2018 Fiscal Year Annual Research Report
Secrecy capacity study of covert wireless communication
Project/Area Number |
18H03235
|
Research Institution | Future University-Hakodate |
Principal Investigator |
JIANG Xiaohong 公立はこだて未来大学, システム情報科学部, 教授 (00345654)
|
Co-Investigator(Kenkyū-buntansha) |
稲村 浩 公立はこだて未来大学, システム情報科学部, 教授 (20780232)
福士 将 山口大学, 大学院創成科学研究科, 准教授 (50345659)
|
Project Period (FY) |
2018-04-01 – 2021-03-31
|
Keywords | covert communication / secrecy capacity / physical layer security |
Outline of Annual Research Achievements |
1.We studied covert communication in a two-way two-hop wireless system, proposed covertness strategies to resist the warden's detection and further derived the scaling law results for the covert throughput capacity. 2. We considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate. 3. We considered covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates subject to a given transmission outage constraint. 4. We studied covert communication in a relay system operating in either full-duplex or half-duplex mode, and derived the corresponding end-to-end covert capacity with the amplify-and-forward relaying. 5. We also explored the related physical layer authentication (PLA) problem for covert communications, and proposed a PLA scheme based on channel impulse response and multipath delay in dual-hop wireless network.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
We studied covert communication in two-hop relay system, proposed several covertness strategies and further derived the scaling law results for the covert throughput capacity. We also explored effects of full-duplex or half-duplex mode on covert communication in such relay system, and derived the corresponding covert capacity results. We further studied covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates. Finally, we considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate. The related physical layer authentication (PLA) problem for covert communications was also explored, and a PLA scheme was proposed for authentication in two-hop wireless systems. Two journal papers have been submitted, and five journal papers are now under preparation.
|
Strategy for Future Research Activity |
1. SC/Delay/Detection-Probability (DP) Tradeoff: We will explore the SC/delay tradeoff of CWC and derive the corresponding delay-constrained CWC SC. Regarding the SC/DP tradeoff, the recent results indicate that by allowing some DP of the warden we can greatly increase the SC of CWC. Based on this study and available work on CWC SC analysis, we will further explore the SC/DP tradeoff and corresponding DP-constrained SC. Finally, for a flexible SC/delay/DP tradeoff, we will develop a new CWC scheme by combining relay selection used for delay control and transmit power allocation used for DP control. 2.SC Enhancement/Optimization: The cooperative jamming, routing, relay/link selection and artificial noise serve as the crucial security techniques for the enhancement of CWC SC. We explored the joint use of cooperative jamming and opportunistic relay selection for enhancing the secrecy performance of wireless networks. Based on these works and our works on cooperative jamming, secure routing,link/relay selection and artificial noise, we will explore the joint designs of these security techniques for the enhancement of CWC SC. Notice that power control is a crucial issue that can significantly affect the CWC SC. We will further explore the CWC SC optimization with the consideration of power constraint, for which a Nonlinear Integer Program-based optimization framework and an iterative searching algorithm will be developed.
|
Research Products
(9 results)