  11. Marvin, S.; Jim, O.; Robert, S.; Barry, L. Spread Spectrum Communications Handbook, Electronic Edition, 1st ed.; McGraw-Hill Education: New York, NY, USA, 2002. [Google Scholar]
  12. Çek, M.E.; Savaci, F. Stable non-Gaussian noise parameter modulation in digital communication. Electron. Lett. 2009, 45, 1256–1257. [Google Scholar] [CrossRef]
  13. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1173–1198. [Google Scholar] [CrossRef]
  14. Bash, B.A.; Goeckel, D.; Towsley, D. Square root law for communication with low probability of detection on AWGN channels. In Proceedings of the 2012 IEEE International Symposium on Information Theory Proceedings, Cambridge, MA, USA, 1–6 July 2012; pp. 448–452. [Google Scholar]
  15. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable deniable communication: Hiding messages in noise. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2945–2949. [Google Scholar]
  16. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef]
  17. Tahmasbi, M.; Bloch, M.R. First- and Second-Order Asymptotics in Covert Communication. IEEE Trans. Inf. Theory 2019, 65, 2190–2212. [Google Scholar] [CrossRef]
  18. Bloch, M.R. Covert communication over noisy channels: A resolvability perspective. IEEE Trans. Inf. Theory 2016, 62, 2334–2354. [Google Scholar] [CrossRef]
  19. Arumugam, K.S.K.; Bloch, M.R. Covert Communication Over a K-User Multiple-Access Channel. IEEE Trans. Inf. Theory 2019, 65, 7020–7044. [Google Scholar] [CrossRef]
  20. Kumar Arumugam, K.S.; Bloch, M.R. Embedding Covert Information in Broadcast Communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef]
  21. Cho, K.H.; Lee, S.H. Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels. IEEE Trans. Inf. Forensics Secur. 2021, 16, 322–332. [Google Scholar] [CrossRef]
  22. Kibloff, D.; Perlaza, S.M.; Wang, L. Embedding Covert Information on a Given Broadcast Code. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 2169–2173. [Google Scholar] [CrossRef]
  23. Tan, V.Y.F.; Lee, S.H. Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1377–1389. [Google Scholar] [CrossRef]
  24. Hu, J.; Yan, S.; Zhou, X.; Shu, F.; Li, J.; Wang, J. Covert Communication Achieved by a Greedy Relay in Wireless Networks. IEEE Trans. Wirel. Commun. 2018, 17, 4766–4779. [Google Scholar] [CrossRef]
  25. Forouzesh, M.; Azmi, P.; Kuhestani, A.; Yeoh, P.L. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens. IEEE Trans. Commun. 2020, 68, 3737–3749. [Google Scholar] [CrossRef]
  26. He, B.; Yan, S.; Zhou, X.; Jafarkhani, H. Covert Wireless Communication With a Poisson Field of Interferers. IEEE Trans. Wirel. Commun. 2018, 17, 6005–6017. [Google Scholar] [CrossRef]
  27. Zheng, T.X.; Wang, H.M.; Ng, D.W.K.; Yuan, J. Multi-Antenna Covert Communications in Random Wireless Networks. IEEE Trans. Wirel. Commun. 2019, 18, 1974–1987. [Google Scholar] [CrossRef]
  28. Huang, K.W.; Deng, H.; Wang, H.M. Jamming Aided Covert Communication With Multiple Receivers. IEEE Trans. Wirel. Commun. 2021, 20, 4480–4494. [Google Scholar] [CrossRef]
  29. Lu, X.; Hossain, E.; Shafique, T.; Feng, S.; Jiang, H.; Niyato, D. Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks. IEEE Netw. 2020, 34, 148–155. [Google Scholar] [CrossRef]
  30. Wang, Y.; Yan, S.; Yang, W.; Huang, Y.; Liu, C. Energy-Efficient Covert Communications for Bistatic Backscatter Systems. IEEE Trans. Veh. Commun. 2021, 70, 2906–2911. [Google Scholar] [CrossRef]
  31. Liu, J.; Yu, J.; Chen, X.; Zhang, R.; Wang, S.; An, J. Covert Communication in Ambient Backscatter Systems With Uncontrollable RF Source. IEEE Trans. Commun. 2022, 70, 1971–1983. [Google Scholar] [CrossRef]
  32. Ma, W.; Niu, Z.; Wang, W.; He, S.; Jiang, T. Covert Communication With Uninformed Backscatters in Hybrid Active/Passive Wireless Networks: Modeling and Performance Analysis. IEEE Trans. Commun. 2022, 70, 2622–2634. [Google Scholar] [CrossRef]
  33. Wu, C.; Yan, S.; Zhou, X.; Chen, R.; Sun, J. Intelligent Reflecting Surface (IRS)-Aided Covert Communication With Warden’s Statistical CSI. IEEE Wirel. Commun. Lett. 2021, 10, 1449–1453. [Google Scholar] [CrossRef]
  34. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1735–1750. [Google Scholar] [CrossRef]
  35. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef]
  36. Si, J.; Li, Z.; Zhao, Y.; Cheng, J.; Guan, L.; Shi, J.; Al-Dhahir, N. Covert Transmission Assisted by Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 5394–5408. [Google Scholar] [CrossRef]
  37. Zhou, X.; Yan, S.; Wu, Q.; Shu, F.; Kwan Ng, D.W. Joint Transmit Power and Reflection Beamforming Design for IRS-Aided Covert Communications. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  38. Tatar Mamaghani, M.; Hong, Y. Aerial Intelligent Reflecting Surface-Enabled Terahertz Covert Communications in Beyond-5G Internet of Things. IEEE Internet Things J. 2022, 9, 19012–19033. [Google Scholar] [CrossRef]
  39. Wang, C.; Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Niyato, D. Covert Communication Assisted by UAV-IRS. IEEE Trans. Commun. 2023, 71, 357–369. [Google Scholar] [CrossRef]
  40. Wang, S.Y.; Bloch, M.R. Covert MIMO Communications Under Variational Distance Constraint. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4605–4620. [Google Scholar] [CrossRef]
  41. Bash, B.A.; Goeckel, D.; Towsley, D. Covert communication gains from adversary’s ignorance of transmission time. IEEE Trans. Wirel. Commun. 2016, 15, 8394–8405. [Google Scholar] [CrossRef]
  42. Chen, W.; Ding, H.; Wang, S.; Gong, F. On the limits of covert ambient backscatter communications. IEEE Wirel. Commun. Lett. 2021, 11, 308–312. [Google Scholar] [CrossRef]
  43. Lehmann, E.L.; Romano, J.P.; Casella, G. Testing Statistical Hypotheses; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3. [Google Scholar]
  44. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef]
  45. Yan, S.; He, B.; Zhou, X.; Cong, Y.; Swindlehurst, A.L. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power. IEEE Trans. Inf. Forensics Secur. 2019, 14, 129–140. [Google Scholar] [CrossRef]
Figure 1. IRS-enabled covert communication in multi-sensor systems.
Figure 1. IRS-enabled covert communication in multi-sensor systems.
Applsci 14 01727 g001
Figure 2. Optimization methodology diagram in this work.
Figure 2. Optimization methodology diagram in this work.
Applsci 14 01727 g002
Figure 3. Covert communication performance in scenario 1. (a) Mutual information versus phase angles. (b) Main view of KL divergence versus phase angles. (c) Top view of KL divergence versus phase angles.
Figure 3. Covert communication performance in scenario 1. (a) Mutual information versus phase angles. (b) Main view of KL divergence versus phase angles. (c) Top view of KL divergence versus phase angles.
Applsci 14 01727 g003
Figure 4. Covert communication performance in different scenarios. (a) KL divergence versus amplitude gain in scenario 2. (b) Transmission rate versus amplitude gain in scenario 2. (c) KL divergence versus amplitude gain in scenario 3. (d) Transmission rate versus amplitude gain in scenario 3.
Figure 4. Covert communication performance in different scenarios. (a) KL divergence versus amplitude gain in scenario 2. (b) Transmission rate versus amplitude gain in scenario 2. (c) KL divergence versus amplitude gain in scenario 3. (d) Transmission rate versus amplitude gain in scenario 3.
Applsci 14 01727 g004
Figure 5. Covert transmission performance in different scenarios. (a) Covert transmission rate versus covertness constraint in scenario 2. (b) Covert transmission rate versus covertness constraint in scenario 3.
Figure 5. Covert transmission performance in different scenarios. (a) Covert transmission rate versus covertness constraint in scenario 2. (b) Covert transmission rate versus covertness constraint in scenario 3.
Applsci 14 01727 g005
Figure 6. Covert communication performance in scenario 2. (a) Main view of covert transmission rate versus phase angles. (b) Top view of covert transmission rate versus phase angles.
Figure 6. Covert communication performance in scenario 2. (a) Main view of covert transmission rate versus phase angles. (b) Top view of covert transmission rate versus phase angles.
Applsci 14 01727 g006
Figure 7. Covert communication performance in scenario 3. (a) Main view of covert transmission rate versus phase angles. (b) Top view of covert transmission rate versus phase angles.
Figure 7. Covert communication performance in scenario 3. (a) Main view of covert transmission rate versus phase angles. (b) Top view of covert transmission rate versus phase angles.
Applsci 14 01727 g007
Table 1. Parameters for comparative experiments.
Table 1. Parameters for comparative experiments.
ScenarioA σ w , x σ w , y B σ b , x σ b , y Δ b , w n θ 1 * θ 2 *
10.70.50.50.50.50.5 0 ° 100,000nullnull
20.50.70.30.60.70.3 0 ° 100,000 27 ° 162 °
30.50.70.30.60.70.3 20 ° 100,000 25.2 ° 176.4 °
27.1 ° 0 °
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Feng, H.; Ji, X.; Zhu, R.; He, X.; Qiao, S. Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems. Appl. Sci. 2024, 14, 1727. https://doi.org/10.3390/app14051727

AMA Style

Feng H, Ji X, Zhu R, He X, Qiao S. Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems. Applied Sciences. 2024; 14(5):1727. https://doi.org/10.3390/app14051727

Chicago/Turabian Style

Feng, Huiru, Xiaopeng Ji, Ruizhi Zhu, Xinrui He, and Sen Qiao. 2024. "Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems" Applied Sciences 14, no. 5: 1727. https://doi.org/10.3390/app14051727

APA Style

Feng, H., Ji, X., Zhu, R., He, X., & Qiao, S. (2024). Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems. Applied Sciences, 14(5), 1727. https://doi.org/10.3390/app14051727

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop