Robust Beamforming Design for Covert Communications
In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has eithe...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Ma, Shuai Zhang, Yunqi Li, Hang Lu, Songtao Al-Dhahir, Naofal Zhang, Sha Li, Shiyin |
description | In this paper, we consider a common unicast beamforming network where Alice
utilizes the communication to Carol as a cover and covertly transmits a message
to Bob without being recognized by Willie. We investigate the beamformer design
of Alice to maximize the covert rate to Bob when Alice has either perfect or
imperfect knowledge about Willie's channel state information (WCSI). For the
perfect WCSI case, the problem is formulated under the perfect covert
constraint, and we develop a covert beamformer by applying semidefinite
relaxation and the bisection method. Then, to reduce the computational
complexity, we further propose a zero-forcing beamformer design with a single
iteration processing. For the case of the imperfect WCSI, the robust beamformer
is developed based on a relaxation and restriction approach by utilizing the
property of Kullback-Leibler divergence. Furthermore, we derive the optimal
decision threshold of Willie, and analyze the false alarm and the missed
detection probabilities in this case. Finally, the performance of the proposed
beamformer designs is evaluated through numerical experiments. |
doi_str_mv | 10.48550/arxiv.2103.16786 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2103_16786</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2103_16786</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-c394b88cf10d364b6b50efb86575acfcb076244d1bfd0e648f141ab50071b5c73</originalsourceid><addsrcrecordid>eNotjssKwjAUBbNxIeoHuLI_0JqY5CYutT5BEMR9SdJEAqaVtIr-vfWxGg4chkFoTHDGJOd4quLTP7IZwTQjICT0ET3V-t60ydKq4OoYfHVJVrbxlyrpZpLXDxvbDiHcK29U6-uqGaKeU9fGjv4coPNmfc536eG43eeLQ6pAQGronGkpjSO4pMA0aI6t0xK44Mo4o7GAGWMl0a7EFph0hBHVnbAgmhtBB2jy036ri1v0QcVX8akvvvX0DTtuP0c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Robust Beamforming Design for Covert Communications</title><source>arXiv.org</source><creator>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</creator><creatorcontrib>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</creatorcontrib><description>In this paper, we consider a common unicast beamforming network where Alice
utilizes the communication to Carol as a cover and covertly transmits a message
to Bob without being recognized by Willie. We investigate the beamformer design
of Alice to maximize the covert rate to Bob when Alice has either perfect or
imperfect knowledge about Willie's channel state information (WCSI). For the
perfect WCSI case, the problem is formulated under the perfect covert
constraint, and we develop a covert beamformer by applying semidefinite
relaxation and the bisection method. Then, to reduce the computational
complexity, we further propose a zero-forcing beamformer design with a single
iteration processing. For the case of the imperfect WCSI, the robust beamformer
is developed based on a relaxation and restriction approach by utilizing the
property of Kullback-Leibler divergence. Furthermore, we derive the optimal
decision threshold of Willie, and analyze the false alarm and the missed
detection probabilities in this case. Finally, the performance of the proposed
beamformer designs is evaluated through numerical experiments.</description><identifier>DOI: 10.48550/arxiv.2103.16786</identifier><language>eng</language><subject>Computer Science - Information Theory ; Mathematics - Information Theory</subject><creationdate>2021-03</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2103.16786$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2103.16786$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Zhang, Yunqi</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><creatorcontrib>Lu, Songtao</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Zhang, Sha</creatorcontrib><creatorcontrib>Li, Shiyin</creatorcontrib><title>Robust Beamforming Design for Covert Communications</title><description>In this paper, we consider a common unicast beamforming network where Alice
utilizes the communication to Carol as a cover and covertly transmits a message
to Bob without being recognized by Willie. We investigate the beamformer design
of Alice to maximize the covert rate to Bob when Alice has either perfect or
imperfect knowledge about Willie's channel state information (WCSI). For the
perfect WCSI case, the problem is formulated under the perfect covert
constraint, and we develop a covert beamformer by applying semidefinite
relaxation and the bisection method. Then, to reduce the computational
complexity, we further propose a zero-forcing beamformer design with a single
iteration processing. For the case of the imperfect WCSI, the robust beamformer
is developed based on a relaxation and restriction approach by utilizing the
property of Kullback-Leibler divergence. Furthermore, we derive the optimal
decision threshold of Willie, and analyze the false alarm and the missed
detection probabilities in this case. Finally, the performance of the proposed
beamformer designs is evaluated through numerical experiments.</description><subject>Computer Science - Information Theory</subject><subject>Mathematics - Information Theory</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotjssKwjAUBbNxIeoHuLI_0JqY5CYutT5BEMR9SdJEAqaVtIr-vfWxGg4chkFoTHDGJOd4quLTP7IZwTQjICT0ET3V-t60ydKq4OoYfHVJVrbxlyrpZpLXDxvbDiHcK29U6-uqGaKeU9fGjv4coPNmfc536eG43eeLQ6pAQGronGkpjSO4pMA0aI6t0xK44Mo4o7GAGWMl0a7EFph0hBHVnbAgmhtBB2jy036ri1v0QcVX8akvvvX0DTtuP0c</recordid><startdate>20210330</startdate><enddate>20210330</enddate><creator>Ma, Shuai</creator><creator>Zhang, Yunqi</creator><creator>Li, Hang</creator><creator>Lu, Songtao</creator><creator>Al-Dhahir, Naofal</creator><creator>Zhang, Sha</creator><creator>Li, Shiyin</creator><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20210330</creationdate><title>Robust Beamforming Design for Covert Communications</title><author>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-c394b88cf10d364b6b50efb86575acfcb076244d1bfd0e648f141ab50071b5c73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Science - Information Theory</topic><topic>Mathematics - Information Theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Zhang, Yunqi</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><creatorcontrib>Lu, Songtao</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Zhang, Sha</creatorcontrib><creatorcontrib>Li, Shiyin</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ma, Shuai</au><au>Zhang, Yunqi</au><au>Li, Hang</au><au>Lu, Songtao</au><au>Al-Dhahir, Naofal</au><au>Zhang, Sha</au><au>Li, Shiyin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust Beamforming Design for Covert Communications</atitle><date>2021-03-30</date><risdate>2021</risdate><abstract>In this paper, we consider a common unicast beamforming network where Alice
utilizes the communication to Carol as a cover and covertly transmits a message
to Bob without being recognized by Willie. We investigate the beamformer design
of Alice to maximize the covert rate to Bob when Alice has either perfect or
imperfect knowledge about Willie's channel state information (WCSI). For the
perfect WCSI case, the problem is formulated under the perfect covert
constraint, and we develop a covert beamformer by applying semidefinite
relaxation and the bisection method. Then, to reduce the computational
complexity, we further propose a zero-forcing beamformer design with a single
iteration processing. For the case of the imperfect WCSI, the robust beamformer
is developed based on a relaxation and restriction approach by utilizing the
property of Kullback-Leibler divergence. Furthermore, we derive the optimal
decision threshold of Willie, and analyze the false alarm and the missed
detection probabilities in this case. Finally, the performance of the proposed
beamformer designs is evaluated through numerical experiments.</abstract><doi>10.48550/arxiv.2103.16786</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2103.16786 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2103_16786 |
source | arXiv.org |
subjects | Computer Science - Information Theory Mathematics - Information Theory |
title | Robust Beamforming Design for Covert Communications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T23%3A40%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20Beamforming%20Design%20for%20Covert%20Communications&rft.au=Ma,%20Shuai&rft.date=2021-03-30&rft_id=info:doi/10.48550/arxiv.2103.16786&rft_dat=%3Carxiv_GOX%3E2103_16786%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |