Covert Wireless Communication Against Surveillance With Detection and Localization

Yi He,Tong-Xing Zheng,Menghan Lin,Chao Liu,Wenjie Wang
DOI: https://doi.org/10.1109/VTC2023-Fall60731.2023.10333615
2023-10-10
Abstract:In this paper, we address finite block-length covert wireless communication against an adversary that not only detects the signals but also localizes the source. Because of the probability of failed localization, the adversary’s detection strategy differs greatly from the former works. In the free space propagation model, we discuss the surveillance strategy of an adversary equipped with a uniform linear antenna array and the legitimate users’ resources optimization scheme for achieving covert communication. The theoretical analysis and the numerical results illustrate the properties of the adversary’s surveillance and the achievable covert communication performance, showing that the randomness in the source’s transmission time may also improve the covertness.
Engineering,Computer Science
What problem does this paper attempt to address?