Results 1 to 10 of about 83,847 (160)

Disguised Full-Duplex Covert Communications [PDF]

open access: yesSensors, 2023
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security.
Jihwan Moon
doaj   +4 more sources

Gaussian-Distributed Spread-Spectrum for Covert Communications [PDF]

open access: yesSensors, 2023
Covert communication techniques play a crucial role in military and commercial applications to maintain the privacy and security of wireless transmissions from prying eyes.
Ismail Shakeel   +3 more
doaj   +2 more sources

Performance Comparison of Relay-Based Covert Communications: DF, CF and AF [PDF]

open access: yesSensors, 2023
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
doaj   +2 more sources

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas [PDF]

open access: yesEntropy, 2022
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest.
Brian Kim   +4 more
doaj   +2 more sources

Covert Communications via Full-Duplex User Relaying [PDF]

open access: yesSensors
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement.
Jong Yeol Ryu, Jung Hoon Lee
doaj   +2 more sources

Covert Communications in a Hybrid DF/AF Relay System [PDF]

open access: yesSensors
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on ...
Jihwan Moon
doaj   +2 more sources

Secret key expansion from covert communication [PDF]

open access: yesPhysical Review A, 2017
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core   +2 more sources

USBcat - Towards an Intrusion Surveillance Toolset [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chris Chapman, Scott Knight, Tom Dean
doaj   +4 more sources

Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning [PDF]

open access: yesSensors
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms.
Jin Qian   +5 more
doaj   +2 more sources

Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels [PDF]

open access: yesEntropy, 2017
This paper introduces an explicit covert communication code for binary-input asynchronous discrete memoryless channels based on binary polar codes, in which legitimate parties exploit uncertainty created by both the channel noise and the time of ...
Guillaume Frèche   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy