Hu et al., 2019 - Google Patents
Covert transmission with a self-sustained relayHu et al., 2019
View PDF- Document ID
- 16208218748360294834
- Author
- Hu J
- Yan S
- Shu F
- Wang J
- Publication year
- Publication venue
- IEEE Transactions on Wireless Communications
External Links
Snippet
This paper examines the possibility, performance limits, and associated costs for a self- sustained relay to transmit its own covert information to a destination on top of forwarding the source's information. Since the source provides energy to the relay for forwarding its …
- 230000005540 biological transmission 0 title abstract description 78
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | Covert transmission with a self-sustained relay | |
Hu et al. | Covert communication achieved by a greedy relay in wireless networks | |
Cumanan et al. | Physical layer security jamming: Theoretical limits and practical designs in wireless networks | |
Zhu et al. | On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping | |
Hu et al. | Covert communications without channel state information at receiver in IoT systems | |
Yan et al. | Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems | |
Guo et al. | Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks | |
Hu et al. | Covert communication in wireless relay networks | |
Tao et al. | Achieving covert communication in uplink NOMA systems via energy harvesting jammer | |
Shi et al. | Hybrid cache placement for physical-layer security in cooperative networks | |
Yu et al. | Jammer-aided secure communications for cooperative NOMA systems | |
Bi et al. | Accumulate then transmit: Toward secure wireless powered communication networks | |
Ssettumba et al. | Physical layer security enhancement for Internet of Things in the presence of co-channel interference and multiple eavesdroppers | |
Xu et al. | Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks | |
Wang et al. | Secure wireless powered cooperative communication networks with finite energy storage | |
Bai et al. | On covert communication performance with outdated CSI in wireless greedy relay systems | |
Wu et al. | Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks | |
Xu et al. | Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks | |
Jiang et al. | Security‐reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications | |
Chen et al. | Covert Communication in Two-Hop Cooperative Cognitive Radio System | |
Liu et al. | Joint decode-and-forward and jamming for wireless physical layer security with destination assistance | |
Wang et al. | Probabilistic accumulate-then-transmit in wireless-powered covert communications | |
Jameel et al. | Intercept probability analysis of wireless powered relay system in kappa-mu fading | |
Liu et al. | Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection | |
Huang et al. | Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection |