• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2018 Fiscal Year Annual Research Report

Secrecy capacity study of covert wireless communication

Research Project

Project/Area Number 18H03235
Research InstitutionFuture University-Hakodate

Principal Investigator

JIANG Xiaohong  公立はこだて未来大学, システム情報科学部, 教授 (00345654)

Co-Investigator(Kenkyū-buntansha) 稲村 浩  公立はこだて未来大学, システム情報科学部, 教授 (20780232)
福士 将  山口大学, 大学院創成科学研究科, 准教授 (50345659)
Project Period (FY) 2018-04-01 – 2021-03-31
Keywordscovert communication / secrecy capacity / physical layer security
Outline of Annual Research Achievements

1.We studied covert communication in a two-way two-hop wireless system, proposed covertness strategies to resist the warden's detection and further derived the scaling law results for the covert throughput capacity.
2. We considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate.
3. We considered covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates subject to a given transmission outage constraint.
4. We studied covert communication in a relay system operating in either full-duplex or half-duplex mode, and derived the corresponding end-to-end covert capacity with the amplify-and-forward relaying.
5. We also explored the related physical layer authentication (PLA) problem for covert communications, and proposed a PLA scheme based on channel impulse response and multipath delay in dual-hop wireless network.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

We studied covert communication in two-hop relay system, proposed several covertness strategies and further derived the scaling law results for the covert throughput capacity. We also explored effects of full-duplex or half-duplex mode on covert communication in such relay system, and derived the corresponding covert capacity results. We further studied covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates. Finally, we considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate. The related physical layer authentication (PLA) problem for covert communications was also explored, and a PLA scheme was proposed for authentication in two-hop wireless systems. Two journal papers have been submitted, and five journal papers are now under preparation.

Strategy for Future Research Activity

1. SC/Delay/Detection-Probability (DP) Tradeoff: We will explore the SC/delay tradeoff of CWC and derive the corresponding delay-constrained CWC SC. Regarding the SC/DP tradeoff, the recent results indicate that by allowing some DP of the warden we can greatly increase the SC of CWC. Based on this study and available work on CWC SC analysis, we will further explore the SC/DP tradeoff and corresponding DP-constrained SC. Finally, for a flexible SC/delay/DP tradeoff, we will develop a new CWC scheme by combining relay selection used for delay control and transmit power allocation used for DP control.
2.SC Enhancement/Optimization: The cooperative jamming, routing, relay/link selection and artificial noise serve as the crucial security techniques for the enhancement of CWC SC. We explored the joint use of cooperative jamming and opportunistic relay selection for enhancing the secrecy performance of wireless networks. Based on these works and our works on cooperative jamming, secure routing,link/relay selection and artificial noise, we will explore the joint designs of these security techniques for the enhancement of CWC SC. Notice that power control is a crucial issue that can significantly affect the CWC SC. We will further explore the CWC SC optimization with the consideration of power constraint, for which a Nonlinear Integer Program-based optimization framework and an iterative searching algorithm will be developed.

  • Research Products

    (9 results)

All 2018

All Journal Article (8 results) (of which Int'l Joint Research: 8 results,  Peer Reviewed: 8 results) Presentation (1 results) (of which Int'l Joint Research: 1 results)

  • [Journal Article] On Security-Delay Trade-off in Two-Hop Wireless Networks with Buffer-Aided Relay Selection2018

    • Author(s)
      Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang and Hiroshi Inamura
    • Journal Title

      IEEE Transactions on Wireless Communications

      Volume: 17 Pages: 1893-1906

    • DOI

      10.1109/TWC.2017.2786258

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game Theoretical Framework2018

    • Author(s)
      Ahmed Salem, Xuening Liao, Yulong Shen and Xiaohong Jiang
    • Journal Title

      Wireless Communications and Mobile Computing

      Volume: 2018 Pages: 1,14

    • DOI

      10.1155/2018/1029175s

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] SEGM: A secure group management framework in integrated VANET-cellular networks2018

    • Author(s)
      Chengzhe Lai, Dong Zheng, Qinglan Zhao, XiaohongJiang
    • Journal Title

      Vehicular Communications

      Volume: 11 Pages: 33-45

    • DOI

      10.1016/j.vehcom.2018.01.004

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks2018

    • Author(s)
      Yuanyu Zhang, Yulong Shen, Hua Wang and Xiaohong Jiang
    • Journal Title

      Wireless Networks

      Volume: 2018 Pages: 1-19

    • DOI

      10.1007/s11276-018-1732-1

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Asymptotic Analysis of Inhomogeneous Information-Centric Wireless Networks with Infrastructure Support2018

    • Author(s)
      Kechen Zheng, Ying Cui, Xiaoying Liu, Xinbing Wang and Xiaohong Jiang
    • Journal Title

      IEEE Transactions on Vehicular Technology

      Volume: 67 Pages: 5245-5259

    • DOI

      10.1109/TVT.2018.2810312

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Exact Secrecy Throughput Capacity Study in Mobile Ad Hoc Networks2018

    • Author(s)
      Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen and Xiaohong Jiang
    • Journal Title

      Ad Hoc Networks Journal

      Volume: 72 Pages: 105-114

    • DOI

      10.1016/j.adhoc.2018.01.012

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Generalized Cooperative Multicast in Mobile Ad Hoc Networks2018

    • Author(s)
      Bin Yang, Yulong Shen, Xiaohong Jiang and Tarik Taleb
    • Journal Title

      IEEE Transactions on Vehicular Technology

      Volume: 67 Pages: 2631-2643

    • DOI

      10.1109/TVT.2017.2771286

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Packet Delivery Delay Study for Three-Dimensional Mobile Ad Hoc Networks2018

    • Author(s)
      Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen
    • Journal Title

      Ad Hoc networks

      Volume: 69 Pages: 38-48

    • DOI

      10.1016/j.adhoc.2017.10.004

    • Peer Reviewed / Int'l Joint Research
  • [Presentation] Channel-Based Authentication for Dual-Hop Wireless Networks2018

    • Author(s)
      Pinchang Zhang and Xiaohong Jiang
    • Organizer
      NaNA 2018
    • Int'l Joint Research

URL: 

Published: 2019-12-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi