Robust Beamforming Design for Covert Communications

In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has eithe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ma, Shuai, Zhang, Yunqi, Li, Hang, Lu, Songtao, Al-Dhahir, Naofal, Zhang, Sha, Li, Shiyin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Ma, Shuai
Zhang, Yunqi
Li, Hang
Lu, Songtao
Al-Dhahir, Naofal
Zhang, Sha
Li, Shiyin
description In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has either perfect or imperfect knowledge about Willie's channel state information (WCSI). For the perfect WCSI case, the problem is formulated under the perfect covert constraint, and we develop a covert beamformer by applying semidefinite relaxation and the bisection method. Then, to reduce the computational complexity, we further propose a zero-forcing beamformer design with a single iteration processing. For the case of the imperfect WCSI, the robust beamformer is developed based on a relaxation and restriction approach by utilizing the property of Kullback-Leibler divergence. Furthermore, we derive the optimal decision threshold of Willie, and analyze the false alarm and the missed detection probabilities in this case. Finally, the performance of the proposed beamformer designs is evaluated through numerical experiments.
doi_str_mv 10.48550/arxiv.2103.16786
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2103_16786</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2103_16786</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-c394b88cf10d364b6b50efb86575acfcb076244d1bfd0e648f141ab50071b5c73</originalsourceid><addsrcrecordid>eNotjssKwjAUBbNxIeoHuLI_0JqY5CYutT5BEMR9SdJEAqaVtIr-vfWxGg4chkFoTHDGJOd4quLTP7IZwTQjICT0ET3V-t60ydKq4OoYfHVJVrbxlyrpZpLXDxvbDiHcK29U6-uqGaKeU9fGjv4coPNmfc536eG43eeLQ6pAQGronGkpjSO4pMA0aI6t0xK44Mo4o7GAGWMl0a7EFph0hBHVnbAgmhtBB2jy036ri1v0QcVX8akvvvX0DTtuP0c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Robust Beamforming Design for Covert Communications</title><source>arXiv.org</source><creator>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</creator><creatorcontrib>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</creatorcontrib><description>In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has either perfect or imperfect knowledge about Willie's channel state information (WCSI). For the perfect WCSI case, the problem is formulated under the perfect covert constraint, and we develop a covert beamformer by applying semidefinite relaxation and the bisection method. Then, to reduce the computational complexity, we further propose a zero-forcing beamformer design with a single iteration processing. For the case of the imperfect WCSI, the robust beamformer is developed based on a relaxation and restriction approach by utilizing the property of Kullback-Leibler divergence. Furthermore, we derive the optimal decision threshold of Willie, and analyze the false alarm and the missed detection probabilities in this case. Finally, the performance of the proposed beamformer designs is evaluated through numerical experiments.</description><identifier>DOI: 10.48550/arxiv.2103.16786</identifier><language>eng</language><subject>Computer Science - Information Theory ; Mathematics - Information Theory</subject><creationdate>2021-03</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2103.16786$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2103.16786$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Zhang, Yunqi</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><creatorcontrib>Lu, Songtao</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Zhang, Sha</creatorcontrib><creatorcontrib>Li, Shiyin</creatorcontrib><title>Robust Beamforming Design for Covert Communications</title><description>In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has either perfect or imperfect knowledge about Willie's channel state information (WCSI). For the perfect WCSI case, the problem is formulated under the perfect covert constraint, and we develop a covert beamformer by applying semidefinite relaxation and the bisection method. Then, to reduce the computational complexity, we further propose a zero-forcing beamformer design with a single iteration processing. For the case of the imperfect WCSI, the robust beamformer is developed based on a relaxation and restriction approach by utilizing the property of Kullback-Leibler divergence. Furthermore, we derive the optimal decision threshold of Willie, and analyze the false alarm and the missed detection probabilities in this case. Finally, the performance of the proposed beamformer designs is evaluated through numerical experiments.</description><subject>Computer Science - Information Theory</subject><subject>Mathematics - Information Theory</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotjssKwjAUBbNxIeoHuLI_0JqY5CYutT5BEMR9SdJEAqaVtIr-vfWxGg4chkFoTHDGJOd4quLTP7IZwTQjICT0ET3V-t60ydKq4OoYfHVJVrbxlyrpZpLXDxvbDiHcK29U6-uqGaKeU9fGjv4coPNmfc536eG43eeLQ6pAQGronGkpjSO4pMA0aI6t0xK44Mo4o7GAGWMl0a7EFph0hBHVnbAgmhtBB2jy036ri1v0QcVX8akvvvX0DTtuP0c</recordid><startdate>20210330</startdate><enddate>20210330</enddate><creator>Ma, Shuai</creator><creator>Zhang, Yunqi</creator><creator>Li, Hang</creator><creator>Lu, Songtao</creator><creator>Al-Dhahir, Naofal</creator><creator>Zhang, Sha</creator><creator>Li, Shiyin</creator><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20210330</creationdate><title>Robust Beamforming Design for Covert Communications</title><author>Ma, Shuai ; Zhang, Yunqi ; Li, Hang ; Lu, Songtao ; Al-Dhahir, Naofal ; Zhang, Sha ; Li, Shiyin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-c394b88cf10d364b6b50efb86575acfcb076244d1bfd0e648f141ab50071b5c73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Science - Information Theory</topic><topic>Mathematics - Information Theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Zhang, Yunqi</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><creatorcontrib>Lu, Songtao</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Zhang, Sha</creatorcontrib><creatorcontrib>Li, Shiyin</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ma, Shuai</au><au>Zhang, Yunqi</au><au>Li, Hang</au><au>Lu, Songtao</au><au>Al-Dhahir, Naofal</au><au>Zhang, Sha</au><au>Li, Shiyin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust Beamforming Design for Covert Communications</atitle><date>2021-03-30</date><risdate>2021</risdate><abstract>In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the beamformer design of Alice to maximize the covert rate to Bob when Alice has either perfect or imperfect knowledge about Willie's channel state information (WCSI). For the perfect WCSI case, the problem is formulated under the perfect covert constraint, and we develop a covert beamformer by applying semidefinite relaxation and the bisection method. Then, to reduce the computational complexity, we further propose a zero-forcing beamformer design with a single iteration processing. For the case of the imperfect WCSI, the robust beamformer is developed based on a relaxation and restriction approach by utilizing the property of Kullback-Leibler divergence. Furthermore, we derive the optimal decision threshold of Willie, and analyze the false alarm and the missed detection probabilities in this case. Finally, the performance of the proposed beamformer designs is evaluated through numerical experiments.</abstract><doi>10.48550/arxiv.2103.16786</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2103.16786
ispartof
issn
language eng
recordid cdi_arxiv_primary_2103_16786
source arXiv.org
subjects Computer Science - Information Theory
Mathematics - Information Theory
title Robust Beamforming Design for Covert Communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T23%3A40%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20Beamforming%20Design%20for%20Covert%20Communications&rft.au=Ma,%20Shuai&rft.date=2021-03-30&rft_id=info:doi/10.48550/arxiv.2103.16786&rft_dat=%3Carxiv_GOX%3E2103_16786%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true