Robust Beamforming Design for Covert Communications

In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has either perfect or imperfect knowledge about Willie’s channel state information (WCSI). For the perfect WCSI case, the problem is formulated under the perfect covert constraint, and we develop a covert beamformer by applying semidefinite relaxation and the bisection method. Then, to reduce the computational complexity, we further propose a zero-forcing beamformer design with a single iteration processing. For the case of the imperfect WCSI, the robust beamformer is developed based on a relaxation and restriction approach by utilizing the property of Kullback-Leibler divergence. Furthermore, we derive the optimal decision threshold of Willie, and analyze the false alarm and the missed detection probabilities in this case. Finally, the performance of the proposed beamformer designs is evaluated through numerical experiments.

[1]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[2]  Donald F. Towsley,et al.  Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[3]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[4]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[5]  H. Vincent Poor,et al.  LPD Communication: A Sequential Change-Point Detection Perspective , 2019, IEEE Transactions on Communications.

[6]  Matthieu R. Bloch,et al.  Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.

[7]  Xiaohong Jiang,et al.  Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[8]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[9]  Dennis Goeckel,et al.  Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information , 2019, IEEE Transactions on Vehicular Technology.

[10]  Omer Gurewitz,et al.  The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers , 2018, IEEE Transactions on Information Theory.

[11]  Dennis Goeckel,et al.  Robust Power Allocation in Covert Communication: Imperfect CDI , 2019, IEEE Transactions on Vehicular Technology.

[12]  Hui Zhao,et al.  Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA , 2020, IEEE Systems Journal.

[13]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[14]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[15]  Kai-Kit Wong,et al.  A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer , 2020, IEEE Internet of Things Journal.

[16]  Shihao Yan,et al.  Covert Communication in Downlink NOMA Systems With Random Transmit Power , 2020, IEEE Wireless Communications Letters.

[17]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[18]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[19]  Vincent Y. F. Tan,et al.  Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).

[20]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[21]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[22]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[23]  Matthieu R. Bloch,et al.  Keyless asynchronous covert communication , 2016, 2016 IEEE Information Theory Workshop (ITW).

[24]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[25]  Phee Lep Yeoh,et al.  Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden , 2020, IEEE Internet of Things Journal.

[26]  Phee Lep Yeoh,et al.  Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens , 2020, IEEE Transactions on Communications.

[27]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[28]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[29]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Eytan Modiano,et al.  Efficient Scheduling of Multi-User Multi-Antenna Systems , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[31]  Cong Ling,et al.  Covert Communications With a Full-Duplex Receiver in Non-Coherent Rayleigh Fading , 2021, IEEE Transactions on Communications.

[32]  Vincent Y. F. Tan,et al.  Time-Division is Optimal for Covert Communication Over Some Broadcast Channels , 2019, IEEE Transactions on Information Forensics and Security.

[33]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[34]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[35]  Donald F. Towsley,et al.  LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.

[36]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[37]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[38]  Babak Hassibi,et al.  The Effect of Channel Estimation Error on the Throughput of Broadcast Channels , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[39]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[40]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[41]  Mayank Bakshi,et al.  Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[42]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[43]  Donald F. Towsley,et al.  Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.