Results 11 to 20 of about 84,456 (273)
Covert communications in a compress-and-forward relay system
In this paper, we study covert communications strategies in a compress-and-forward (CF) relay system. Along with a public message to a destination node via a CF relay, a source node attempts to transmit a covert message while evading the surveillance of ...
Jihwan Moon
exaly +3 more sources
Covert Communication With Relay Selection [PDF]
In this letter, we investigate covert communication in relay networks with relay selection. We consider the scenario that while forwarding the source’s message, the selected relay opportunistically transmits its own message to the destination covertly. We derive the probability of detection error (PDE) and the average covert rate (ACR) in a closed form,
Yinjie Su +5 more
openaire +2 more sources
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +1 more source
Covert communication in relay and RIS networks
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is ...
Hu Jinsong +4 more
doaj +1 more source
Covert Communication With Mismatched Decoders
This paper considers the problem of covert communication with mismatched decoding, in which a sender wishes to reliably communicate with a receiver whose decoder is fixed and possibly sub-optimal, and simultaneously to ensure that the communication is covert with respect to a warden.
Qiaosheng Eric Zhang, Vincent Y. F. Tan
openaire +2 more sources
Underwater acoustic (UWA) biomimicking communications have been developed for covert communications. For the UWA covert communications, it is difficult to achieve the bit error rate (BER) and the degree of mimic (DoM) performances at the same time.
Jongmin Ahn +4 more
doaj +1 more source
Covert Quantum Communication [PDF]
We extend covert communication to the quantum regime by showing that covert quantum communication is possible over optical channels with noise arising either from the environment or from the sender's lab. In particular, we show that sequences of qubits can be transmitted covertly by using both a single photon and a coherent state encoding. We study the
Arrazola, Juan Miguel, Scarani, Valerio
openaire +3 more sources
Covert communications with channel inversion power control in uplink NOMA systems
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang +5 more
doaj +1 more source
On Covert Communication With Noise Uncertainty [PDF]
to appear in IEEE Communications ...
Biao He +3 more
openaire +3 more sources
Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6
Increased usage of the Internet has risen the demand for more IP addresses across the globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become a vital area of research. One of the serious threats to Internet security is
Arti Dua, Vinita Jindal, Punam Bedi
doaj +1 more source

