Covert Transmission with Harvested Energy by a Wireless Powered Relay

This work examines the possibility, performance limits, and associated costs for a wireless-powered relay to transmit its own covert information to a destination on top of forwarding the source's information. Since the source provides energy to the relay for forwarding its information, the source does not allow the relay's covert transmission and is to detect it. Considering the time switching (TS) and power splitting (PS) schemes for energy harvesting, where all the harvested energy is used for transmission at the relay, we derive the minimum detection error probability $\xi^{\ast}$ at the source, based on which we determine the maximum effective covert rate $\Psi^{\ast}$ subject to a given covertness constraint on $\xi^{\ast}$. Our analysis shows that $\xi^{\ast}$ is the same for the TS and PS schemes, which leads to the fact that the cost of achieving $\Psi^{\ast}$ in both the two schemes in terms of the required increase in the energy conversion efficiency at the relay is the same, although the values of $\Psi^{\ast}$ in these two schemes can be different in specific scenarios. For example, the TS scheme outperforms the PS scheme in terms of achieving a higher $\Psi^{\ast}$ when the transmit power at the source is relatively low. If the covertness constraint is tighter than a specific value, it is the covertness constraint that limits $\Psi^{\ast}$, and otherwise it is upper bound on the energy conversion efficiency that limits $\Psi^{\ast}$.

[1]  Walter L. Smith Probability and Statistics , 1959, Nature.

[2]  Dominic J. A. Welsh,et al.  Complexity and cryptography - an introduction , 2006 .

[3]  Khaled Ben Letaief,et al.  On the diversity gain in cooperative relaying channels with imperfect CSIT , 2010, IEEE Transactions on Communications.

[4]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[5]  Mohamad Sawan,et al.  A High-Efficiency Low-Voltage CMOS Rectifier for Harvesting Energy in Implantable Devices , 2012, IEEE Transactions on Biomedical Circuits and Systems.

[6]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[7]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[8]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[9]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[10]  Donald F. Towsley,et al.  Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[11]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[12]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[13]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[14]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[15]  Saman Atapattu,et al.  Optimal Energy Harvesting Protocols for Wireless Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[16]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[17]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[18]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[19]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[20]  Jun Li,et al.  Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.

[21]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[22]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[23]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[24]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[25]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[26]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[27]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[28]  Jun Li,et al.  Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).

[29]  Saikat Guha,et al.  Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.