Disguised Full-Duplex Covert Communications
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages....
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 23; no. 14; p. 6515 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
19.07.2023
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. |
---|---|
AbstractList | Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information.Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. |
Audience | Academic |
Author | Moon, Jihwan |
AuthorAffiliation | Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea; anschino@staff.hanbat.ac.kr |
AuthorAffiliation_xml | – name: Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea; anschino@staff.hanbat.ac.kr |
Author_xml | – sequence: 1 givenname: Jihwan orcidid: 0000-0002-9812-7768 surname: Moon fullname: Moon, Jihwan |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/37514808$$D View this record in MEDLINE/PubMed |
BookMark | eNplkslqHDEQhkWw8X7ICwRDLgmhbbW2Vp-CGceJwZBLfBZqLRMNamkidZvk7VPjsY0XhChR-uovlaoO0U7KySH0vsVnlPb4vBLaMsFb_g4dtIywRhKCd56d99FhrSuMCaVU7qF92vGWSSwP0JfLUJdzqM6eXs0xNpfzOrq_p4t858oEZhznFIyeQk71GO16Has7ebBH6Pbq26_Fj-bm5_frxcVNYzjup8b02EpHPKGS0UEYN3SMD4N2wg6SuA57ion2mFHRDUZogQeJtYcIwzcMPULXW12b9UqtSxh1-aeyDurekctS6TIFE52y2FLDB8mFMYxRC-mYIKzrMPWS4B60vm611vMwOmtcmoqOL0Rf3qTwWy3znWoxlZwyCQqfHhRK_jO7OqkxVONi1MnluSoiGcOwCQH04yt0leeS4K82FG2JYLIF6mxLLTVUEJLPkNjAsm4MBjrrA_gvOt5Du2QrIODD8xqeHv_YRQDOt4ApudbivDJhuu8ZKIcItajNnKinOYGIz68iHkXfsv8BtVC6mw |
CitedBy_id | crossref_primary_10_3390_s24041300 |
Cites_doi | 10.1109/TWC.2018.2878014 10.1109/ISAPE.2018.8634312 10.1109/LCOMM.2016.2647716 10.1109/TVT.2022.3164051 10.1109/JIOT.2023.3265275 10.1109/TCOMM.2020.3041353 10.1109/TVT.2019.2949304 10.1109/TWC.2022.3157885 10.1109/TWC.2022.3183892 10.1109/TWC.2020.3015816 10.1109/LWC.2020.3031492 10.1109/ICCC47050.2019.9064154 10.1109/NaNA56854.2022.00014 10.1109/GLOBECOM48099.2022.10001374 10.1002/j.1538-7305.1975.tb02040.x 10.1109/MCOM.2015.7355562 10.1109/TCOMM.2021.3089694 10.1109/TVT.2022.3225508 10.3390/electronics12040999 10.1109/WCSP52459.2021.9613571 10.1109/LWC.2019.2894617 10.1109/TCOMM.2021.3127532 10.1109/TCOMM.2021.3062376 10.1109/TWC.2021.3068096 10.1109/TWC.2022.3217041 10.1109/TWC.2019.2918452 10.1109/WCSP.2019.8928142 10.1109/LCOMM.2022.3206962 10.1002/047174882X 10.1109/TCOMM.2022.3144447 10.1109/MWC.001.2000454 10.1109/GLOBECOM46510.2021.9685606 10.1109/JSAC.2021.3088688 10.1109/JIOT.2022.3201021 10.1109/TWC.2017.2720736 10.1109/TVT.2022.3224024 10.1109/ACCESS.2022.3152544 10.1109/MNET.101.2100189 10.1109/ICC40277.2020.9148663 10.1109/COMST.2022.3148857 10.1109/MWC.2017.1800070 10.1109/AERO.2015.7118902 10.1109/TCOMM.2021.3082779 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the author. 2023 |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the author. 2023 |
DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 5PM DOA |
DOI | 10.3390/s23146515 |
DatabaseName | CrossRef PubMed ProQuest Central (Corporate) ProQuest Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection PML(ProQuest Medical Library) ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition MEDLINE - Academic PubMed Central (Full Participant titles) Directory of Open Access Journals(OpenAccess) |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Central ProQuest Health & Medical Complete Health Research Premium Collection ProQuest Medical Library ProQuest One Academic UKI Edition Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) ProQuest Medical Library (Alumni) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | CrossRef PubMed Publicly Available Content Database MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_d0d3c5b856cc443db6c46247703f8209 PMC10385348 A759233816 37514808 10_3390_s23146515 |
Genre | Journal Article |
GrantInformation_xml | – fundername: National Research Foundation of Korea grantid: 2021R1I1A3050126 – fundername: Korea Research Institute for defense Technology planning and advancement grantid: 21-106-A00-007 – fundername: National Research Foundation of Korea (NRF) grantid: 2021R1I1A3050126 – fundername: Korea Research Institute for Defense Technology Planning and Advancement (KRIT) grantid: 21-106-A00-007 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M NPM PJZUB PPXIY PMFND 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c509t-c90d8e2f23843b6ceb745bbae6db82e70f302af04367bc6a60b80afe2fc5e6db3 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:32:06 EDT 2025 Thu Aug 21 18:36:48 EDT 2025 Fri Jul 11 10:25:13 EDT 2025 Fri Jul 25 07:11:37 EDT 2025 Tue Jun 10 21:21:24 EDT 2025 Mon Jul 21 06:00:32 EDT 2025 Tue Jul 01 01:20:15 EDT 2025 Thu Apr 24 23:08:04 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 14 |
Keywords | covert rate physical layer security covert communications low probability of detection detection error probability full duplex |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c509t-c90d8e2f23843b6ceb745bbae6db82e70f302af04367bc6a60b80afe2fc5e6db3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-9812-7768 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s23146515 |
PMID | 37514808 |
PQID | 2843126481 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_d0d3c5b856cc443db6c46247703f8209 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10385348 proquest_miscellaneous_2844084422 proquest_journals_2843126481 gale_infotracacademiconefile_A759233816 pubmed_primary_37514808 crossref_citationtrail_10_3390_s23146515 crossref_primary_10_3390_s23146515 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20230719 |
PublicationDateYYYYMMDD | 2023-07-19 |
PublicationDate_xml | – month: 7 year: 2023 text: 20230719 day: 19 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2023 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Shahzad (ref_8) 2018; 17 Bash (ref_7) 2015; 53 Sun (ref_20) 2021; 69 Zhou (ref_27) 2021; 39 Pejoski (ref_24) 2022; 26 Zheng (ref_10) 2021; 69 ref_12 ref_11 ref_32 ref_31 Moon (ref_43) 2019; 18 Sun (ref_33) 2023; 10 ref_18 Li (ref_30) 2023; 72 Si (ref_41) 2021; 69 ref_16 Wang (ref_23) 2021; 69 Liu (ref_42) 2018; 25 Hu (ref_13) 2019; 68 ref_15 Wang (ref_25) 2023; 72 Wang (ref_34) 2022; 21 ref_37 Wang (ref_26) 2023; 22 Wyner (ref_4) 1975; 54 Zhang (ref_2) 2022; 36 Zhang (ref_29) 2022; 71 Chen (ref_17) 2021; 20 Li (ref_21) 2020; 19 Feng (ref_35) 2022; 21 ref_45 ref_22 ref_44 Shu (ref_14) 2019; 8 Kim (ref_38) 2022; 70 ref_3 Angueira (ref_5) 2022; 24 ref_28 Sobers (ref_40) 2017; 16 Jiang (ref_6) 2021; 28 ref_9 Wang (ref_19) 2021; 10 Liu (ref_36) 2022; 70 He (ref_39) 2017; 21 Qazi (ref_1) 2022; 10 |
References_xml | – volume: 17 start-page: 8517 year: 2018 ident: ref_8 article-title: Achieving Covert Wireless Communications Using a Full-Duplex Receiver publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2018.2878014 – ident: ref_9 doi: 10.1109/ISAPE.2018.8634312 – volume: 21 start-page: 941 year: 2017 ident: ref_39 article-title: On Covert Communication With Noise Uncertainty publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2016.2647716 – volume: 71 start-page: 7936 year: 2022 ident: ref_29 article-title: UAV Relay Assisted Cooperative Jamming for Covert Communications Over Rician Fading publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2022.3164051 – ident: ref_32 doi: 10.1109/JIOT.2023.3265275 – volume: 69 start-page: 1882 year: 2021 ident: ref_10 article-title: Covert Communications with a Full-Duplex Receiver in Non-Coherent Rayleigh Fading publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2020.3041353 – volume: 68 start-page: 12135 year: 2019 ident: ref_13 article-title: Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2019.2949304 – volume: 21 start-page: 7358 year: 2022 ident: ref_35 article-title: Mean-Field Artificial Noise Assistance and Uplink Power Control in Covert IoT Systems publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2022.3157885 – ident: ref_3 – volume: 21 start-page: 10393 year: 2022 ident: ref_34 article-title: Probabilistic Accumulate-Then-Transmit in Wireless-Powered Covert Communications publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2022.3183892 – volume: 19 start-page: 7779 year: 2020 ident: ref_21 article-title: Harvest-and-Opportunistically-Relay: Analyses on Transmission Outage and Covertness publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2020.3015816 – volume: 10 start-page: 368 year: 2021 ident: ref_19 article-title: Covert Communications With Constrained Age of Information publication-title: IEEE Wirel. Commun. Lett. doi: 10.1109/LWC.2020.3031492 – ident: ref_11 doi: 10.1109/ICCC47050.2019.9064154 – ident: ref_28 doi: 10.1109/NaNA56854.2022.00014 – ident: ref_31 doi: 10.1109/GLOBECOM48099.2022.10001374 – volume: 54 start-page: 1355 year: 1975 ident: ref_4 article-title: The Wire-Tap Channel publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1975.tb02040.x – volume: 53 start-page: 26 year: 2015 ident: ref_7 article-title: Hiding information in noise: Fundamental limits of covert wireless communication publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2015.7355562 – volume: 69 start-page: 6198 year: 2021 ident: ref_20 article-title: Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2021.3089694 – volume: 72 start-page: 5518 year: 2023 ident: ref_30 article-title: Joint Trajectory and Resource Optimization for Covert Communication in UAV-Enabled Relaying Systems publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2022.3225508 – ident: ref_22 doi: 10.3390/electronics12040999 – ident: ref_18 doi: 10.1109/WCSP52459.2021.9613571 – volume: 8 start-page: 813 year: 2019 ident: ref_14 article-title: Delay-Constrained Covert Communications With a Full-Duplex Receiver publication-title: IEEE Wirel. Commun. Lett. doi: 10.1109/LWC.2019.2894617 – volume: 70 start-page: 1112 year: 2022 ident: ref_38 article-title: Covert Communications Over Multiple Overt Channels publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2021.3127532 – volume: 69 start-page: 3984 year: 2021 ident: ref_23 article-title: Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications: Joint Active and Passive Beamforming Optimization publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2021.3062376 – volume: 20 start-page: 5467 year: 2021 ident: ref_17 article-title: Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden With Uncertain Locations publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2021.3068096 – volume: 22 start-page: 3246 year: 2023 ident: ref_26 article-title: Intelligent Reflecting Surface-Aided Full-Duplex Covert Communications: Information Freshness Optimization publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2022.3217041 – volume: 18 start-page: 3726 year: 2019 ident: ref_43 article-title: Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2019.2918452 – ident: ref_12 doi: 10.1109/WCSP.2019.8928142 – volume: 26 start-page: 2846 year: 2022 ident: ref_24 article-title: Full-Duplex Covert Communications Assisted by Intelligent Reflective Surfaces publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2022.3206962 – ident: ref_37 doi: 10.1002/047174882X – volume: 70 start-page: 1971 year: 2022 ident: ref_36 article-title: Covert Communication in Ambient Backscatter Systems With Uncontrollable RF Source publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2022.3144447 – volume: 28 start-page: 190 year: 2021 ident: ref_6 article-title: Covert Communication in UAV-Assisted Air-Ground Networks publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.001.2000454 – ident: ref_16 doi: 10.1109/GLOBECOM46510.2021.9685606 – volume: 39 start-page: 3348 year: 2021 ident: ref_27 article-title: UAV-Enabled Covert Wireless Data Collection publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2021.3088688 – volume: 10 start-page: 17 year: 2023 ident: ref_33 article-title: Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3201021 – volume: 16 start-page: 6193 year: 2017 ident: ref_40 article-title: Covert Communication in the Presence of an Uninformed Jammer publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2017.2720736 – volume: 72 start-page: 5401 year: 2023 ident: ref_25 article-title: Active Intelligent Reflecting Surface Assisted Covert Communications publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2022.3224024 – volume: 10 start-page: 21219 year: 2022 ident: ref_1 article-title: IoT-Equipped and AI-Enabled Next Generation Smart Agriculture: A Critical Review, Current Challenges and Future Trends publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3152544 – ident: ref_45 – volume: 36 start-page: 105 year: 2022 ident: ref_2 article-title: Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond? publication-title: IEEE Netw. doi: 10.1109/MNET.101.2100189 – ident: ref_15 doi: 10.1109/ICC40277.2020.9148663 – volume: 24 start-page: 810 year: 2022 ident: ref_5 article-title: A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2022.3148857 – volume: 25 start-page: 46 year: 2018 ident: ref_42 article-title: Covert Wireless Communications in IoT Systems: Hiding Information in Interference publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2017.1800070 – ident: ref_44 doi: 10.1109/AERO.2015.7118902 – volume: 69 start-page: 5394 year: 2021 ident: ref_41 article-title: Covert Transmission Assisted by Intelligent Reflecting Surface publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2021.3082779 |
SSID | ssj0023338 |
Score | 2.3992882 |
Snippet | Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer... |
SourceID | doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 6515 |
SubjectTerms | Analysis Antennas Codes Communication covert communications covert rate detection error probability full duplex Internet of Things low probability of detection physical layer security Receivers & amplifiers Security management Surveillance Transmitters Unmanned aerial vehicles |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals(OpenAccess) dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS-RAEC7Ekx4Wd9fVuK5kRVgvwUy_0jn6WJEFPSl4a_qpgkRxZsCfb1WSCRNW8OIhl6QC3VXd-arSVV8BHHA0K1WmFEonWwgVZGErx4paKyXihOtUU73z5ZW6uBH_buXtUqsvygnr6IE7xR2FMnAvnZbKeyF4cMoLxUSFKzUherWle4h5i2CqD7U4Rl4djxDHoP5oil5M2_R7hD4tSf__n-IlLBrnSS4Bz_kGfOk9xvy4G-lXWInNN1hf4hH8DsSheTd_mMaQU0hZnM2fH-NrfkrpmbN8VAMy3YSb87_XpxdF3wWh8Ajms8LXZdCRJcRWwXH20VVCOmejCk6zWJWJl8wmopKvnFdWlU6XNuEbXpIM_wGrzVMTtyGvg5VWRy5jLURgUYsYVJVirTm3zKUMDhfaMb6nCKdOFY8GQwVSpBkUmcH-IPrc8WK8J3RCKh4EiMq6vYEGNr2BzUcGzuAPGcjQhsPBeNvXDeCUiLrKHFcSnVQ6_8xgd2FD0-_EqUH45RNK45tk8Ht4jHuIDkZsE5_mrYwo8WIsg63O5MOYeYUupS51Bnq0GEaTGj9pHu5bnm7inpdc6J3PUMNPWKNO9_RbeVLvwursZR5_oT80c3vt0n8DzzAHVw priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Health & Medical Collection dbid: 7X7 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwEB5BucChKu9AQQEhwSVqNn7mVJVCVSHBiUp7s_wslars0uxK_PzOZL3pRiAOuSQTyZ6x52HPfAPwgaFYqTKlkjrZissgKqtcU7VaSh5nTKeW6p2__5DnF_zbXMzzgVuf0yq3OnFQ1GHh6Yz8CNUom1E61ux4-buirlF0u5pbaNyHBwRdRildan4XcDGMvzZoQgxD-6MefZmh9ffEBg1Q_X8r5B2LNM2W3DE_Zwewn_3G8mQj6MdwL3ZP4NEOmuBTICTNy_VVH0NJgWX1Zb28jn_KU0rSXJWTSpD-GVycff15el7lXgiVR5O-qnxbBx2bhBaWMyd9dIoL52yUwekmqjqxurGJAOWV89LK2unaJvzDC6Jhz2GvW3TxJZRtsMLqyERsOQ9N1DwGqVJsNWO2camAT1vuGJ-BwqlfxbXBgIEYaUZGFvB-JF1u0DH-RfSZWDwSEKD18GJxc2ny_jChDswLp4X0nnMWcIpcNlyhQkropLQFfCQBGdp2OBhvc_UATokArMyJEuiq0i1oAYdbGZq8H3tzt3oKeDd-xp1E1yO2i4v1QMNrfJqmgBcbkY9jZgodS13rAvRkMUwmNf3SXf0a0LoJgV4wrl_9f1yv4SF1sqdj41l7CHurm3V8g_7Oyr0dFvUtx1P_bQ priority: 102 providerName: ProQuest |
Title | Disguised Full-Duplex Covert Communications |
URI | https://www.ncbi.nlm.nih.gov/pubmed/37514808 https://www.proquest.com/docview/2843126481 https://www.proquest.com/docview/2844084422 https://pubmed.ncbi.nlm.nih.gov/PMC10385348 https://doaj.org/article/d0d3c5b856cc443db6c46247703f8209 |
Volume | 23 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYEDKs-GllVASHAJZP3OAaG2dKmQWiHESnuL_EqptMqWfUjl3zOTzUYb0QOH5BCPFXvG9szYnm8A3nIUK0WmZMpUNhMqyMxqx7LCKCXikJuqoHjnyyt1MRbfJnKyA5scmy0DF_e6dpRPajyffrj7_eczTvhP5HGiy_5xgTZKk9J7F_ZRIWman5eiO0xgnDcJrSmmK0N9mK8BhvpVe2qpQe__d43eUlL9C5RbGml0AI9aUzI9Wcv-MezE-gk83AIYfAoErnm9ulnEkJKvmX1Z3U7jXXpG9zaXaS84ZPEMxqPzn2cXWZseIfOo5ZeZL_JgIqtQ6QrulI9OC-mcjSo4w6LOK54zWxHGvHZeWZU7k9sKa3hJNPw57NWzOh5CWgQrrYlcxkKIwKIRMShdxcJwbpmrEni_4U7pW-xwSmExLdGHIEaWHSMTeNOR3q4BM-4jOiUWdwSEcd18mM2vy3bKlCEP3EtnpPJeCB6wi0IxoXGNqtBuKRJ4RwIqaWxgY7xtAwqwS4RpVZ5oidYrHYwmcLyRYbkZYSXqZT6k-33DBF53xTi56MTE1nG2amhEjg9jCbxYi7xrM9doa5rcJGB6g6HXqX5JffOrAfAmUHrJhXn5Hz8-ggeU4Z62k4fFMewt56v4Cu2gpRvArp5ofJvR1wHsn55fff8xaPYUBs34_wsRGwkc |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9RADLZKOQAHxLMECgQEgkvU7LwyOSBUWqotfZxaaW9hXimVquzS7Ar4U_xG7CSbbgTi1kMuiRPN-DG2M-PPAG84ipUqUxKlS5MI5WViMsuSXCslwojrMqd656NjNT4VXyZysga_l7UwdKxyuSY2C7WfOvpHvoXLKB_RcazRx9n3hLpG0e7qsoVGqxYH4dcPTNnqD_u7KN-3jO19PtkZJ11XgcShc5wnLk-9DqxEXyW4VS7YTEhrTVDeahaytOQpMyVBs2fWKaNSq1NT4htOEg3H796AmzialCwqm1wleBzzvRa9iPM83aoxdmpajQ98XtMa4G8HsOIBh6czV9zd3j2428Wp8XarWPdhLVQP4M4KeuFDIOTOs8V5HXxMiWyyu5hdhJ_xDh0KnceDypP6EZxeC5cew3o1rcITiHNvpNGBy5AL4VnQIniVlSHXnBtmywjeL7lTuA6YnPpjXBSYoBAji56REbzuSWctGse_iD4Ri3sCAtBubkwvz4rOHgufeu6k1VI5JwT3OEWhmMhwASwxKMojeEcCKsjMcTDOdNUKOCUCzCq2M4mhMe26RrC5lGHR2X9dXGlrBK_6x2i5tB1jqjBdNDQixYuxCDZakfdj5hkGsjrVEeiBMgwmNXxSnX9r0MEJ8V5yoZ_-f1wv4db45OiwONw_PngGtxlqL_2yHuWbsD6_XITnGGvN7YtGwWP4et0W9QcR2j5B |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VIiE4IN64FDAIBBcr9r68PiBUGqKWQsWBSrm5-3KpVDlpkwj4a_w6Zhw7jQXi1kMu8STanfd6Z74BeMVRrNSZkihdmUQoLxOTW5YUWikRMq6rgvqdvxyqvSPxaSzHG_C764WhssrOJzaO2k8cvSMfoBvlGZVjZYOqLYv4Ohy9n54nNEGKblq7cRpLFTkIv37g8W32bn-Isn7N2Ojjt929pJ0wkDgMlPPEFanXgVUYtwS3ygWbC2mtCcpbzUKeVjxlpiKY9tw6ZVRqdWoq_IWTRMPxf6_B9ZzLjGwsH18e9jie_ZZIRpwX6WCGeVQzdrwX_5oxAX8Hg7Vo2K_UXAt9oztwu81Z452lkt2FjVDfg1trSIb3gVA8Txans-BjOtQmw8X0LPyMd6lAdB73ulBmD-DoSrj0EDbrSR0eQ1x4I40OXIZCCM-CFsGrvAqF5twwW0XwtuNO6VqQcpqVcVbiYYUYWa4YGcHLFel0iczxL6IPxOIVAYFpN19MLk7K1jZLn3rupNVSOScE97hFoZjI0RlWmCAVEbwhAZVk8rgYZ9rOBdwSgWeVO7nENJluYCPY7mRYtr5gVl5qbgQvVo_RiulqxtRhsmhoRIofxiJ4tBT5as08x6RWpzoC3VOG3qb6T-rT7w1SOKHfSy701v_X9RxuoC2Vn_cPD57ATYbKS2-vs2IbNucXi_AU0665fdbodwzHV21QfwCoa0J3 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Disguised+Full-Duplex+Covert+Communications&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Moon%2C+Jihwan&rft.date=2023-07-19&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=14&rft_id=info:doi/10.3390%2Fs23146515&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |