Results 11 to 20 of about 84,456 (273)

Covert communications in a compress-and-forward relay system

open access: yesICT Express
In this paper, we study covert communications strategies in a compress-and-forward (CF) relay system. Along with a public message to a destination node via a CF relay, a source node attempts to transmit a covert message while evading the surveillance of ...
Jihwan Moon
exaly   +3 more sources

Covert Communication With Relay Selection [PDF]

open access: yesIEEE Wireless Communications Letters, 2021
In this letter, we investigate covert communication in relay networks with relay selection. We consider the scenario that while forwarding the source’s message, the selected relay opportunistically transmits its own message to the destination covertly. We derive the probability of detection error (PDE) and the average covert rate (ACR) in a closed form,
Yinjie Su   +5 more
openaire   +2 more sources

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

open access: yesApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +1 more source

Covert communication in relay and RIS networks

open access: yesSecurity and Safety, 2023
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is ...
Hu Jinsong   +4 more
doaj   +1 more source

Covert Communication With Mismatched Decoders

open access: yesIEEE Transactions on Information Theory, 2022
This paper considers the problem of covert communication with mismatched decoding, in which a sender wishes to reliably communicate with a receiver whose decoder is fixed and possibly sub-optimal, and simultaneously to ensure that the communication is covert with respect to a warden.
Qiaosheng Eric Zhang, Vincent Y. F. Tan
openaire   +2 more sources

Biomimicking Covert Communication by Time-Frequency Shift Modulation for Increasing Mimicking and BER Performances

open access: yesSensors, 2021
Underwater acoustic (UWA) biomimicking communications have been developed for covert communications. For the UWA covert communications, it is difficult to achieve the bit error rate (BER) and the degree of mimic (DoM) performances at the same time.
Jongmin Ahn   +4 more
doaj   +1 more source

Covert Quantum Communication [PDF]

open access: yesPhysical Review Letters, 2016
We extend covert communication to the quantum regime by showing that covert quantum communication is possible over optical channels with noise arising either from the environment or from the sender's lab. In particular, we show that sequences of qubits can be transmitted covertly by using both a single photon and a coherent state encoding. We study the
Arrazola, Juan Miguel, Scarani, Valerio
openaire   +3 more sources

Covert communications with channel inversion power control in uplink NOMA systems

open access: yesElectronics Letters, 2021
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang   +5 more
doaj   +1 more source

On Covert Communication With Noise Uncertainty [PDF]

open access: yesIEEE Communications Letters, 2017
to appear in IEEE Communications ...
Biao He   +3 more
openaire   +3 more sources

Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6

open access: yesIEEE Access, 2022
Increased usage of the Internet has risen the demand for more IP addresses across the globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become a vital area of research. One of the serious threats to Internet security is
Arti Dua, Vinita Jindal, Punam Bedi
doaj   +1 more source

Home - About - Disclaimer - Privacy