中国科学:信息科学(英文版)2024,Vol.67Issue(8) :217-233.DOI:10.1007/s11432-023-4025-2

Legitimate monitor by proactive guarding for counter covert communications

Manlin WANG Bin XIA Jiangzhou WANG
中国科学:信息科学(英文版)2024,Vol.67Issue(8) :217-233.DOI:10.1007/s11432-023-4025-2

Legitimate monitor by proactive guarding for counter covert communications

Manlin WANG 1Bin XIA 1Jiangzhou WANG2
扫码查看

作者信息

  • 1. School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240,China
  • 2. School of Engineering,University of Kent,Canterbury CT2 7NT,UK
  • 折叠

Abstract

Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder.However,covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies,which leads to great challenges to information se-curity.To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes,a novel paradigm,called legitimate monitor,is proposed for counter covert communica-tions.In the preceding covert communication system,the covert transmission rate is the focus.Differently,the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes,which should be maximized to interrupt the potential but undetectable transmission.To achieve these goals effectively,a proactive guarding approach is proposed,where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission,simultaneously.In particular,the jamming power at the warder is optimized under cases where the instan-taneous/statistical channel state information is available.Besides,the corresponding outage probability is derived to evaluate the system performance,which can also be simplified to scenarios with a passive warder.Numerical results demonstrate that proactive guarding outperforms the passive one,especially when the warder is not proximal to the unauthorized transmitter.In addition,the proposed jamming power allocation scheme also outperforms other benchmark schemes.

Key words

legitimate monitor/counter covert communication/full-duplex technology/outage probability/power allocation optimization

引用本文复制引用

基金项目

National Natural Science Foundation of China(62271309)

Shanghai Municipal Science and Technology Major Project(2021SHZDZX0102)

出版年

2024
中国科学:信息科学(英文版)
中国科学院

中国科学:信息科学(英文版)

CSTPCDEI
影响因子:0.715
ISSN:1674-733X
参考文献量1
段落导航相关论文