Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming

Document Type : Original Article

Authors

1 Assistant Professor, Amol Specialized University of New Technologies, Amol, Iran

2 Master's degree, New Technologies Engineering Faculty, Amol University of New Technologies, Amol, Iran

3 Professor, Tarbiat Modares University, Tehran, Iran

4 Assistant Professor, Torbet Heydarieh University, Torbet Heydarieh, Iran

Abstract

In Wireless Telecommunication, maintaining the security and the transmitted bit rate are very important. However, in conventional networks,  covert communication is often  the transmitted bit rate very limited. This may be for maintaining the security in covert communication in the sense that the data signal must be covert inside the base noise. In this article, we present different plans to maintaining the security and increase the transmitted bit rate in covert communication. The basis of the proposed method is transmitting controlled noise signal to increase the probability of detection error in the eavesdropper and increase the covert rate in the legal receiver to send the main message to the legal receiver. In the proposed method, also, the beam forming technique is presented and applied to increase the covert rate and reduce the interference in the receiver. To evaluate this scheme, an optimization problem is formulated. Various simulations and numerical results proves the efficiency of our proposal in its ability to increase security in telecommunications networks based on covert communication via controlled noise.

Keywords


Smiley face

[1]     M. Bloch and J. Barros, Physical-layer security: from information theory to security engineering. Cambridge University Press, 2011.
[2]     T. Q. Duong, X. Zhou, and H. V. Poor, Trusted communications with physical layer security for 5G and beyond. Institution of Engineering & Technology, 2017.
[3]     A. D. Wyner, "The wire tap channel," Bell system technical journal, vol. 54, no. 8, pp. 1355-1387, 1975.
[4]     B. A. Bash, D. Goeckel, and D. Towsley, "Square root law for communication with low probability of detection on AWGN channels," in 2012 IEEE International Symposium on Information Theory Proceedings, 2012: IEEE, pp. 448-452. 
[5]     [5]   B. A. Bash, D. Goeckel, and D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels," IEEE journal on selected areas in communications, vol. 31, no. 9, pp. 1921-1930, 2013.
[6]     T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, "Covert communication in the presence of an uninformed jammer," IEEE Transactions on Wireless Communications, vol. 16, no. 9, pp. 6193-6206, 2017.
[7]     J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, "Covert communication achieved by a greedy relay in wireless networks," IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 4766-4779, 2018.
[8]     J. Hu, Y. Wu, R. Chen, F. Shu, and J. Wang, "Optimal detection of UAV's transmission with beam sweeping in covert wireless networks," IEEE Transactions on Vehicular Technology, vol. 69, no. 1, pp. 1080-1085, 2019.
[9]     M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, "Covert communication an secure transmission over untrusted relaying networks in the presence of multiple wardens," IEEE Transactions on Communications, vol. 68, no. 6,  pp. 3737-3749, 2020.
[10] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, "Covert Transmission with Harvested Energy by a Wireless Powered Relay," arXiv preprint arXiv:1805.08925, 2018.
[11] O. A. Topal and G. K. Kurt, "Covert Communication in Cooperative NOMA Networks," in 2020 28th Signal Processing and Communications Applications Conference (SIU), 2020: IEEE, pp. 1-4. 
[12] M. Choubin and A. Taherpour, "Optimization of distributed detection in energy harvesting wireless sensor networks with multiple antenna fusion center," Transactions on Emerging Telecommunications Technologies, vol. 31, no. 3, p. e3848, 2020.
[13] L. Yuda, J. Liang, W. Hu, and X. Xiaoming, "Multi-Antenna Covert Communication Achieved by Exploiting a Public Communication Link," in 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020: IEEE, pp. 883-888. 
[14] Y. Mao, G. Yu, and C. Zhong, "Energy consumption analysis of energy harvesting systems with power grid," IEEE Wireless Communications Letters, vol. 2, no. 6, pp. 611-614, 2013.
[15] R. Zhang and C. K. Ho, "MIMO broadcasting for simultaneous wireless information and power transfer," IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 1989-2001, 2013.
[16] R. Sinha and P. Jindal, "A study of physical layer security with energy harvesting in single hop relaying environment," in 2017 4th international conference on signal processing and integrated networks (SPIN), 2017: IEEE, pp. 530-533. 
[17] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. CRC press, 2018.
[18] J. Talbot, D. Welsh, and D. J. A. Welsh, Complexity and cryptography: an introduction. Cambridge University Press, 2006.
[19] Y. Feng, S. Yan, Z. Yang, N. Yang, and W.-P. Zhu, "TAS-based incremental hybrid decode–amplify–forward relaying for physical layer security enhancement," IEEE Transactions on Communications, vol. 65, no. 9, pp. 3876-3891, 2017.
[20] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, "Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays," IEEE Access, vol. 5, pp. 1658-1667, 2017.
[21] S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, "Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation," IEEE Transactions on wireless Communications, vol. 15, no. 12, pp. 8286-8297, 2016.

[22] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, "Hiding information in noise: Fundamental limits of covert wireless communication," IEEE Communications Magazine, vol. 53, no. 12, pp. 26-31, 2015.
[23] M. R. Bloch, "Covert communication over noisy channels: A resolvability perspective," IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334-2354, 2016.
[24] D. Goeckel, B. Bash, S. Guha, and D. Towsley, "Covert communications when the warden does not know the background noise power," IEEE Communications Letters, vol. 20, no. 2, pp. 236-239, 2015.
[25] L. Wang, G. W. Wornell, and L. Zheng, "Fundamental limits of communication with low probability of detection," IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3493-3503, 2016.
 
Volume 10, Issue 1 - Serial Number 37
Serial No. 37, Spring Quarterly
May 2022
Pages 11-19
  • Receive Date: 16 March 2021
  • Revise Date: 18 February 2022
  • Accept Date: 12 January 2022
  • Publish Date: 22 May 2022