TY - GEN
T1 - Covert Communications with Simultaneous Multi-Modal Transmission
AU - Aggarwal, Rahul
AU - Kong, Justin S.
AU - Moore, Terrence J.
AU - Choi, Jihun
AU - Spasojevic, Predrag
AU - Dagefu, Fikadu T.
N1 - Publisher Copyright:
© 2024 Owner/Author.
PY - 2024/5/27
Y1 - 2024/5/27
N2 - In this paper, we develop an approach to exploit multiple disparate wireless communication technologies simultaneously to enhance covertness of a communication link. Specifically, given two available communication modalities between a pair of friendly nodes (Alice and Bob), the goal is to evade detection by an adversary (Willie) who is equipped with a radiometer covering the frequency bands of both modalities. We propose a joint detection threshold optimization technique from Willie's point of view. We also develop a joint transmit power optimization strategy for Alice to maximize covertness while meeting the throughput requirement at Bob. Through numerical simulations we show that the proposed scheme matches the performance of exhaustive search method while reducing the computational time by 98% and also improves the covertness by 56% compared to a naïve benchmark scheme.
AB - In this paper, we develop an approach to exploit multiple disparate wireless communication technologies simultaneously to enhance covertness of a communication link. Specifically, given two available communication modalities between a pair of friendly nodes (Alice and Bob), the goal is to evade detection by an adversary (Willie) who is equipped with a radiometer covering the frequency bands of both modalities. We propose a joint detection threshold optimization technique from Willie's point of view. We also develop a joint transmit power optimization strategy for Alice to maximize covertness while meeting the throughput requirement at Bob. Through numerical simulations we show that the proposed scheme matches the performance of exhaustive search method while reducing the computational time by 98% and also improves the covertness by 56% compared to a naïve benchmark scheme.
KW - covert communications
KW - detection error probability
KW - heterogeneous networks
KW - joint power allocation
KW - low probability of detection
UR - http://www.scopus.com/inward/record.url?scp=85198072173&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85198072173&partnerID=8YFLogxK
U2 - 10.1145/3643833.3656117
DO - 10.1145/3643833.3656117
M3 - Conference contribution
AN - SCOPUS:85198072173
T3 - WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
SP - 1
EP - 7
BT - WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PB - Association for Computing Machinery, Inc
T2 - 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024
Y2 - 27 May 2024 through 29 May 2024
ER -