Disguised Full-Duplex Covert Communications

Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages....

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 23; no. 14; p. 6515
Main Author Moon, Jihwan
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 19.07.2023
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information.
AbstractList Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information.
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information.Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information.
Audience Academic
Author Moon, Jihwan
AuthorAffiliation Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea; anschino@staff.hanbat.ac.kr
AuthorAffiliation_xml – name: Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea; anschino@staff.hanbat.ac.kr
Author_xml – sequence: 1
  givenname: Jihwan
  orcidid: 0000-0002-9812-7768
  surname: Moon
  fullname: Moon, Jihwan
BackLink https://www.ncbi.nlm.nih.gov/pubmed/37514808$$D View this record in MEDLINE/PubMed
BookMark eNplkslqHDEQhkWw8X7ICwRDLgmhbbW2Vp-CGceJwZBLfBZqLRMNamkidZvk7VPjsY0XhChR-uovlaoO0U7KySH0vsVnlPb4vBLaMsFb_g4dtIywRhKCd56d99FhrSuMCaVU7qF92vGWSSwP0JfLUJdzqM6eXs0xNpfzOrq_p4t858oEZhznFIyeQk71GO16Has7ebBH6Pbq26_Fj-bm5_frxcVNYzjup8b02EpHPKGS0UEYN3SMD4N2wg6SuA57ion2mFHRDUZogQeJtYcIwzcMPULXW12b9UqtSxh1-aeyDurekctS6TIFE52y2FLDB8mFMYxRC-mYIKzrMPWS4B60vm611vMwOmtcmoqOL0Rf3qTwWy3znWoxlZwyCQqfHhRK_jO7OqkxVONi1MnluSoiGcOwCQH04yt0leeS4K82FG2JYLIF6mxLLTVUEJLPkNjAsm4MBjrrA_gvOt5Du2QrIODD8xqeHv_YRQDOt4ApudbivDJhuu8ZKIcItajNnKinOYGIz68iHkXfsv8BtVC6mw
CitedBy_id crossref_primary_10_3390_s24041300
Cites_doi 10.1109/TWC.2018.2878014
10.1109/ISAPE.2018.8634312
10.1109/LCOMM.2016.2647716
10.1109/TVT.2022.3164051
10.1109/JIOT.2023.3265275
10.1109/TCOMM.2020.3041353
10.1109/TVT.2019.2949304
10.1109/TWC.2022.3157885
10.1109/TWC.2022.3183892
10.1109/TWC.2020.3015816
10.1109/LWC.2020.3031492
10.1109/ICCC47050.2019.9064154
10.1109/NaNA56854.2022.00014
10.1109/GLOBECOM48099.2022.10001374
10.1002/j.1538-7305.1975.tb02040.x
10.1109/MCOM.2015.7355562
10.1109/TCOMM.2021.3089694
10.1109/TVT.2022.3225508
10.3390/electronics12040999
10.1109/WCSP52459.2021.9613571
10.1109/LWC.2019.2894617
10.1109/TCOMM.2021.3127532
10.1109/TCOMM.2021.3062376
10.1109/TWC.2021.3068096
10.1109/TWC.2022.3217041
10.1109/TWC.2019.2918452
10.1109/WCSP.2019.8928142
10.1109/LCOMM.2022.3206962
10.1002/047174882X
10.1109/TCOMM.2022.3144447
10.1109/MWC.001.2000454
10.1109/GLOBECOM46510.2021.9685606
10.1109/JSAC.2021.3088688
10.1109/JIOT.2022.3201021
10.1109/TWC.2017.2720736
10.1109/TVT.2022.3224024
10.1109/ACCESS.2022.3152544
10.1109/MNET.101.2100189
10.1109/ICC40277.2020.9148663
10.1109/COMST.2022.3148857
10.1109/MWC.2017.1800070
10.1109/AERO.2015.7118902
10.1109/TCOMM.2021.3082779
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the author. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the author. 2023
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
5PM
DOA
DOI 10.3390/s23146515
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
ProQuest Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
MEDLINE - Academic
PubMed Central (Full Participant titles)
Directory of Open Access Journals(OpenAccess)
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Central
ProQuest Health & Medical Complete
Health Research Premium Collection
ProQuest Medical Library
ProQuest One Academic UKI Edition
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Medical Library (Alumni)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
CrossRef

PubMed
Publicly Available Content Database
MEDLINE - Academic

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_d0d3c5b856cc443db6c46247703f8209
PMC10385348
A759233816
37514808
10_3390_s23146515
Genre Journal Article
GrantInformation_xml – fundername: National Research Foundation of Korea
  grantid: 2021R1I1A3050126
– fundername: Korea Research Institute for defense Technology planning and advancement
  grantid: 21-106-A00-007
– fundername: National Research Foundation of Korea (NRF)
  grantid: 2021R1I1A3050126
– fundername: Korea Research Institute for Defense Technology Planning and Advancement (KRIT)
  grantid: 21-106-A00-007
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
NPM
PJZUB
PPXIY
PMFND
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c509t-c90d8e2f23843b6ceb745bbae6db82e70f302af04367bc6a60b80afe2fc5e6db3
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:32:06 EDT 2025
Thu Aug 21 18:36:48 EDT 2025
Fri Jul 11 10:25:13 EDT 2025
Fri Jul 25 07:11:37 EDT 2025
Tue Jun 10 21:21:24 EDT 2025
Mon Jul 21 06:00:32 EDT 2025
Tue Jul 01 01:20:15 EDT 2025
Thu Apr 24 23:08:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 14
Keywords covert rate
physical layer security
covert communications
low probability of detection
detection error probability
full duplex
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-c90d8e2f23843b6ceb745bbae6db82e70f302af04367bc6a60b80afe2fc5e6db3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-9812-7768
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s23146515
PMID 37514808
PQID 2843126481
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_d0d3c5b856cc443db6c46247703f8209
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10385348
proquest_miscellaneous_2844084422
proquest_journals_2843126481
gale_infotracacademiconefile_A759233816
pubmed_primary_37514808
crossref_citationtrail_10_3390_s23146515
crossref_primary_10_3390_s23146515
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20230719
PublicationDateYYYYMMDD 2023-07-19
PublicationDate_xml – month: 7
  year: 2023
  text: 20230719
  day: 19
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Shahzad (ref_8) 2018; 17
Bash (ref_7) 2015; 53
Sun (ref_20) 2021; 69
Zhou (ref_27) 2021; 39
Pejoski (ref_24) 2022; 26
Zheng (ref_10) 2021; 69
ref_12
ref_11
ref_32
ref_31
Moon (ref_43) 2019; 18
Sun (ref_33) 2023; 10
ref_18
Li (ref_30) 2023; 72
Si (ref_41) 2021; 69
ref_16
Wang (ref_23) 2021; 69
Liu (ref_42) 2018; 25
Hu (ref_13) 2019; 68
ref_15
Wang (ref_25) 2023; 72
Wang (ref_34) 2022; 21
ref_37
Wang (ref_26) 2023; 22
Wyner (ref_4) 1975; 54
Zhang (ref_2) 2022; 36
Zhang (ref_29) 2022; 71
Chen (ref_17) 2021; 20
Li (ref_21) 2020; 19
Feng (ref_35) 2022; 21
ref_45
ref_22
ref_44
Shu (ref_14) 2019; 8
Kim (ref_38) 2022; 70
ref_3
Angueira (ref_5) 2022; 24
ref_28
Sobers (ref_40) 2017; 16
Jiang (ref_6) 2021; 28
ref_9
Wang (ref_19) 2021; 10
Liu (ref_36) 2022; 70
He (ref_39) 2017; 21
Qazi (ref_1) 2022; 10
References_xml – volume: 17
  start-page: 8517
  year: 2018
  ident: ref_8
  article-title: Achieving Covert Wireless Communications Using a Full-Duplex Receiver
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2018.2878014
– ident: ref_9
  doi: 10.1109/ISAPE.2018.8634312
– volume: 21
  start-page: 941
  year: 2017
  ident: ref_39
  article-title: On Covert Communication With Noise Uncertainty
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2016.2647716
– volume: 71
  start-page: 7936
  year: 2022
  ident: ref_29
  article-title: UAV Relay Assisted Cooperative Jamming for Covert Communications Over Rician Fading
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2022.3164051
– ident: ref_32
  doi: 10.1109/JIOT.2023.3265275
– volume: 69
  start-page: 1882
  year: 2021
  ident: ref_10
  article-title: Covert Communications with a Full-Duplex Receiver in Non-Coherent Rayleigh Fading
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2020.3041353
– volume: 68
  start-page: 12135
  year: 2019
  ident: ref_13
  article-title: Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2019.2949304
– volume: 21
  start-page: 7358
  year: 2022
  ident: ref_35
  article-title: Mean-Field Artificial Noise Assistance and Uplink Power Control in Covert IoT Systems
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2022.3157885
– ident: ref_3
– volume: 21
  start-page: 10393
  year: 2022
  ident: ref_34
  article-title: Probabilistic Accumulate-Then-Transmit in Wireless-Powered Covert Communications
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2022.3183892
– volume: 19
  start-page: 7779
  year: 2020
  ident: ref_21
  article-title: Harvest-and-Opportunistically-Relay: Analyses on Transmission Outage and Covertness
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2020.3015816
– volume: 10
  start-page: 368
  year: 2021
  ident: ref_19
  article-title: Covert Communications With Constrained Age of Information
  publication-title: IEEE Wirel. Commun. Lett.
  doi: 10.1109/LWC.2020.3031492
– ident: ref_11
  doi: 10.1109/ICCC47050.2019.9064154
– ident: ref_28
  doi: 10.1109/NaNA56854.2022.00014
– ident: ref_31
  doi: 10.1109/GLOBECOM48099.2022.10001374
– volume: 54
  start-page: 1355
  year: 1975
  ident: ref_4
  article-title: The Wire-Tap Channel
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– volume: 53
  start-page: 26
  year: 2015
  ident: ref_7
  article-title: Hiding information in noise: Fundamental limits of covert wireless communication
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2015.7355562
– volume: 69
  start-page: 6198
  year: 2021
  ident: ref_20
  article-title: Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2021.3089694
– volume: 72
  start-page: 5518
  year: 2023
  ident: ref_30
  article-title: Joint Trajectory and Resource Optimization for Covert Communication in UAV-Enabled Relaying Systems
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2022.3225508
– ident: ref_22
  doi: 10.3390/electronics12040999
– ident: ref_18
  doi: 10.1109/WCSP52459.2021.9613571
– volume: 8
  start-page: 813
  year: 2019
  ident: ref_14
  article-title: Delay-Constrained Covert Communications With a Full-Duplex Receiver
  publication-title: IEEE Wirel. Commun. Lett.
  doi: 10.1109/LWC.2019.2894617
– volume: 70
  start-page: 1112
  year: 2022
  ident: ref_38
  article-title: Covert Communications Over Multiple Overt Channels
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2021.3127532
– volume: 69
  start-page: 3984
  year: 2021
  ident: ref_23
  article-title: Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications: Joint Active and Passive Beamforming Optimization
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2021.3062376
– volume: 20
  start-page: 5467
  year: 2021
  ident: ref_17
  article-title: Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden With Uncertain Locations
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2021.3068096
– volume: 22
  start-page: 3246
  year: 2023
  ident: ref_26
  article-title: Intelligent Reflecting Surface-Aided Full-Duplex Covert Communications: Information Freshness Optimization
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2022.3217041
– volume: 18
  start-page: 3726
  year: 2019
  ident: ref_43
  article-title: Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2019.2918452
– ident: ref_12
  doi: 10.1109/WCSP.2019.8928142
– volume: 26
  start-page: 2846
  year: 2022
  ident: ref_24
  article-title: Full-Duplex Covert Communications Assisted by Intelligent Reflective Surfaces
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2022.3206962
– ident: ref_37
  doi: 10.1002/047174882X
– volume: 70
  start-page: 1971
  year: 2022
  ident: ref_36
  article-title: Covert Communication in Ambient Backscatter Systems With Uncontrollable RF Source
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2022.3144447
– volume: 28
  start-page: 190
  year: 2021
  ident: ref_6
  article-title: Covert Communication in UAV-Assisted Air-Ground Networks
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.001.2000454
– ident: ref_16
  doi: 10.1109/GLOBECOM46510.2021.9685606
– volume: 39
  start-page: 3348
  year: 2021
  ident: ref_27
  article-title: UAV-Enabled Covert Wireless Data Collection
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2021.3088688
– volume: 10
  start-page: 17
  year: 2023
  ident: ref_33
  article-title: Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2022.3201021
– volume: 16
  start-page: 6193
  year: 2017
  ident: ref_40
  article-title: Covert Communication in the Presence of an Uninformed Jammer
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2017.2720736
– volume: 72
  start-page: 5401
  year: 2023
  ident: ref_25
  article-title: Active Intelligent Reflecting Surface Assisted Covert Communications
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2022.3224024
– volume: 10
  start-page: 21219
  year: 2022
  ident: ref_1
  article-title: IoT-Equipped and AI-Enabled Next Generation Smart Agriculture: A Critical Review, Current Challenges and Future Trends
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3152544
– ident: ref_45
– volume: 36
  start-page: 105
  year: 2022
  ident: ref_2
  article-title: Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.101.2100189
– ident: ref_15
  doi: 10.1109/ICC40277.2020.9148663
– volume: 24
  start-page: 810
  year: 2022
  ident: ref_5
  article-title: A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2022.3148857
– volume: 25
  start-page: 46
  year: 2018
  ident: ref_42
  article-title: Covert Wireless Communications in IoT Systems: Hiding Information in Interference
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2017.1800070
– ident: ref_44
  doi: 10.1109/AERO.2015.7118902
– volume: 69
  start-page: 5394
  year: 2021
  ident: ref_41
  article-title: Covert Transmission Assisted by Intelligent Reflecting Surface
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2021.3082779
SSID ssj0023338
Score 2.3992882
Snippet Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 6515
SubjectTerms Analysis
Antennas
Codes
Communication
covert communications
covert rate
detection error probability
full duplex
Internet of Things
low probability of detection
physical layer security
Receivers & amplifiers
Security management
Surveillance
Transmitters
Unmanned aerial vehicles
SummonAdditionalLinks – databaseName: Directory of Open Access Journals(OpenAccess)
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS-RAEC7Ekx4Wd9fVuK5kRVgvwUy_0jn6WJEFPSl4a_qpgkRxZsCfb1WSCRNW8OIhl6QC3VXd-arSVV8BHHA0K1WmFEonWwgVZGErx4paKyXihOtUU73z5ZW6uBH_buXtUqsvygnr6IE7xR2FMnAvnZbKeyF4cMoLxUSFKzUherWle4h5i2CqD7U4Rl4djxDHoP5oil5M2_R7hD4tSf__n-IlLBrnSS4Bz_kGfOk9xvy4G-lXWInNN1hf4hH8DsSheTd_mMaQU0hZnM2fH-NrfkrpmbN8VAMy3YSb87_XpxdF3wWh8Ajms8LXZdCRJcRWwXH20VVCOmejCk6zWJWJl8wmopKvnFdWlU6XNuEbXpIM_wGrzVMTtyGvg5VWRy5jLURgUYsYVJVirTm3zKUMDhfaMb6nCKdOFY8GQwVSpBkUmcH-IPrc8WK8J3RCKh4EiMq6vYEGNr2BzUcGzuAPGcjQhsPBeNvXDeCUiLrKHFcSnVQ6_8xgd2FD0-_EqUH45RNK45tk8Ht4jHuIDkZsE5_mrYwo8WIsg63O5MOYeYUupS51Bnq0GEaTGj9pHu5bnm7inpdc6J3PUMNPWKNO9_RbeVLvwursZR5_oT80c3vt0n8DzzAHVw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Health & Medical Collection
  dbid: 7X7
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwEB5BucChKu9AQQEhwSVqNn7mVJVCVSHBiUp7s_wslars0uxK_PzOZL3pRiAOuSQTyZ6x52HPfAPwgaFYqTKlkjrZissgKqtcU7VaSh5nTKeW6p2__5DnF_zbXMzzgVuf0yq3OnFQ1GHh6Yz8CNUom1E61ux4-buirlF0u5pbaNyHBwRdRildan4XcDGMvzZoQgxD-6MefZmh9ffEBg1Q_X8r5B2LNM2W3DE_Zwewn_3G8mQj6MdwL3ZP4NEOmuBTICTNy_VVH0NJgWX1Zb28jn_KU0rSXJWTSpD-GVycff15el7lXgiVR5O-qnxbBx2bhBaWMyd9dIoL52yUwekmqjqxurGJAOWV89LK2unaJvzDC6Jhz2GvW3TxJZRtsMLqyERsOQ9N1DwGqVJsNWO2camAT1vuGJ-BwqlfxbXBgIEYaUZGFvB-JF1u0DH-RfSZWDwSEKD18GJxc2ny_jChDswLp4X0nnMWcIpcNlyhQkropLQFfCQBGdp2OBhvc_UATokArMyJEuiq0i1oAYdbGZq8H3tzt3oKeDd-xp1E1yO2i4v1QMNrfJqmgBcbkY9jZgodS13rAvRkMUwmNf3SXf0a0LoJgV4wrl_9f1yv4SF1sqdj41l7CHurm3V8g_7Oyr0dFvUtx1P_bQ
  priority: 102
  providerName: ProQuest
Title Disguised Full-Duplex Covert Communications
URI https://www.ncbi.nlm.nih.gov/pubmed/37514808
https://www.proquest.com/docview/2843126481
https://www.proquest.com/docview/2844084422
https://pubmed.ncbi.nlm.nih.gov/PMC10385348
https://doaj.org/article/d0d3c5b856cc443db6c46247703f8209
Volume 23
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYEDKs-GllVASHAJZP3OAaG2dKmQWiHESnuL_EqptMqWfUjl3zOTzUYb0QOH5BCPFXvG9szYnm8A3nIUK0WmZMpUNhMqyMxqx7LCKCXikJuqoHjnyyt1MRbfJnKyA5scmy0DF_e6dpRPajyffrj7_eczTvhP5HGiy_5xgTZKk9J7F_ZRIWman5eiO0xgnDcJrSmmK0N9mK8BhvpVe2qpQe__d43eUlL9C5RbGml0AI9aUzI9Wcv-MezE-gk83AIYfAoErnm9ulnEkJKvmX1Z3U7jXXpG9zaXaS84ZPEMxqPzn2cXWZseIfOo5ZeZL_JgIqtQ6QrulI9OC-mcjSo4w6LOK54zWxHGvHZeWZU7k9sKa3hJNPw57NWzOh5CWgQrrYlcxkKIwKIRMShdxcJwbpmrEni_4U7pW-xwSmExLdGHIEaWHSMTeNOR3q4BM-4jOiUWdwSEcd18mM2vy3bKlCEP3EtnpPJeCB6wi0IxoXGNqtBuKRJ4RwIqaWxgY7xtAwqwS4RpVZ5oidYrHYwmcLyRYbkZYSXqZT6k-33DBF53xTi56MTE1nG2amhEjg9jCbxYi7xrM9doa5rcJGB6g6HXqX5JffOrAfAmUHrJhXn5Hz8-ggeU4Z62k4fFMewt56v4Cu2gpRvArp5ofJvR1wHsn55fff8xaPYUBs34_wsRGwkc
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9RADLZKOQAHxLMECgQEgkvU7LwyOSBUWqotfZxaaW9hXimVquzS7Ar4U_xG7CSbbgTi1kMuiRPN-DG2M-PPAG84ipUqUxKlS5MI5WViMsuSXCslwojrMqd656NjNT4VXyZysga_l7UwdKxyuSY2C7WfOvpHvoXLKB_RcazRx9n3hLpG0e7qsoVGqxYH4dcPTNnqD_u7KN-3jO19PtkZJ11XgcShc5wnLk-9DqxEXyW4VS7YTEhrTVDeahaytOQpMyVBs2fWKaNSq1NT4htOEg3H796AmzialCwqm1wleBzzvRa9iPM83aoxdmpajQ98XtMa4G8HsOIBh6czV9zd3j2428Wp8XarWPdhLVQP4M4KeuFDIOTOs8V5HXxMiWyyu5hdhJ_xDh0KnceDypP6EZxeC5cew3o1rcITiHNvpNGBy5AL4VnQIniVlSHXnBtmywjeL7lTuA6YnPpjXBSYoBAji56REbzuSWctGse_iD4Ri3sCAtBubkwvz4rOHgufeu6k1VI5JwT3OEWhmMhwASwxKMojeEcCKsjMcTDOdNUKOCUCzCq2M4mhMe26RrC5lGHR2X9dXGlrBK_6x2i5tB1jqjBdNDQixYuxCDZakfdj5hkGsjrVEeiBMgwmNXxSnX9r0MEJ8V5yoZ_-f1wv4db45OiwONw_PngGtxlqL_2yHuWbsD6_XITnGGvN7YtGwWP4et0W9QcR2j5B
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VIiE4IN64FDAIBBcr9r68PiBUGqKWQsWBSrm5-3KpVDlpkwj4a_w6Zhw7jQXi1kMu8STanfd6Z74BeMVRrNSZkihdmUQoLxOTW5YUWikRMq6rgvqdvxyqvSPxaSzHG_C764WhssrOJzaO2k8cvSMfoBvlGZVjZYOqLYv4Ohy9n54nNEGKblq7cRpLFTkIv37g8W32bn-Isn7N2Ojjt929pJ0wkDgMlPPEFanXgVUYtwS3ygWbC2mtCcpbzUKeVjxlpiKY9tw6ZVRqdWoq_IWTRMPxf6_B9ZzLjGwsH18e9jie_ZZIRpwX6WCGeVQzdrwX_5oxAX8Hg7Vo2K_UXAt9oztwu81Z452lkt2FjVDfg1trSIb3gVA8Txans-BjOtQmw8X0LPyMd6lAdB73ulBmD-DoSrj0EDbrSR0eQ1x4I40OXIZCCM-CFsGrvAqF5twwW0XwtuNO6VqQcpqVcVbiYYUYWa4YGcHLFel0iczxL6IPxOIVAYFpN19MLk7K1jZLn3rupNVSOScE97hFoZjI0RlWmCAVEbwhAZVk8rgYZ9rOBdwSgWeVO7nENJluYCPY7mRYtr5gVl5qbgQvVo_RiulqxtRhsmhoRIofxiJ4tBT5as08x6RWpzoC3VOG3qb6T-rT7w1SOKHfSy701v_X9RxuoC2Vn_cPD57ATYbKS2-vs2IbNucXi_AU0665fdbodwzHV21QfwCoa0J3
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Disguised+Full-Duplex+Covert+Communications&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Moon%2C+Jihwan&rft.date=2023-07-19&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=14&rft_id=info:doi/10.3390%2Fs23146515&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon