نوع مقاله : مقاله پژوهشی
نویسندگان
1 استادیار ،پژوهشگاه فناوری اطلاعات و ارتباطات کاربردی،تهران ، ایران
2 استادیار، دانشگاه فناوری های نوین آمل، آمل، ایران
3 استادیار، دانشگاه صنعتی قم ، قم ، ایران
چکیده
کلیدواژهها
موضوعات
عنوان مقاله [English]
نویسندگان [English]
The presence of hardware impairments in communication systems is one of the challenges that can affect system performance. In many presented articles, researchers do not consider this issue and ignore their effects, while in cases such as communication security, their role can be more prominent, and perhaps they can be used as a feature to enhance communication security. In this paper, a covert communication protocol for a network including a source, a destination, and a malicious node (observer) is presented. In order to deceive the observer, a friendly jammer is recruited in the network to continuously send jamming. For such a communication network, an optimization problem is designed with the aim of maximizing the covert rate. Since this problem is a non-convex optimization problem, Epigraph and DC methods are used to solve it, and an iterative algorithm is proposed. Simulation results show that the hardware impairments of the transmitter and receiver have the most significant impact on the covert rate, and the hardware impairments of the jammer also have the least impact on the covert rate, so that when the impairment value of the jammer, observer, receiver and transmitter are considered to be 0.5, the covert rate relatives to the case where there is no impairment in any of the nodes decreases by 4.2%, 8%, 62.2% and 62.8%, respectively. Therefore, designing a transmitter and receiver with the least hardware impairment compared to other nodes is essential and plays a significant role in improving covert communication performance.
کلیدواژهها [English]