On Resource Allocation in Covert Wireless Communication With Channel Estimation

This work, for the first time, tackles channel estimation design with pilots in the context of covert wireless communication. We consider Rayleigh fading for the communication channel from a transmitter to a receiver, both additive white Gaussian noise (AWGN) and Rayleigh fading for the detection channel from the transmitter to a warden. Before transmitting information signals, the transmitter has to send pilots to enable channel estimation at the receiver. For the case with AWGN detection channel, we first analytically prove that transmitting pilot and information signals with equal power minimizes the warden’s detection performance. This motivates us to consider the equal transmit power and then optimize channel use allocation between pilot and information signals under this case. Our analysis shows that the optimal number of the channel uses allocated to pilots increases as the covertness constraint becomes tighter. For the case with Rayleigh fading detection channel, we present a general framework to optimally allocate transmit power and channel uses between pilot and information signals. Our examination shows that the covert communication performance gain achieved by this general framework is not remarkable relative to the scheme with equal transmit power and this gain diminishes as the covertness constraint becomes stricter.

[1]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[2]  Vincent Y. F. Tan,et al.  Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).

[3]  Matthieu R. Bloch,et al.  Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.

[4]  Lorenzo Rubio,et al.  Evaluation of Nakagami fading behaviour based on measurements in urban scenarios , 2007 .

[5]  Xiangyun Zhou,et al.  Covert Communication in Backscatter Radio , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[6]  Saikat Guha,et al.  Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.

[7]  Jun Li,et al.  Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading , 2018, IEEE Transactions on Vehicular Technology.

[8]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[9]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[10]  Matthieu R. Bloch,et al.  Second-order asymptotics of covert communications over noisy channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[11]  Mustafa Cenk Gursoy,et al.  On the Capacity and Energy Efficiency of Training-Based Transmissions Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[12]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[13]  Donald F. Towsley,et al.  Covert active sensing of linear systems , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.

[14]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[15]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[16]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[17]  Jun Li,et al.  Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).

[18]  Ronald F. Boisvert,et al.  NIST Handbook of Mathematical Functions , 2010 .

[19]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[20]  Zhiguo Ding,et al.  Short-Packet Downlink Transmission With Non-Orthogonal Multiple Access , 2017, IEEE Transactions on Wireless Communications.

[21]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[22]  Tong-Xing Zheng,et al.  Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks , 2018, IEEE Transactions on Communications.

[23]  Feng Shu,et al.  Pilot-Based Channel Estimation Design in Covert Wireless Communication , 2019, ArXiv.

[24]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[25]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[26]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[27]  Riqing Chen,et al.  Physical Layer Security for Ultra-Reliable and Low-Latency Communications , 2019, IEEE Wireless Communications.

[28]  Amr Abdelaziz,et al.  Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[29]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[30]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[31]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[32]  H. Vincent Poor,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.

[33]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[34]  Gregory W. Wornell,et al.  Covert Communication With Channel-State Information at the Transmitter , 2017, IEEE Transactions on Information Forensics and Security.

[35]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[36]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[37]  Shihao Yan,et al.  Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints , 2019, IEEE Transactions on Vehicular Technology.

[38]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[39]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[40]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[41]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[42]  Babak Hassibi,et al.  How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.

[43]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[44]  Donald F. Towsley,et al.  Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes , 2012, IEEE Wireless Communications Letters.

[45]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.