CN114520972A - Interference-assisted covert wireless communication method in multi-channel system - Google Patents

Interference-assisted covert wireless communication method in multi-channel system Download PDF

Info

Publication number
CN114520972A
CN114520972A CN202210240847.1A CN202210240847A CN114520972A CN 114520972 A CN114520972 A CN 114520972A CN 202210240847 A CN202210240847 A CN 202210240847A CN 114520972 A CN114520972 A CN 114520972A
Authority
CN
China
Prior art keywords
information
channel
source node
node
destination node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210240847.1A
Other languages
Chinese (zh)
Inventor
杨炜伟
车伯汉
鲁兴波
管新荣
石会
马瑞谦
姜俊豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Army Engineering University of PLA
Original Assignee
Army Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Army Engineering University of PLA filed Critical Army Engineering University of PLA
Priority to CN202210240847.1A priority Critical patent/CN114520972A/en
Publication of CN114520972A publication Critical patent/CN114520972A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An interference-assisted covert wireless communication method in a multi-channel system belongs to the technical field of wireless network privacy information safe transmission. The source node carries out channel estimation and selects a sub-channel with the maximum channel state information from K sub-channels; generating a secret key between a source node and a destination node through a wireless channel before transmitting the private information, and sharing a codebook coded by the private information after encrypting by using the secret key; coding information, namely coding the privacy information to be transmitted by using a codebook shared by the source node and the destination node; transmitting the privacy information to be transmitted on the selected sub-channel by the source node with the optimal transmission power; and (4) information decoding, namely, the destination node decodes by using the codebook shared by the destination node and the source node in each transmission period. The invention can fully utilize the uncertainty of the selected sub-channel in a multi-channel system to improve the covert communication performance between the source node and the destination node.

Description

Interference-assisted covert wireless communication method in multi-channel system
Technical Field
The invention belongs to the technical field of wireless network privacy information safety transmission, and particularly relates to an interference-assisted covert wireless communication method in a multi-channel system.
Background
With the rapid development of technology, more and more confidential and sensitive data (such as health records, identity authentication, etc.) is transmitted over wireless channels. Data from Australian network surveys "Australian cyber ware Index 2019," https:// channellife. com. au/store/eset-leases-aus-tralian-cyber ware ss-in dex-2019-results, addressed: 2019-12-13 show that almost all (94%) of the investigators have conducted financial transactions on the web, including online banking, bill payment and online shopping, which means that people are more reliant on modern wireless communication systems in exchanging sensitive and private information. It follows that wireless communication systems have penetrated aspects of our daily lives, and their security and privacy have also taken an unparalleled priority in our society. However, due to the open nature of the wireless channel (which can be received by both legitimate and illegitimate users), the security problem of wirelessly transmitting data has been the focus of research in the industry. Conventionally, the security of wireless transmission is improved by protecting the data content by technical means. However, in recent years, with the proliferation of wireless devices and the advancement of computing technologies, communication security is greatly challenged, and especially quantum computing is broken through, so that computing resources available to potential adversaries are greatly increased, and the possibility of breaking through the traditional security technology for wireless information transmission is increased. As an effective supplement to the traditional safety mechanism, the physical layer safety technology utilizes the fading characteristic of a wireless channel to ensure the safety of information transmission and realize the absolute safety in the Shannon information theory meaning. It is worth pointing out that the information security transmission mechanism based on the traditional encryption and the physical layer security only protects the content of the information from being decoded by the illegal eavesdropping node, and focuses more on the security of the transmitted information, but ignores the undetectable property of the information transmission process. In fact, the eavesdropping node performs information deciphering based on correct detection of the information transmission behavior, and thus, stronger security performance can be achieved by hiding the wireless transmission behavior. In some special scenarios, such as military command, the privacy and integrity of the information are important, and the behavior of the transmitted information and the position of the transmitter are not exposed. Once the information transmission process is monitored, it may take measures such as full-band high-power interference, or even physical attack to destroy the information transmission process. At this time, ensuring that the information transmission behavior is undetectable has important significance for protecting user privacy and information transmission safety.
In this context, covert communications, also known as low probability detection communications, are of increasing interest to scholars. Covert communication is intended to provide a wireless communication signal or communication activity with a low probability of detection, avoiding detection by an adversary. The application scenes of concealed wireless communication are many, especially in military communication, the low detection probability signal can prevent an electronic reconnaissance device of an enemy from acquiring information, so that military operation is more concealed. Covert wireless communication dates back to wireless spread spectrum communication which started in the beginning of the last century, and when information is transmitted by using a spread spectrum technology, the actually used bandwidth is far larger than the bandwidth required by the information, so that the transmission power spectral density is lower than background noise, and the capability of covert transmission is achieved. However, the underlying theoretical mechanism of spread spectrum technology has not been rigorously proven. Until the documents "Limits of Reliable Communication with Low Probability of Detection on AWGN Channels," in IEEE Journal on Selected Areas in Communication, vol.31, No.9, pp.1921-1930, Sep.2013, the basic performance bound of covert Communication in Additive White Gaussian Noise (AWGN) Channels was studied in detail for the first time, and the information theory basis of covert wireless Communication was laid. The literature "coverage Communication in the Presence of an unified Jammer," in IEEE Transactions on Wireless Communications, vol.16, No.9, pp.6193-6206, sep.2017, studies that Covert Wireless Communication can be achieved by means of an unknown Jammer-assisted transmitter. Research shows that information can be reliably transmitted to a target node on the basis of meeting the hidden condition by interfering the communication of the auxiliary source node. However, the source nodes considered in the above documents all transmit information via a single channel system; the multi-channel system has an advantage of high spectrum efficiency, and thus is widely used in wireless communication. The multi-channel system comprises a plurality of sub-channels (also called sub-carriers), so that a transmitter can select one of the sub-channels to transmit information, thereby providing another degree of freedom to confuse a monitor and improve the communication concealment; in a multi-channel system, the influence of channel fading on communication can be improved through a sub-channel selection strategy, and the wireless communication performance is enhanced. Therefore, in a multi-channel system, how to conceal and reliably transmit information and how to mine the multi-channel system to effectively improve the concealing throughput of the system are of great significance, and related researches have not been found.
Disclosure of Invention
The invention aims to provide an interference-assisted covert wireless communication method in a multi-channel system, which can fully utilize the uncertainty of a selected sub-channel in the multi-channel system to improve the covert communication performance between a source node and a destination node. An interference-assisted covert wireless communication method in a multichannel system, comprising the steps of:
step S1: the source node carries out channel estimation and selects a sub-channel with the maximum channel state information from K sub-channels;
step S2: generating a secret key between a source node and a destination node through a wireless channel before transmitting the private information, and sharing a codebook coded by the private information after encrypting by using the secret key;
step S3: coding information, namely coding the privacy information to be transmitted by using a codebook shared by the source node and the destination node, wherein the coding length is N, which indicates that the source node completely transmits the privacy information through N times of channel use;
step S4: information transmission with optimal transmission power by source node
Figure BDA0003541372220000031
Transmitting the privacy information to be transmitted on the selected sub-channel;
step S5: and (4) information decoding, namely, the destination node decodes by using the codebook shared by the destination node and the source node in each transmission period.
An interference-assisted covert wireless communication method in a multichannel system comprises a pair of legal transceiving pairs (a source node and a destination node) and a friendly interference node, and also exists in a monitor for constantly observing the environment and detecting whether the source node transmits information. All nodes are configured with a single antenna and operate in half-duplex mode. Specifically, the source node selects a subchannel with the largest channel coefficient from a plurality of subchannels to transmit information, and a secret key and a codebook are shared between the source node and the destination node; in order to confuse the monitor, the interfering node transmits interference with uniformly varying power, and each sub-channel is allocated the same interference signal
Figure BDA0003541372220000032
Obeying uniform distribution; the monitor continuously observes the wireless transmission environment to determine whether the source node has sent private information to the destination node.
When the interference-assisted covert wireless communication method in the multi-channel system is operated specifically, the source node increases the uncertainty of channel selection at the source node in a mode of reasonably selecting the sub-channel from the plurality of sub-channels, further confuses a monitor, and achieves the purpose of improving the concealment of wireless transmission behaviors. In the strategy of selecting the sub-channel by the source node, the channel estimation is carried out firstly, and then the sub-channel with the maximum channel coefficient is selected, so that the influence of fading on signals is reduced, and the purpose of enhancing the transmission reliability of the privacy information is achieved. Compared with the covert wireless communication method of single-channel covert transmission, the method can obtain higher average effective covert rate.
Drawings
FIG. 1 is a system model schematic of the present invention.
Fig. 2 is a comparison graph of the simulation of the average effective concealment rate achieved by the system corresponding to different numbers of sub-channels when the method of the present invention is employed.
Detailed Description
An interference-assisted covert wireless communication system in a multi-channel system, as shown in fig. 1, consists of a pair of legitimate transceivers (source node and destination node) and a friendly interfering node, and there is also a monitor that constantly observes the environment and detects whether the source node transmits information. All nodes are configured with a single antenna and operate in half-duplex mode. The source node selects a subchannel with the largest channel coefficient from a plurality of subchannels to send information, and shares the selected subchannel information and the sending time slot information with the destination node through a key; in order to confuse the monitor, the interfering node transmits interference with uniformly varying power, and each sub-channel is allocated the same interference signal
Figure BDA0003541372220000041
Obeying uniform distribution; the monitor continuously observes the wireless transmission environment to determine whether the source node has sent private information to the destination node.
An interference-assisted covert wireless communication method in a multi-channel system, comprising the steps of:
Step S1: the source node carries out signal estimation and selects a sub-channel with the maximum channel state information from K sub-channels;
step S2: generating a key between a source node and a destination node by using a wireless channel before transmitting the private information, and sharing a codebook coded by the private information after encrypting by using the key;
step S3: coding information, namely coding the privacy information to be transmitted by using a codebook shared by the source node and the destination node, wherein the coding length is N, which indicates that the source node can completely send the privacy information out after N times of channel use;
step S4: information transmission by source node with power
Figure BDA0003541372220000042
On the selected sub-channelSending the privacy information to be transmitted;
to maximize the average effective rate η between a source node and a destination node, and by definition, the average effective rate, subject to communication privacy constraints
Figure BDA0003541372220000043
(note: under the concealment constraint condition, the solution becomes the average effective concealment rate, here, no concealment constraint is designed, only the average effective rate), we need to optimize the parameter transmission power PaAnd the number K of sub-channels for sending information by the source node, so that the following optimization problem is established:
With the goal of maximizing the average concealment throughput of the system, the optimal number of subchannels for the system can be calculated according to the following equation:
Figure BDA0003541372220000044
where e is any small real number, representing a covert communication exposure tolerance value,
Figure BDA0003541372220000045
representing the minimum probability of a false positive for the monitor,
Figure BDA0003541372220000046
the minimum misjudgment probability of the monitor is described to be greater than the probability value requiring concealment between the source node and the destination node (for example, the exposure tolerance value e is 0.05, which indicates that the communication behavior of the source node needs 0.95 probability not to be exposed), namely, the monitor is the concealment constraint (the requirement of concealed and secret transmission of the communication behavior of the source node); p isaGreater than 0 constrains the transmit power to be positive; k ismaxThe maximum number of sub-channels, K1, 2, …, KmaxConstraining the number of sub-channels K to be less than KmaxIs a positive integer of (1).
To solve the above optimization problem, we need to solve the minimum misjudgment probability of the monitor
Figure BDA0003541372220000047
When a monitor finishes a transmission cycle (a time slot), the monitor needs to judge whether a source node sends information, and the monitor faces a binary decision. Because the observed value received by the monitor is limited (limited channel use), a judgment error exists in the judgment of the communication behavior of the source node
Figure BDA0003541372220000051
And is
Figure BDA0003541372220000052
By false alarm probability
Figure BDA0003541372220000053
And probability of missed detection
Figure BDA0003541372220000054
And (4) forming. Without loss of the general assumption that,
Figure BDA0003541372220000055
by calculation it can be found that:
Figure BDA0003541372220000056
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003541372220000057
representing the average minimum false detection probability of the monitor; lambda [ alpha ]jwRepresenting the average channel gain, λ, from the interfering node to the observerawRepresenting the average channel gain from the source node to the monitor;
Figure BDA0003541372220000058
representing the variance of the noise received by the monitor,
Figure BDA0003541372220000059
representing the interference power on each subchannel. By setting an optimum threshold τ*To obtain the minimum false detection probability
Figure BDA00035413722200000510
Probability of false detection
Figure BDA00035413722200000511
Is a convex function of tau, and can obtain the optimum threshold tau by simple one-dimensional search*
Through simple analysis of the optimization problem, we found that
Figure BDA00035413722200000512
With PaDecreases with a monotonic increase in K; mean effective concealment rate η with PaIncreases with monotonic increase in K and decreases with monotonic increase in K. Therefore, we can find the solution K of the optimization problem through two-dimensional search*And
Figure BDA00035413722200000513
here we can know that the source node uses K*Sub-channels and
Figure BDA00035413722200000514
when the information is transmitted by the transmission power of (1), the transmission rate of the source node and the destination node can be maximized under the condition of exposure tolerance (concealment).
Step S5: and (3) information decoding, namely decoding the received signal by using the codebook shared by the information decoding destination node and the source node in each transmission period.
In each transmission period T, the received signal of the destination node may be represented as:
Figure BDA00035413722200000515
where i ═ 1,2, …, N denotes a channel usage index;
Figure BDA00035413722200000516
is to satisfy the mean value of zero and the variance of lambdaabThe complex Gaussian random variable represents the instantaneous subchannel gain to the destination node selected by the source node; x is a radical of a fluorine atoma[i]The symbol is a complex Gaussian random variable satisfying that the mean value is zero and the variance is 1, and represents a symbol sent by the source node when the ith channel is used; x is the number ofj[i]The interference node is a complex Gaussian random variable which satisfies the conditions that the mean value is zero and the variance is 1 and represents a symbol sent when the ith channel of the interference node is used; n isb[i]Is that the mean value is zero and the variance is
Figure BDA00035413722200000517
Represents the noise observed by the destination node when the source node uses the ith channel.
The receiving signal-to-noise ratio after the destination node receives the privacy information is as follows:
Figure BDA0003541372220000061
wherein
Figure BDA0003541372220000062
Is to satisfy the mean value of zero and the variance of lambdajbThe complex Gaussian random variable represents the instantaneous subchannel gain to the target node selected by the interference node; pmmIs satisfied in the interval
Figure BDA0003541372220000063
And the random variable distributed uniformly represents the power of the instantaneous interference signal transmitted by the interference node on each subchannel.
By definition of the outage probability, the outage probability can be expressed in a mathematical expression as:
Figure BDA0003541372220000064
Wherein R is a fixed constant representing an expected communication rate; r is the sum of the intermediate variables, the sum sign in the formulaA range; lambda [ alpha ]abRepresenting the average channel gain from the source node to the destination node; r represents an expected communication rate; lambda [ alpha ]jbRepresenting the average channel gain from the interfering node to the destination node;
Figure BDA0003541372220000065
representing the variance of the noise received by the destination node.
The average throughput of the system can be expressed as:
Figure BDA0003541372220000066
wherein, deltamRepresenting the probability of a system outage.
The simulation of the variation of the average concealment throughput with the number of subchannels in the transmission method of the present invention is shown in fig. 2. Wherein, the source node transmission power is the maximum transmission power satisfying the concealment constraint, and the average channel gain is lambdaaw=λab1dB, noise power
Figure BDA0003541372220000067
Maximum power transmitted by interference node
Figure BDA0003541372220000068
As can be seen from the figure, the multi-channel transmission scheme improves the average effective concealment rate of the system compared to single-channel transmission; and there is an optimal number of subchannels to maximize the average effective concealment rate.
The above embodiments are described in some detail and detail, but only represent one possible embodiment of the present invention, and are not intended to limit the scope of the invention. It should be noted that, in the framework of the present invention, scientific research personnel and engineering personnel can add several modifications or improvements on the embodiment, but these are all within the protection scope of the present patent, and the protection scope of the present patent is subject to the claims.

Claims (4)

1. An interference-assisted covert wireless communication method in a multi-channel system, comprising the steps of:
step S1: the source node carries out channel estimation and selects a sub-channel with the maximum channel state information from K sub-channels;
step S2: generating a secret key between a source node and a destination node through a wireless channel before transmitting the private information, and sharing a codebook coded by the private information after encrypting by using the secret key;
step S3: coding information, namely coding the privacy information to be transmitted by using a codebook shared by the source node and the destination node, wherein the coding length is N, which indicates that the source node completely transmits the privacy information through N times of channel use;
step S4: information transmission with optimal transmission power by source node
Figure FDA00035413722100000110
Transmitting the privacy information to be transmitted on the selected sub-channel;
step S5: and (4) information decoding, namely, the destination node decodes by using the codebook shared by the destination node and the source node in each transmission period.
2. The interference-assisted covert wireless communication method in a multi-channel system according to claim 1, wherein said step S4 of obtaining an optimal transmission power in information transmission comprises the following steps:
Under the condition of meeting the communication concealment constraint, the average effective concealment rate eta between the source node and the destination node is maximized, and the average effective rate
Figure FDA0003541372210000011
Where R represents the expected communication rate, δmThe probability of a system outage is indicated,
optimizing the parameter transmit power PaAnd the number K of sub-channels for sending information by the source node, and establishing the following optimization problem:
Figure FDA0003541372210000012
wherein e is any small real number, representing the covert communication exposure tolerance value,
Figure FDA0003541372210000013
indicating the minimum probability of a false positive for the monitor,
Figure FDA0003541372210000014
describing that the minimum misjudgment probability of the monitor is greater than the probability value required to be concealed between the source node and the destination node, namely concealing constraint; paGreater than 0 constrains the transmit power to be positive; kmaxThe maximum number of sub-channels, K1, 2, …, KmaxConstraining the number of sub-channels K to be less than KmaxIs a positive integer of (1).
3. The interference-assisted covert wireless communication method in a multichannel system according to claim 2, wherein a monitor needs to judge whether a source node sends information at the end of a transmission period, and the monitor is faced with a binary decision; because the observed value received by the monitor is limited, a judgment error exists when the communication behavior of the source node is judged
Figure FDA0003541372210000015
And is
Figure FDA0003541372210000016
Probability of false alarm
Figure FDA0003541372210000017
And probability of missed detection
Figure FDA0003541372210000018
Forming;
without loss of the general assumption that,
Figure FDA0003541372210000019
by calculation, we obtain:
Figure FDA0003541372210000021
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0003541372210000022
representing the average minimum false detection probability of the monitor; lambda [ alpha ]jwRepresenting the average channel gain, λ, from the interfering node to the observerawRepresenting the average channel gain from the source node to the monitor;
Figure FDA0003541372210000023
representing the variance of the noise received by the monitor,
Figure FDA0003541372210000024
representing the interference power on each subchannel.
4. The method of interference-assisted covert wireless communication in a channel system according to claim 3, wherein said information decoding in step S5 has an average effective covert rate represented by:
Figure FDA0003541372210000025
wherein, deltamThe system interruption probability is expressed and calculated according to the following equation:
Figure FDA0003541372210000026
wherein R represents an expected communication rate; r is the intermediate variable in the formula, the summation range of the summation sign; lambda [ alpha ]abRepresenting the average channel gain from the source node to the destination node; r represents the expected general formulaA signal rate; lambda [ alpha ]jbRepresenting the average channel gain from the interfering node to the destination node;
Figure FDA0003541372210000027
representing the variance of the noise received by the destination node.
CN202210240847.1A 2022-03-10 2022-03-10 Interference-assisted covert wireless communication method in multi-channel system Pending CN114520972A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210240847.1A CN114520972A (en) 2022-03-10 2022-03-10 Interference-assisted covert wireless communication method in multi-channel system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210240847.1A CN114520972A (en) 2022-03-10 2022-03-10 Interference-assisted covert wireless communication method in multi-channel system

Publications (1)

Publication Number Publication Date
CN114520972A true CN114520972A (en) 2022-05-20

Family

ID=81599262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210240847.1A Pending CN114520972A (en) 2022-03-10 2022-03-10 Interference-assisted covert wireless communication method in multi-channel system

Country Status (1)

Country Link
CN (1) CN114520972A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506859A (en) * 2023-06-19 2023-07-28 中国人民解放军军事科学院国防科技创新研究院 Lightweight cooperative hidden wireless communication detection method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506859A (en) * 2023-06-19 2023-07-28 中国人民解放军军事科学院国防科技创新研究院 Lightweight cooperative hidden wireless communication detection method and system
CN116506859B (en) * 2023-06-19 2023-09-05 中国人民解放军军事科学院国防科技创新研究院 Lightweight cooperative hidden wireless communication detection method and system

Similar Documents

Publication Publication Date Title
Liu et al. Covert wireless communications in IoT systems: Hiding information in interference
Liu et al. Randomized differential DSSS: Jamming-resistant wireless broadcast communication
Han et al. Jamming-assisted eavesdropping over parallel fading channels
CN112383380B (en) Covert vehicle communication method based on non-orthogonal multiple access technology
Hu et al. Covert communication in wireless relay networks
Cheng et al. Efficient physical‐layer secret key generation and authentication schemes based on wireless channel‐phase
Chen et al. Achieving covert communication in overlay cognitive radio networks
Zhao et al. A physical-layer key generation approach based on received signal strength in smart homes
CN114520972A (en) Interference-assisted covert wireless communication method in multi-channel system
Xu et al. Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks
CN115665729A (en) Hidden transmission method under multi-eavesdropper joint detection environment
Rojas et al. Physical layer security for iot communications-a survey
Li et al. Covert and secure communications in NOMA networks with internal eavesdropping
CN110337094B (en) Secure transmission system for D2D content sharing and method thereof
Li et al. Intelligent spectrum control in heterogeneous networks with high security capability
Yu et al. Theoretical analysis of secrecy transmission capacity in wireless ad hoc networks
CN114520973A (en) Method for randomly selecting single sub-channel short packet covert wireless communication
Wang et al. Improper Gaussian signaling based covert wireless communication in IoT networks
CN115835196A (en) Interference truncation-assisted finite packet length concealed wireless communication method
Tao et al. Multi-antenna Jammer assisted covert communications in data collected IoT with NOMA
Zhao et al. Wireless Communication Network Security System Based on Big Data Information Transmission Technology
Xiang et al. Physical layer security of non-orthogonal multiple access in cognitive radio networks
Khatun et al. Secrecy capacity via cooperative transmitting under Rayleigh and Nakagami-m fading channel
Zou et al. Dynamic spectrum access‐based cryptosystem for cognitive radio networks
Cho et al. Covert communication over Gaussian multiple-access channels with feedback

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination