Skip to main content

Relay Selection for Covert Communication

Relay Selection for Covert Communication with an Active Warden



We consider covert communication with multiple relays and an active warden who not only sends jamming signals but also aims to detect the covert transmission. In the relay system with the active warden, the most critical factor is the channel between the relay and the warden, as the warden leverages this channel to transmit jamming signals while trying to detect the presence of covert communication. To mitigate the impact of the active warden, we propose a relay selection scheme that selects the relay with the minimum channel gain to the warden. 

We analyze the performance of the proposed scheme and demonstrate how increasing the number of relays leads to performance improvements based on analytical results. Numerical results show that the analytical predictions closely match the simulations, and our proposed scheme effectively increases the covert rate while minimizing the threat posed by the active warden.

In two-phase DF relay-assisted covert communication, we proposed the relay selection where Willie sends jamming signals to interfere with the covert transmission. In order to minimize the performance degradation caused by Willie, the relay that has the minimum channel gain to Willie is selected to forward the covert message. In the analytical results, we demonstrated that the proposed scheme effectively increases the detection error probability at Willie in the second phase, allowing the relay to use more power to forward the covert message while still satisfying the covertness constraint. 

We also showed that the received SINR of the relay increases asymptotically with the number of relays. By optimizing the transmit power at Alice and the relay, the proposed scheme can increase the covert rate, especially in scenarios with a strong channel to Willie. The numerical results confirmed that the analytical results align closely and showed that the proposed scheme can achieve the higher covert rate compared to reference schemes.

This work has considered a simplified fixed-power jammer model to facilitate initial analysis and design. However, in practical scenarios, jammers may adapt their power dynamically to disrupt communications more effectively. In future work, investigating relay selection schemes under more sophisticated and adaptive jamming strategies will be important to enhance system robustness and applicability in realistic environments. Furthermore, the current model treats the covert message as a scalar value transmitted within a single communication interval with fixed channel uses. 

In reality, covert messages consist of multiple symbols transmitted over varying durations, and the message length critically impacts detection performance. Incorporating explicit temporal dynamics and variable message lengths into the covert communication model will significantly increase analysis complexity and is therefore an important direction for future research. Additionally, this work assumes that the adversary Willie is an untrusted node within the network who participates in the pilot exchange process. This enables channel estimation and simplifies analysis; however, it may not capture more adversarial scenarios where Willie remains silent or avoids pilot transmission. Future research should address cases with incomplete or unavailable CSI regarding the adversary, potentially employing blind or indirect estimation techniques.

Signal processing, signal strength, wireless signal, digital signal, analog signal, weak signal, strong signal, modulation, demodulation, frequency signal, noise signal, signal analysis, signal integrity, communication signal, electrical signal, biomedical signal, control signal, signal transmission, signal detection, signal measurement.

#SignalProcessing, #SignalStrength, #DigitalSignal, #AnalogSignal, #WeakSignal, #StrongSignal, #ModulationSignal, #DemodulationSignal, #FrequencySignal, #NoiseSignal, #SignalAnalysis, #SignalIntegrity, #CommunicationSignal, #ElectricalSignal, #BiomedicalSignal, #ControlSignal, #SignalTransmission, #SignalDetection, #SignalMeasurement, #WirelessSignal

Comments

Popular posts from this blog

 How Network Polarization Shapes Our Politics! Network polarization amplifies political divisions by clustering like-minded individuals into echo chambers, where opposing views are rarely encountered. This reinforces biases, reduces dialogue, and deepens ideological rifts. Social media algorithms further intensify this divide, shaping public opinion and influencing political behavior in increasingly polarized and fragmented societies. Network polarization refers to the phenomenon where social networks—both offline and online—become ideologically homogenous, clustering individuals with similar political beliefs together. This segregation leads to the formation of echo chambers , where people are primarily exposed to information that reinforces their existing views and are shielded from opposing perspectives. In political contexts, such polarization has profound consequences: Reinforcement of Biases : When individuals only interact with like-minded peers, their existing beliefs bec...

Quantum Network Nodes

An operating system for executing applications on quantum network nodes The goal of future quantum networks is to enable new internet applications that are impossible to achieve using only classical communication . Up to now, demonstrations of quantum network applications  and functionalities   on quantum processors have been performed in ad hoc software that was specific to the experimental setup, programmed to perform one single task (the application experiment) directly into low-level control devices using expertise in experimental physics.  Here we report on the design and implementation of an architecture capable of executing quantum network applications on quantum processors in platform-independent high-level software. We demonstrate the capability of the architecture to execute applications in high-level software by implementing it as a quantum network operating system-QNodeOS-and executing test programs, including a delegated computation from a client to a server ...

Global Lighthouse Network

Smart, sustainable manufacturing: 3 lessons from the Global Lighthouse Network Launched in 2018, when more than 70% of factories struggled to scale digital transformation beyond isolated pilots, the Global Lighthouse Network set out to identify the world’s most advanced production sites and create a shared learning journey to up-level the global manufacturing community. In the past seven years, the network has grown from 16 to 201 industrial sites in more than 30 countries and 35 sectors, including the latest cohort of 13 new sites. This growing community of organizations is setting new standards for operational excellence, leveraging advanced technologies to drive growth, productivity, resilience and environmental sustainability. But what exactly is a Global Lighthouse and what has the network achieved? What is the Global Lighthouse Network? The Global Lighthouse Network is a community of operational facilities and value chains that harness digital technologies at scale to ac...