DeepAI AI Chat
Log In Sign Up

Throughput Scaling of Covert Communication over Wireless Adhoc Networks

by   Kang-Hee Cho, et al.
National University of Singapore

We consider the problem of covert communication over wireless adhoc networks in which (roughly) n legitimate nodes (LNs) and n^κ for 0<κ<1 non-communicating warden nodes (WNs) are randomly distributed in a square of unit area. Each legitimate source wants to communicate with its intended destination node while ensuring that every WN is unable to detect the presence of the communication. In this scenario, we study the throughput scaling law. Due the covert communication constraint, the transmit powers are necessarily limited. Under this condition, we introduce a preservation region around each WN. This region serves to prevent transmission from the LNs and to increase the transmit power of the LNs outside the preservation regions. For the achievability results, multi-hop (MH), hierarchical cooperation (HC), and hybrid HC-MH schemes are utilized with some appropriate modifications. In the proposed MH and hybrid schemes, because the preservation regions may impede communication along direct data paths, the data paths are suitably modified by taking a detour around each preservation region. To avoid the concentration of detours resulting extra relaying burdens, we distribute the detours evenly over a wide region. In the proposed HC scheme, we control the symbol power and the scheduling of distributed multiple-input multiple-output transmission. We also present matching upper bounds on the throughput scaling under the assumption that every active LN consumes the same average transmit power over the time period in which the WNs observe the channel outputs.


Mobility-Assisted Covert Communication over Wireless Ad Hoc Networks

We study the effect of node mobility on the throughput scaling of the co...

Harvested Power Region of Two-user MISO WPT Systems With Non-linear EH Nodes

In this paper, we determine the harvested power region of a two-user mul...

Breaking the Unit Throughput Barrier in Distributed Systems

A multi-level random power transmit strategy that is used in conjunction...

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty

Covert communication can prevent the opponent from knowing that a wirele...

Age of Information Scaling in Large Networks

We study age of information in a multiple source-multiple destination se...

Covert Wireless Communications with Active Eavesdropper on AWGN Channels

Covert wireless communication can prevent an adversary from knowing the ...

State Masking Over a Two-State Compound Channel

We consider fundamental limits for communicating over a compound channel...