Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication

Covert communication prevents legitimate transmission from being detected by a warden while maintaining certain covert rate at the intended user. Prior works have considered the design of covert communication over conventional low-frequency bands, but few works so far have explored the higher-frequency millimeter-wave (mmWave) spectrum. The directional nature of mmWave communication makes it attractive for covert transmission. However, how to establish such directional link in a covert manner in the first place remains as a significant challenge. In this paper, we consider a covert mmWave communication system, where legitimate parties Alice and Bob adopt beam training approach for directional link establishment. Accounting for the training overhead, we develop a new design framework that jointly optimizes beam training duration, training power and data transmission power to maximize the effective throughput of Alice-Bob link while ensuring the covertness constraint at warden Willie is met. We further propose a dual-decomposition successive convex approximation algorithm to solve the problem efficiently. Numerical studies demonstrate interesting tradeoff among the key design parameters considered and also the necessity of joint design of beam training and data transmission for covert mmWave communication.

[1]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[2]  Jeffrey G. Andrews,et al.  Coverage and rate trends in dense urban mmWave cellular networks , 2014, 2014 IEEE Global Communications Conference.

[3]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[4]  Iain B. Collings,et al.  Millimeter Wave Beam Alignment: Large Deviations Analysis and Design Insights , 2016, IEEE Journal on Selected Areas in Communications.

[5]  Daniel Pérez Palomar,et al.  A tutorial on decomposition methods for network utility maximization , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[7]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[8]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[9]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[10]  Chin-Sean Sum,et al.  Beam Codebook Based Beamforming Protocol for Multi-Gbps Millimeter-Wave WPAN Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[11]  Hessam Mahdavifar,et al.  Covert Millimeter-Wave Communication via a Dual-Beam Transmitter , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[12]  Feng Shu,et al.  Pilot-Based Channel Estimation Design in Covert Wireless Communication , 2019, ArXiv.

[13]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[14]  Wei Yu,et al.  Two-Timescale Hybrid Compression and Forward for Massive MIMO Aided C-RAN , 2019, IEEE Transactions on Signal Processing.

[15]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[16]  Antti Tölli,et al.  Decentralized Minimum Power Multi-Cell Beamforming with Limited Backhaul Signaling , 2011, IEEE Transactions on Wireless Communications.

[17]  James V. Krogmeier,et al.  Millimeter Wave Beamforming for Wireless Backhaul and Access in Small Cell Networks , 2013, IEEE Transactions on Communications.

[18]  Shihao Yan,et al.  Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints , 2019, IEEE Transactions on Vehicular Technology.

[19]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[20]  Robert J. Baxley,et al.  Achieving positive rate with undetectable communication Over MIMO rayleigh channels , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[21]  Iain B. Collings,et al.  Millimeter-Wave Small Cells: Base Station Discovery, Beam Alignment, and System Design Challenges , 2018, IEEE Wireless Communications.

[22]  Amr Abdelaziz,et al.  Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[23]  Jianfeng Ma,et al.  Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band , 2020, IEEE Internet of Things Journal.

[24]  Ming Xiao,et al.  Millimeter Wave Communications for Future Mobile Networks , 2017, IEEE Journal on Selected Areas in Communications.

[25]  Meisam Razaviyayn,et al.  Successive Convex Approximation: Analysis and Applications , 2014 .

[26]  Matthieu R. Bloch,et al.  Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[27]  Jianfeng Ma,et al.  Covert Wireless Communications in IoT Systems: Hiding Information in Interference , 2018, IEEE Wireless Communications.

[28]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[29]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[30]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[31]  Yunlong Cai,et al.  Randomized Two-Timescale Hybrid Precoding for Downlink Multicell Massive MIMO Systems , 2019, IEEE Transactions on Signal Processing.

[32]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[33]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[34]  Feng Shu,et al.  Optimal Detection of UAV's Transmission With Beam Sweeping in Covert Wireless Networks , 2020, IEEE Transactions on Vehicular Technology.

[35]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[36]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[37]  Hessam Mahdavifar,et al.  Covert Millimeter-Wave Communication: Design Strategies and Performance Analysis , 2020, IEEE Transactions on Wireless Communications.

[38]  Simon L. Cotton,et al.  Millimeter-wave soldier-to-soldier communications for covert battlefield operations , 2009, IEEE Communications Magazine.

[39]  John R. Hershey,et al.  Approximating the Kullback Leibler Divergence Between Gaussian Mixture Models , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[40]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[41]  Iain B. Collings,et al.  Explore and Eliminate: Optimized Two-Stage Search for Millimeter-Wave Beam Alignment , 2018, IEEE Transactions on Wireless Communications.