Throughput Scaling of Covert Communication Over Wireless Adhoc Networks

We consider the problem of covert communication over wireless adhoc networks in which (roughly) n legitimate nodes (LNs) and n^{\kappa } for \kappa > 0 non-communicating warden nodes (WNs) are randomly distributed in a square of unit area. Each legitimate source wants to communicate with it...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information theory 2020-12, Vol.66 (12), p.7684-7701
Hauptverfasser: Cho, Kang-Hee, Lee, Si-Hyeon, Tan, Vincent Y. F.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:We consider the problem of covert communication over wireless adhoc networks in which (roughly) n legitimate nodes (LNs) and n^{\kappa } for \kappa > 0 non-communicating warden nodes (WNs) are randomly distributed in a square of unit area. Each legitimate source wants to communicate with its intended destination node while ensuring that every WN is unable to detect the presence of the communication. In this scenario, we study the throughput scaling law. Due to the covert communication constraint, the transmit powers are necessarily limited. Under this condition, we introduce a preservation region around each WN. This region serves to prevent transmission from the LNs and to increase the transmit power of the LNs outside the preservation regions. For the achievability results, multi-hop (MH), hierarchical cooperation (HC), and hybrid HC-MH schemes are utilized with some appropriate modifications. In the proposed MH and hybrid schemes, because the preservation regions may impede communication along direct data paths, the data paths are suitably modified by taking a detour around each preservation region. To avoid the concentration of detours resulting extra relaying burdens, we distribute the detours evenly over a wide region. In the proposed HC scheme, we control the symbol power and the scheduling of distributed multiple-input multiple-output transmission. We also present upper bounds on the throughput scaling under the assumption that every active LN consumes the same average transmit power over the time period in which the WNs observe the channel outputs. For 0 < \kappa < 1 , these upper bounds match with the achievable throughput scalings.
ISSN:0018-9448
1557-9654
DOI:10.1109/TIT.2020.3011895