Covert Communication in Downlink NOMA Systems With Random Transmit Power

This letter considers covert communication in downlink NOMA systems, where a public action (communication from Alice to the NOMA-weak user U1) is used to provide a cover for a secret action (communication from Alice to the NOMA-strong user U2). To aid system design, we first derive the detection err...

Full description

Saved in:
Bibliographic Details
Published inIEEE wireless communications letters Vol. 9; no. 11; pp. 2000 - 2004
Main Authors Tao, Liwei, Yang, Weiwei, Yan, Shihao, Wu, Dan, Guan, Xinrong, Chen, Dechuan
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.11.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This letter considers covert communication in downlink NOMA systems, where a public action (communication from Alice to the NOMA-weak user U1) is used to provide a cover for a secret action (communication from Alice to the NOMA-strong user U2). To aid system design, we first derive the detection error probability (DEP) at Willie and the connect outage probabilities (COPs) at U1 and U2. Then, considering the covertness and outage constraints, the optimization of power allocation factor ratio between U1 and U2 is tackled in order to maximize the effective covert rate. The results demonstrate that the minimum DEP is the power allocation factor for U1. In addition, for a given covert constraint, relaxing the outage constraint will effectively increase the maximum effective covert rate within a certain range of the maximum transmit power of U1.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2162-2337
2162-2345
DOI:10.1109/LWC.2020.3011191