CN111555836B - Wireless covert communication model and method based on multi-node cooperative interference blocking - Google Patents
Wireless covert communication model and method based on multi-node cooperative interference blocking Download PDFInfo
- Publication number
- CN111555836B CN111555836B CN202010346242.1A CN202010346242A CN111555836B CN 111555836 B CN111555836 B CN 111555836B CN 202010346242 A CN202010346242 A CN 202010346242A CN 111555836 B CN111555836 B CN 111555836B
- Authority
- CN
- China
- Prior art keywords
- transmitter
- node
- cooperative
- target receiver
- probability
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006854 communication Effects 0.000 title claims abstract description 76
- 238000004891 communication Methods 0.000 title claims abstract description 76
- 230000000903 blocking effect Effects 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012544 monitoring process Methods 0.000 claims abstract description 47
- 238000001514 detection method Methods 0.000 claims abstract description 31
- 238000012216 screening Methods 0.000 claims description 36
- 230000014509 gene expression Effects 0.000 claims description 10
- 238000009826 distribution Methods 0.000 claims description 7
- 238000012360 testing method Methods 0.000 claims description 7
- 238000012549 training Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 9
- 238000011156 evaluation Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 7
- 230000007423 decrease Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 101100460704 Aspergillus sp. (strain MF297-2) notI gene Proteins 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/336—Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/345—Interference values
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
- H04B17/3912—Simulation models, e.g. distribution of spectral power density or received signal strength indicator [RSSI] for a given geographic region
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Quality & Reliability (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a wireless covert communication model and a method based on multi-node cooperative interference blocking, which comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein both a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are sent to the target receiver; the monitoring party is used for receiving a hidden signal sent by a transmitter and a blocking signal sent by a cooperative node in real time; the method takes the hidden throughput as an evaluation index, and ensures that a system always works in an environment with the optimal hidden throughput under the condition of ensuring that the detection error rate of a monitoring party is higher than a certain threshold value by designing a blocking node selection criterion and optimizing related transmission parameters; the invention further increases the difficulty of detecting the hidden information by the monitoring party, so that the hidden communication in the wireless network is easier to realize, the hidden throughput is higher, and the transmission performance of the hidden information is improved.
Description
Technical Field
The invention relates to wireless covert communication method research in a wireless network, in particular to a wireless covert communication model and method based on multi-node cooperative interference blocking.
Background
In recent years, the dependence on wireless devices has increased rapidly, but due to the broadcast nature of wireless communication, security and privacy of wireless communication are receiving increasing attention, and wireless communication security is a core issue that any communication system needs to face. Security and privacy are critical in existing and future wireless networks because large amounts of confidential information (e.g., credit card information, military information, etc.) are transmitted over open wireless media. Although conventional information security techniques may provide protection against eavesdropping by encryption, recent studies have shown that even the most powerful encryption techniques can be defeated by a strong adversary. On the other hand, the physical layer security measures utilize the dynamic characteristics of the wireless medium to minimize the information acquired by an eavesdropper. However, it does not provide protection against detection of the transmission itself, since the encrypted transmission first causes doubt and further detection by the eavesdropper.
Thus, the need for covert communications, the purpose of which is to enable wireless transmission between two users while ensuring that the probability of detection of the user is negligible, is becoming increasingly widespread. This strong security (i.e., wireless covert communication) is desirable in many application scenarios for wireless communication, such as stealth military operations, location tracking in vehicle ad hoc networks, and interworking of sensor networks or the internet of things.
Recently, many scholars have studied on wireless covert communication, and many classical communication scene models are proposed, such as a covert communication model based on a full-duplex receiver and a covert communication model based on greedy relay, but these models all have only one interference source, and the interference suffered in real wireless communication is not single, and even the purpose of transmitting covert information may be achieved by cooperative interference among many users. Therefore, research on more realistic scenes is necessary.
Disclosure of Invention
The invention aims to provide a wireless covert communication model and a method based on multi-node cooperative interference blocking, which solve the defect that the wireless communication concealment still has certain risks due to single scene of the existing established wireless covert communication model.
In order to achieve the purpose, the invention adopts the technical scheme that:
the invention provides a wireless covert communication model based on multi-node cooperative interference blocking, which comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein both a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are sent to the target receiver; the monitoring party is used for receiving the hidden signal sent by the transmitter and the blocking signal sent by the cooperative node in real time.
Preferably, the transmitter, the target receiver, the listener and the cooperative node are all configured with a single antenna.
A wireless covert communication method based on multi-node cooperative interference blocking comprises the following steps based on the wireless covert communication model based on multi-node cooperative interference blocking:
step 2, setting a screening threshold, and selecting a blocking node from the N cooperative nodes according to the screening threshold;
step 3, calculating the detection error probability of the monitoring party and the communication interruption probability between the transmitter and the target receiver according to the blocking node selected in the step 2;
step 4, calculating the concealed throughput between the transmitter and the target receiver according to the detection error probability of the monitoring party obtained in the step 3 and the communication interruption probability between the transmitter and the target receiver;
and step 5, determining the number of the blocking nodes according to the screening threshold value corresponding to the maximum concealment throughput in the plurality of concealment throughputs obtained in the step 4.
Preferably, in step 2, a screening threshold is set, and a blocking node is selected from the N cooperative nodes according to the screening threshold:
if among the N cooperative nodesOf a cooperating nodeAnd if the value is less than the preset screening threshold value, taking the cooperative node as a blocking node, and representing the screening method by using an indicative function, wherein,the channel gain between the kth cooperative node to the target receiver.
Preferably, in step 3, the detection error probability of the listener is calculated, and the specific method is as follows:
s1, setting the concealed signal transmitted by the transmitter in the current time slot as xt[i](ii) a And always at power PtGenerating a concealment signal;
the blocking node can send a blocking signal in the current time slot asAnd always at power PjTransmitting a noise signal;
s2, the monitor carries out binary hypothesis test on the signal received by the current time slot;
and S3, calculating the detection error probability of the monitoring party according to the detection result obtained in the S2.
Preferably, in S2, the signal received by the listener is represented by the following formula:
wherein, yw[i]A signal received for a listener; n isw[i]Is a white noise signal received by a monitor;the method is an original hypothesis and indicates that the transmitter does not send the hidden information;to make an alternative assumption, that the transmitter sendsConcealing the information;
the monitoring party performs binary hypothesis test on the signal received by the current time slot, and the specific method is as follows:
if the average power T of the signal received by the monitoring party in the current time slotwWhen the value is smaller than the monitoring threshold value mu, the judgment result of the monitoring party is that the original hypothesis is correct;
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is greater than the monitoring threshold value mu, the judgment result of the monitoring party is that the alternative hypothesis is correct;
in S3, the detection error probability of the listener is calculated according to the test result obtained in S2, specifically by the following formula:
ξ=α+β
wherein, α is false alarm probability, which indicates that the transmitter does not transmit the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter transmits the hidden information; beta is the probability of missing report, which indicates that the transmitter sends the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter does not send the hidden information.
Preferably, in step 3, the communication interruption probability between the transmitter and the target receiver is calculated by the following specific method:
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcIn time, the communication disruption is concealed, from which the expression for the probability of communication disruption can be derived as:
wherein δ is a communication interruption probability; gamma rayrIs the signal to interference plus noise ratio of the signal received by the receiver;indicating the probability.
Preferably, in step 4, the maximum concealment throughput is obtained under the condition that the detection error probability of the listener satisfies the given concealment constraint, and is represented by the following formula:
wherein,is the blind throughput;a desired lowest detection error probability; ε is a given hidden constraint.
Preferably, in step 5, the specific method for determining the number of blocking nodes is:
according to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]The rate of covert communication between the upper pair transmitter and the target receiver is RcAnd carrying out two-dimensional value search on the screening threshold tau to obtain the maximum concealment throughput meeting the given concealment constraint condition, and further obtain the optimal concealment communication rate between the transmitter and the target receiver corresponding to the maximum concealment throughput and the optimal screening threshold; and selecting a blocking node from the N cooperative nodes according to the optimal screening threshold.
Compared with the prior art, the invention adopts the technical scheme that:
according to the wireless covert communication model and method based on multi-node cooperative interference blocking, a certain number of cooperative nodes are selected intelligently to transmit blocking signals, detection of a monitoring party is interfered to the maximum extent on the premise that target communication is not damaged, and a reliable and covert communication target is achieved; the method takes the hidden throughput as an evaluation index, and ensures that a system always works in an environment with the optimal hidden throughput under the condition of ensuring that the detection error rate of a monitoring party is higher than a certain threshold value by designing a blocking node selection criterion and optimizing related transmission parameters; simulation experiments prove that the maximum hidden throughput of the system is remarkably increased along with the increase of the total number of the cooperative user nodes, so that the feasibility and the superiority of the wireless hidden communication method based on multi-node cooperative interference blocking are proved.
Drawings
FIG. 1 is a schematic diagram of a wireless covert communication model to which the present invention relates;
FIG. 2 is a schematic diagram of a system in a different aspectLower maximum blind throughputA variation graph along with the total number N of the cooperative nodes available for screening;
FIG. 3 is a schematic diagram of a system according to the present inventionLower optimal screening threshold τ*A variation graph along with the total number N of the cooperative nodes available for screening;
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in FIG. 1, the wireless covert communication model based on multi-node cooperative interference blocking provided by the invention comprises a transmitter T, a target receiver R, a listener W and N cooperative nodes J for assisting the transmitter T in covert communicationkWherein k is 1,2, …, N.
The hidden signal sent by the transmitter and the interference signal sent by the cooperative node are both sent to a target receiver; the monitoring party is used for receiving the hidden signal sent by the transmitter and the blocking signal sent by the cooperative node in real time.
The transmitter, the target receiver, the monitor and the cooperative node JkA single antenna is configured.
Based on the wireless covert communication model, the invention provides a wireless covert communication method based on multi-node cooperative interference blocking, which comprises the following steps:
firstly, a communication link is established between a current time slot transmitter T and a target receiver R, and the target receiver R acquires channel state information of the communication link through channel training; considering a time division duplex system and slowly changing channels, namely setting reciprocity of uplink and downlink channels; assume that the transmitter T knows the target receiver R and the cooperative node JkThe location information of (a); let the channel from the transmitter to the target receiver be ht,r(ii) a The channel from the transmitter to the listener is ht,w(ii) a The channel from the kth cooperative node to the target receiver isThe channel from the kth cooperative node to the listener is
Designing a multi-node cooperation interference blocking scheme, intelligently selecting a certain number of cooperation nodes to transmit blocking signals to interfere the detection of a monitor through the design selection scheme, and calculating the detection error probability of the monitor; the method comprises the following specific steps:
s1, the scheme screens the blocking nodes based on the threshold value tau, namely, the method meets the requirementIs selected as a blocking node by an indicative functionSelection criteria representing blocking nodes:
note that the concealed signal transmitted by the transmitter T in the current time slot is xt[i]Satisfy the following requirementsAn index of a currently used channel;is xt[i]And always with power PtCarrying out transmission;
note cooperation node JkThe artificial noise signal which can be transmitted in the current time slot isSatisfy the requirement ofIs thatConjugation of (1).
All the selected blocking nodes are powered by power PjTransmitting a noise signal, and a power PjIn the intervalSubject to uniform distribution, i.e. power PjThe probability density function of (a) is:
The monitoring side faces the problem of binary hypothesis test, and the binary hypotheses are the original hypotheses respectivelyAnd alternative assumptionsWherein the original hypothesisNo hidden information is sent for the transmitter; alternative assumptionsSending the hidden information for the transmitter; so the signal y received by the listenerw[i]Can be expressed as:
Average power T of signal received by monitoring party in current time slotwComprises the following steps:
the monitoring party uses a judgment criterion based on the monitoring threshold mu to judge whether the transmitter sends the hidden information, namely when Tw<Mu hours, the listener tends toAnd recording the event asWhen T isw>Mu hours, the listener tends toAnd recording the event asWherein mu is more than 0; in this method, it is assumed that the number of channels used is infinite, i.e., n → ∞
Defining the false alarm probability asIn the case of occurrence, the judgment result of the monitor tends to beProbability of (2), is recorded as Defining a false negative probability asIn the case of occurrence, the judgment result of the monitor tends to beProbability of (2), is recorded as Then is atUnder the condition that the occurrence probability is the same, the detection error probability of the monitoring party is ξ ═ α + β, and the specific expressions of the false alarm probability and the false alarm probability are as follows:
the optimal monitoring threshold value mu can be obtained according to the monotonicity of the function*Comprises the following steps:
corresponding lowest detection error probability ξ*Is composed of
thirdly, calculating the communication interruption probability between the transmitter and the target receiver, and obtaining the maximum concealment throughput under the condition of ensuring that the detection error probability of the monitoring party is higher than the given concealment constraint; the method comprises the following specific steps:
Then the signal-to-interference-and-noise ratio of the received signal of the target receiver is:
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcWhen, the communication interruption is concealed, thereby obtaining communicationThe expression for the outage probability is:
Then the blind throughput may be expressed as
The maximum concealment throughput is
Wherein epsilon is given hidden constraint and takes the value of [0,1 ].
According to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]Upper pair of RcTau is searched in two dimensions to obtain the maximum concealment throughput satisfying the above conditionsWhileCorresponding Rc *,τ*Respectively the optimal covert communication rate and the optimal screening threshold value, and then according to the optimal screening threshold value tau*And screening out the blocking nodes from the N cooperative nodes so as to realize the covert communication between the transmitter and the target receiver.
Simulation experiments verify the effectiveness and the realizability of the wireless covert communication method based on multi-node cooperative interference blocking. In this experiment, the transmitting power of the transmitter is P t10W, noise powerUnder the condition that the hidden constraint epsilon is 0.9, the maximum noise transmission power of the blocking node is changedAnd the total number N of the collaborative nodes available for screening are simulated. Are respectively atIn three cases, the total number of the collaborative user nodes available for screening is changed from 10 to 100 by taking 10 as a step length, and each group of data is implemented 5000 times.
FIG. 2 is a schematic diagram of a process in a different embodimentLower maximum blind throughputAnd (4) a graph of the variation of the total number N of the cooperative nodes available for screening. Contrast the differenceIt can be found that,the number of the cooperative nodes is obviously increased along with the increase of the total number N of the cooperative nodes, thereby proving the feasibility and the superiority of the method. In addition, it can be noted thatIs notBecause of the larger monotonic function ofResulting in a greater probability of detection error and a greater probability of communication disruption, with an increase in the probability of detection error resulting in an increase in covert throughput and an increase in the probability of communication disruption resulting in a decrease in covert throughputSmall, thereforeIs notIs a monotonic function of (a).
FIG. 3 is a schematic diagram of a process in a different embodimentLower optimal screening threshold τ*And (4) a graph of the variation of the total number N of the cooperative nodes available for screening. As can be seen from FIG. 3, τ*Not only decreases with increasing N, but also with increasing NIs increased and decreased. This is because of the increase in N andan increase in interference noise means an increase in interference noise resulting in a smaller screening threshold to meet a given concealment constraint. When the number N is 10, the number N, in the meantime, the screening threshold value can meet the concealment constraint only when the screening threshold value tends to infinity, that is, the probability that the concealment constraint is met under the condition is almost zero, so that the data of the point is not displayed in the graph, and meanwhile, the point corresponds toAnd Rc *Both are also noted as 0.
FIG. 4 is a schematic diagram of a process in a different embodimentLower optimal covert communication rate Rc *And (4) a graph of the variation of the total number N of the cooperative nodes available for screening. As can be seen from the view in figure 4,Rc *all increase with the increase of the total number of cooperative nodes N, and R is the samec *Is notThe reason for the monotonic function ofIs notThe reason for the monotonic function of (2) is similar.
The invention compares with others:
(1) the invention adopts the idea of wireless covert communication by multi-node cooperative interference blocking, and resists the monitoring party by selecting a plurality of blocking users to transmit artificial noise without generating great influence on the covert communication process.
(2) The wireless covert communication method of multi-node cooperative interference blocking fully plays the role of idle users in the current time slot in covert communication. The number of idle users is large, the distribution range is wide, and the idle users which can help the covert communication can be always obtained through the screening scheme in the text, so that the resources of the idle users are more efficiently utilized.
(3) The wireless covert communication method of multi-node cooperative interference blocking further increases the difficulty of detecting covert information by a monitoring party, so that the covert communication in a wireless network is easier to realize, the covert throughput is higher, and the performance of covert information transmission is improved.
Claims (6)
1. A wireless covert communication method based on multi-node cooperative interference blocking is characterized by relating to a wireless covert communication model based on multi-node cooperative interference blocking, wherein the model comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are both sent to the target receiver; the monitoring party is used for receiving a hidden signal sent by a transmitter and an artificial noise signal sent by a cooperative node in real time, and specifically comprises the following steps:
step 1, a communication link is established between a current time slot transmitter and a target receiver; the target receiver acquires channel state information of a communication link through channel training, reciprocity of an uplink channel and a downlink channel is set, and the transmitter knows position information of the target receiver and the cooperative node;
step 2, setting a selection reference for selecting a blocking node from the N cooperative nodes;
step 3, respectively acquiring an expression of the detection error probability of the monitoring party and an expression of the communication interruption probability between the transmitter and the target receiver according to the selection reference set in the step 2;
step 4, acquiring the concealed throughput between the transmitter and the target receiver according to the expression of the communication interruption probability between the transmitter and the target receiver obtained in the step 3;
step 5, according to the expression of the detection error probability of the monitoring party obtained in the step 3, combining the concealment throughput between the transmitter and the target receiver obtained in the step 4 to obtain a screening threshold corresponding to the maximum concealment throughput, and determining the number of the blocking nodes according to the screening threshold;
in step 5, according to the expression of the detection error probability of the monitoring party obtained in step 3, combining the concealment throughput between the transmitter and the target receiver obtained in step 4 to obtain a screening threshold corresponding to the maximum concealment throughput, and determining the number of blocking nodes according to the screening threshold, the specific method is as follows:
under the condition of ensuring that the detection error probability of the monitoring party meets the given concealment constraint, the maximum concealment throughput is obtained and is expressed by the following formula:
wherein,is the blind throughput;a desired lowest detection error probability; epsilon is a given hidden constraint, which takes the value of [0, 1%];
According to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]Covert communication rate R between an upper pair transmitter and a target receivercAnd carrying out two-dimensional value search on the screening threshold tau to obtain the maximum concealment throughput meeting the given concealment constraint condition, and further obtain the optimal concealment communication rate between the transmitter and the target receiver corresponding to the maximum concealment throughput and the optimal screening threshold; and selecting a blocking node from the N cooperative nodes according to the optimal screening threshold.
2. The method according to claim 1, wherein in step 2, a selection criterion for selecting the blocking node from the N cooperative nodes is set, specifically:
if a cooperative node of the N cooperative nodesAnd if the value is less than the preset screening threshold value, taking the cooperative node as a blocking node, and representing the screening method by using an indicative function, wherein,the channel gain between the kth cooperative node to the target receiver.
3. The wireless covert communication method based on multi-node cooperative interference blocking according to claim 1, wherein in step 3, the detection error probability of the listener is calculated by:
s1, setting the concealed signal transmitted by the transmitter in the current time slot as xt[i](ii) a And always at power PtGenerating a concealment signal;
the blocking node is at the current timeThe artificial noise signal which can be transmitted in a slot is vjk[i]And always at power PjTransmitting a noise signal;
s2, the monitor carries out binary hypothesis test on the signal received by the current time slot;
and S3, calculating the detection error probability of the monitoring party according to the detection result obtained in the S2.
4. The method according to claim 3, wherein in step S2, the signal received by the listener is represented by the following formula:
wherein, yw[i]A signal received for a listener; n isw[i]Is a white noise signal received by a monitor;the method is an original hypothesis and indicates that the transmitter does not send the hidden information;to make an alternative hypothesis, it indicates that the transmitter sent the concealment information;the channel coefficient from the kth cooperative node to the monitoring party is obtained; h ist,wIs the channel coefficient from the transmitter to the listener, N is the total number of cooperative nodes, and is an indicative function
The monitoring party performs binary hypothesis test on the signal received by the current time slot, and the specific method is as follows:
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is less than the monitoring threshold value mu, the judgment of the monitoring party is carried outThe result of the interruption is that the original hypothesis is correct;
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is greater than the monitoring threshold value mu, the judgment result of the monitoring party is that the alternative hypothesis is correct;
in S3, the detection error probability of the listener is calculated according to the test result obtained in S2, specifically by the following formula:
ξ=α+β
wherein, α is false alarm probability, which indicates that the transmitter does not transmit the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter transmits the hidden information; beta is the probability of missing report, which indicates that the transmitter sends the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter does not send the hidden information.
5. The method of claim 1, wherein in step 3, the probability of communication interruption between the transmitter and the target receiver is calculated by:
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcIn time, the communication disruption is concealed, from which the expression for the probability of communication disruption can be derived as:
6. The method of claim 1, wherein the transmitter, the target receiver, the listener and the cooperative node are configured with a single antenna.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010346242.1A CN111555836B (en) | 2020-04-27 | 2020-04-27 | Wireless covert communication model and method based on multi-node cooperative interference blocking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010346242.1A CN111555836B (en) | 2020-04-27 | 2020-04-27 | Wireless covert communication model and method based on multi-node cooperative interference blocking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111555836A CN111555836A (en) | 2020-08-18 |
CN111555836B true CN111555836B (en) | 2021-12-28 |
Family
ID=72007838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010346242.1A Active CN111555836B (en) | 2020-04-27 | 2020-04-27 | Wireless covert communication model and method based on multi-node cooperative interference blocking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111555836B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112383380B (en) * | 2020-10-21 | 2022-06-07 | 西安交通大学 | Covert vehicle communication method based on non-orthogonal multiple access technology |
CN112822662B (en) * | 2020-11-24 | 2022-05-20 | 西安交通大学 | D2D cache user safety cooperation method and system based on joint content transmission and interference blocking |
CN112911616B (en) * | 2021-01-19 | 2022-10-18 | 西安理工大学 | Covert transmission method based on cooperative interference countermeasure joint detection |
CN112954672B (en) * | 2021-02-09 | 2022-09-23 | 大连理工大学 | Unmanned aerial vehicle relay covert communication method for flight monitoring person |
CN114884608A (en) * | 2022-05-11 | 2022-08-09 | 电子科技大学 | Unmanned aerial vehicle cooperative covert communication method and system |
CN115529103A (en) * | 2022-06-27 | 2022-12-27 | 南京理工大学 | Covert communication system with cooperation of double unmanned aerial vehicles and method for maximizing average covert rate |
CN115276883A (en) * | 2022-07-19 | 2022-11-01 | 西安电子科技大学 | Cooperative cognitive covert communication method based on maximum rate mechanism |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104581960A (en) * | 2015-01-26 | 2015-04-29 | 西安交通大学 | Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability |
CN104918238A (en) * | 2014-03-14 | 2015-09-16 | 北京邮电大学 | Cooperation interference excitation method for realizing physical layer safety |
CN108834113A (en) * | 2018-06-20 | 2018-11-16 | 江苏大学 | A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer |
CN109788479A (en) * | 2019-02-27 | 2019-05-21 | 西安交通大学 | A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability |
CN110166096A (en) * | 2019-04-09 | 2019-08-23 | 西安电子科技大学 | A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise |
CN110248306A (en) * | 2018-03-08 | 2019-09-17 | 北京邮电大学 | A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8744336B2 (en) * | 2008-08-27 | 2014-06-03 | Qualcomm Incorporated | Interference detection apparatus and method |
-
2020
- 2020-04-27 CN CN202010346242.1A patent/CN111555836B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104918238A (en) * | 2014-03-14 | 2015-09-16 | 北京邮电大学 | Cooperation interference excitation method for realizing physical layer safety |
CN104581960A (en) * | 2015-01-26 | 2015-04-29 | 西安交通大学 | Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability |
CN110248306A (en) * | 2018-03-08 | 2019-09-17 | 北京邮电大学 | A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium |
CN108834113A (en) * | 2018-06-20 | 2018-11-16 | 江苏大学 | A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer |
CN109788479A (en) * | 2019-02-27 | 2019-05-21 | 西安交通大学 | A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability |
CN110166096A (en) * | 2019-04-09 | 2019-08-23 | 西安电子科技大学 | A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise |
Non-Patent Citations (3)
Title |
---|
Covert Communications in D2D Underlaying Cellular Networks With Antenna Array Assisted Artificial Noise Transmission;Yu’e Jiang;《IEEE Transactions on Vehicular Technology》;20200114;全文 * |
Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA;Yu’e Jiang;《IEEE Systems Journal》;20200203;全文 * |
隐蔽无线通信技术研究—节点协助下的隐蔽通信性能分析;朱强强;《中国优秀硕士学位论文全文数据库 信息科技辑》;20200131;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111555836A (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111555836B (en) | Wireless covert communication model and method based on multi-node cooperative interference blocking | |
Kim et al. | Channel-aware adversarial attacks against deep learning-based wireless signal classifiers | |
Hu et al. | Covert communications without channel state information at receiver in IoT systems | |
Xiao et al. | IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning | |
US20200169883A1 (en) | Security Detection Method for Physical Layer Authentication System | |
CN111510987B (en) | Relay selection method based on safety cooperation NOMA network | |
CN109088891B (en) | Legal monitoring method based on physical layer security under multi-relay system | |
CN110730452A (en) | Performance analysis method of combined relay and interference selection scheme in wireless communication system | |
CN109525985B (en) | Full-duplex active eavesdropping method for wireless energy acquisition | |
CN110557768A (en) | Safe transmission method based on cooperative non-orthogonal multiple access network | |
CN115665729A (en) | Hidden transmission method under multi-eavesdropper joint detection environment | |
CN106953819B (en) | Physical layer secret communication method based on multi-radio cooperation precoding | |
CN110312255B (en) | Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags | |
CN110213793B (en) | Relay system safety throughput optimization method based on rate control | |
Yu et al. | Theoretical analysis of secrecy transmission capacity in wireless ad hoc networks | |
CN102711120B (en) | Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory | |
KR102282744B1 (en) | Opportunistic scheduling method to improve the Physical-Layer Security in MU-MISO NOMA systems | |
Mousavifar et al. | Trust-based energy efficient spectrum sensing in cognitive radio networks | |
Cai et al. | Reliable High Throughput Aerial Acoustic Communication for Mobile Network | |
CN106604274A (en) | Safety communication method based on information theory and cryptography in wireless sensor network | |
CN111106888B (en) | Multi-mode correlation based step-by-step spectrum sensing method and storage medium | |
He et al. | Channel-Aware Jammer Selection and Power Control in Covert Communication | |
CN117835230B (en) | Probability hidden transmission method based on link information | |
Shi et al. | User scheduling design for covert communication in cooperative cognitive radio system | |
Chaudhari et al. | Effects of quantization on bepwalls for soft decision based cooperative sensing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |