Covert Communications Without Channel State Information at Receiver in IoT systems

Covert communications can hide the very existence of wireless transmissions and thus are able to address privacy issues in numerous applications of the emerging Internet of Things (IoT). In this article, we adopt channel inversion power control (CIPC) to achieve covert communications in Rayleigh fading wireless networks, where a transmitter can possibly hide itself from a warden while transmitting information to a receiver. The CIPC can guarantee a constant signal power at the receiver, which removes the requirement that the receiver has to know the channel state information in order to coherently decode the transmitter’s signal. Specifically, we examine the performance of the achieved covert communications in terms of the effective covert rate (ECR), which quantifies the amount of information that the transmitter can reliably convey to the receiver subject to the warden’s total error probability being no less than some specific value. The noise uncertainty at the warden serves as the enabler of covert communications. For fairness, we also consider noise uncertainty at the legitimate receiver. Our examination shows that increasing the noise uncertainty at the warden and the receiver simultaneously may not continuously improve the ECR achieved in the considered system model.

[1]  Sherali Zeadally,et al.  Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.

[2]  Shihao Yan,et al.  TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement , 2017, IEEE Transactions on Communications.

[3]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[4]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[5]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for NOMA-Based Cellular Massive IoT With SWIPT , 2020, IEEE Transactions on Signal Processing.

[6]  Ekram Hossain,et al.  On Stochastic Geometry Modeling of Cellular Uplink Transmission With Truncated Channel Inversion Power Control , 2014, IEEE Transactions on Wireless Communications.

[7]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[8]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[9]  H. Vincent Poor,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.

[10]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[11]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[12]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[13]  Vincent Y. F. Tan,et al.  Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).

[14]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[15]  Jianfeng Ma,et al.  Covert Wireless Communications in IoT Systems: Hiding Information in Interference , 2018, IEEE Wireless Communications.

[16]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[17]  Matthieu R. Bloch,et al.  First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.

[18]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[19]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[20]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.

[21]  Jun Li,et al.  Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading , 2018, IEEE Transactions on Vehicular Technology.

[22]  Dominic J. A. Welsh,et al.  Complexity and cryptography - an introduction , 2006 .

[23]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[24]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[25]  Feng Shu,et al.  Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.

[26]  Derrick Wing Kwan Ng,et al.  Key technologies for 5G wireless systems , 2017 .

[27]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[28]  Jianfeng Ma,et al.  On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).

[29]  Dan Wu,et al.  Resource Allocation for Covert Communication in D2D Content Sharing: A Matching Game Approach , 2019, IEEE Access.

[30]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[31]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[32]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[33]  Yueming Cai,et al.  Secure Transmission Design With Feedback Compression for the Internet of Things , 2018, IEEE Transactions on Signal Processing.

[34]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[35]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[36]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[37]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[38]  Yueming Cai,et al.  Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed? , 2018, IEEE Journal on Selected Areas in Communications.