IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on...

14
1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEE Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication Achieved by A Greedy Relay in Wireless Networks Jinsong Hu, Student Member, IEEE, Shihao Yan, Member, IEEE, Xiangyun Zhou, Senior Member, IEEE, Feng Shu, Member, IEEE, Jun Li, Senior Member, IEEE, and Jiangzhou Wang, Fellow, IEEE Abstract—Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own informa- tion to the destination covertly on top of forwarding the source’s message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power, spectrum) allocated only for the purpose of forwarding the source’s information. We propose two strategies for the relay to transmit its covert information, namely rate-control and power- control the transmission schemes, for which the source’s detection limits are analysed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the power- control transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source’s message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmit power). Index Terms—Physical layer security, covert communication, wireless relay networks, detection, transmission schemes. This work was supported in part by the National Natural Science Foundation of China under Grant 61771244, Grant 61727802, Grant 61501238, and Grant 61472190, in part by the Australian Research Council’s Discovery Projects (DP150103905), in part by the Open Research Fund of National Key Laboratory of Electromagnetic Environment, China Research Institute of Radiowave Propagation under Grant 201500013, in part by the Open Research Fund of the National Mobile Communications Research Laboratory, Southeast University, China, under Grant 2017D04, in part by the Jiangsu Provincial Science Foundation Project under Grant BK20150786, in part by the Specially Appointed Professor Program in Jiangsu Province, 2015, in part by the Fundamental Research Funds for the Central Universities under Grant 30916011205. This paper was presented in part at IEEE Global Communication Conference (GLOBECOM 2017), Singapore, Dec. 2017 [1]. J. Hu, F. Shu, and J. Li are with the School of Electronic and Optical Engineering, Nanjing University of Science and Technology, Nanjing, China. (Emails: {jinsong hu, shufeng, jun.li}@njust.edu.cn). J. Hu is also a visiting PhD student at the Research School of Engineering, Australian National Uni- versity, Canberra, ACT, Australia. F. Shu is also with the College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou, China. J. Li is also with the National Mobile Communications Research Laboratory, Southeast University, Nanjing, China, and with the Department of Software Engineering, Institute of Cybernetics, National Research Tomsk Polytechnic University, Tomsk, Russia. S. Yan is with the School of Engineering, Macquarie University, Sydney, NSW, Australia (Email: [email protected]). X. Zhou is with the Research School of Engineering, Australian National University, Canberra, ACT, Australia (Email:[email protected]). J. Wang is with the School of Engineering and Digital Arts, University of Kent, Canterbury CT2 7NT, U.K. (Email: [email protected]). I. I NTRODUCTION A. Background and Related Works Security and privacy are critical in existing and future wire- less networks since a large amount of confidential information (e.g., credit card information, physiological information for e- health) is transferred over the open wireless medium [2–4]. Traditional security techniques offer protection against eaves- dropping through encryption, guaranteeing the integrity of messages over the air [5,6]. However, it has been shown in the recent years that even the most robust encryption techniques can be defeated by a determined adversary. Physical-layer security, on the other hand, exploits the dynamic characteristics of the wireless medium to minimize the information obtained by eavesdroppers [7–11]. However, it does not provide protec- tion against the detection of a transmission in the first place, which can offer an even stronger level of security, as the transmission of encrypted transmission can spark suspicion in the first place and invite further probing by skeptical eaves- droppers. On the contrary, apart from protecting the content of communication, covert communication aims to enable a wireless transmission between two users while guaranteeing a negligible detection probability of this transmission at a war- den and thus achieving privacy of the transmitter. Meanwhile, this strong security (i.e., hiding the wireless transmission) is desired in many application scenarios of wireless communica- tions, such as covert military operations, location tracking in vehicular ad hoc networks and intercommunication of sensor networks or Internet of Things (IoT). Due to the broadcast nature of wireless channels, the security and privacy of wire- less communications has been an ever-increasing concern, which now is the biggest barrier to the wide-spread adoption of sensor networks or IoT technologies [12]. In sensor net- works or IoT, multiple hidden transmitters or receivers, which may be surrounded or monitored by wardens/cybercriminals, are trying to exchange critical information through multi- hop wireless transmissions. Each transmission should be kept covert to enable the end-to-end covert communication in order to guarantee the ‘invisibility’ of the transmitters. As such, the hiding of communication termed covert communication or low probability of detection communication, which aims to shield the very existence of wireless transmissions against a warden to achieve security, has recently drawn significant research interests and is emerging as a cutting-edge technique in the context of wireless communication security [13–15]. Although spread-spectrum techniques are widely used to achieve covertness in military applications of wireless commu-

Transcript of IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on...

Page 1: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1

Covert Communication Achieved by A GreedyRelay in Wireless Networks

Jinsong Hu, Student Member, IEEE, Shihao Yan, Member, IEEE, Xiangyun Zhou, Senior Member, IEEE,Feng Shu, Member, IEEE, Jun Li, Senior Member, IEEE, and Jiangzhou Wang, Fellow, IEEE

Abstract—Covert wireless communication aims to hide the veryexistence of wireless transmissions in order to guarantee a strongsecurity in wireless networks. In this work, we examine thepossibility and achievable performance of covert communicationin amplify-and-forward one-way relay networks. Specifically, therelay is greedy and opportunistically transmits its own informa-tion to the destination covertly on top of forwarding the source’smessage, while the source tries to detect this covert transmissionto discover the illegitimate usage of the resource (e.g., power,spectrum) allocated only for the purpose of forwarding thesource’s information. We propose two strategies for the relay totransmit its covert information, namely rate-control and power-control the transmission schemes, for which the source’s detectionlimits are analysed in terms of detection error probability and theachievable effective covert rates from the relay to destination arederived. Our examination determines the conditions under whichthe rate-control transmission scheme outperforms the power-control transmission scheme, and vice versa, which enables therelay to achieve the maximum effective covert rate. Our analysisindicates that the relay has to forward the source’s messageto shield its covert transmission and the effective covert rateincreases with its forwarding ability (e.g., its maximum transmitpower).

Index Terms—Physical layer security, covert communication,wireless relay networks, detection, transmission schemes.

This work was supported in part by the National Natural Science Foundationof China under Grant 61771244, Grant 61727802, Grant 61501238, andGrant 61472190, in part by the Australian Research Council’s DiscoveryProjects (DP150103905), in part by the Open Research Fund of NationalKey Laboratory of Electromagnetic Environment, China Research Instituteof Radiowave Propagation under Grant 201500013, in part by the OpenResearch Fund of the National Mobile Communications Research Laboratory,Southeast University, China, under Grant 2017D04, in part by the JiangsuProvincial Science Foundation Project under Grant BK20150786, in partby the Specially Appointed Professor Program in Jiangsu Province, 2015,in part by the Fundamental Research Funds for the Central Universitiesunder Grant 30916011205. This paper was presented in part at IEEE GlobalCommunication Conference (GLOBECOM 2017), Singapore, Dec. 2017 [1].

J. Hu, F. Shu, and J. Li are with the School of Electronic and OpticalEngineering, Nanjing University of Science and Technology, Nanjing, China.(Emails: {jinsong hu, shufeng, jun.li}@njust.edu.cn). J. Hu is also a visitingPhD student at the Research School of Engineering, Australian National Uni-versity, Canberra, ACT, Australia. F. Shu is also with the College of Computerand Information Sciences, Fujian Agriculture and Forestry University, Fuzhou,China. J. Li is also with the National Mobile Communications ResearchLaboratory, Southeast University, Nanjing, China, and with the Departmentof Software Engineering, Institute of Cybernetics, National Research TomskPolytechnic University, Tomsk, Russia.

S. Yan is with the School of Engineering, Macquarie University, Sydney,NSW, Australia (Email: [email protected]).

X. Zhou is with the Research School of Engineering, Australian NationalUniversity, Canberra, ACT, Australia (Email:[email protected]).

J. Wang is with the School of Engineering and Digital Arts, University ofKent, Canterbury CT2 7NT, U.K. (Email: [email protected]).

I. INTRODUCTION

A. Background and Related Works

Security and privacy are critical in existing and future wire-less networks since a large amount of confidential information(e.g., credit card information, physiological information for e-health) is transferred over the open wireless medium [2–4].Traditional security techniques offer protection against eaves-dropping through encryption, guaranteeing the integrity ofmessages over the air [5, 6]. However, it has been shown in therecent years that even the most robust encryption techniquescan be defeated by a determined adversary. Physical-layersecurity, on the other hand, exploits the dynamic characteristicsof the wireless medium to minimize the information obtainedby eavesdroppers [7–11]. However, it does not provide protec-tion against the detection of a transmission in the first place,which can offer an even stronger level of security, as thetransmission of encrypted transmission can spark suspicion inthe first place and invite further probing by skeptical eaves-droppers. On the contrary, apart from protecting the contentof communication, covert communication aims to enable awireless transmission between two users while guaranteeing anegligible detection probability of this transmission at a war-den and thus achieving privacy of the transmitter. Meanwhile,this strong security (i.e., hiding the wireless transmission) isdesired in many application scenarios of wireless communica-tions, such as covert military operations, location tracking invehicular ad hoc networks and intercommunication of sensornetworks or Internet of Things (IoT). Due to the broadcastnature of wireless channels, the security and privacy of wire-less communications has been an ever-increasing concern,which now is the biggest barrier to the wide-spread adoptionof sensor networks or IoT technologies [12]. In sensor net-works or IoT, multiple hidden transmitters or receivers, whichmay be surrounded or monitored by wardens/cybercriminals,are trying to exchange critical information through multi-hop wireless transmissions. Each transmission should be keptcovert to enable the end-to-end covert communication in orderto guarantee the ‘invisibility’ of the transmitters. As such, thehiding of communication termed covert communication or lowprobability of detection communication, which aims to shieldthe very existence of wireless transmissions against a wardento achieve security, has recently drawn significant researchinterests and is emerging as a cutting-edge technique in thecontext of wireless communication security [13–15].

Although spread-spectrum techniques are widely used toachieve covertness in military applications of wireless commu-

Page 2: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2

nications [16], many fundamental problems have not been welladdressed. This leads to the fact that the probability that thespread-spectrum techniques fail to hide wireless transmissionsis unknown, significantly limiting its application. The funda-mental limit of covert communication has been studied undervarious channel conditions, such as additive white Gaussiannoise (AWGN) channels [17], binary symmetric channels [18],discrete memoryless channels [19], and multiple input multi-ple output (MIMO) AWGN channels [20]. It is proved thatO(

√n) bits of information can be transmitted to a legitimate

receiver reliably and covertly in n channel uses as n → ∞.This means that the associated covert rate is zero due tolimn→∞ O(

√n)/n → 0. Following these pioneering works

on covert communication, a positive rate has been proved tobe achievable when the warden has uncertainty on his receivernoise power [21, 22], or an uniformed jammer comes in to help[23]. Most recently, [24] has examined the impact of noiseuncertainty on covert communication. In addition, the effectof the imperfect channel state information (CSI) and finiteblocklength (i.e., finite n) on covert communication has beeninvestigated in [25] and [26], respectively.

B. Motivation and Our ContributionsThe ultimate goal of covert wireless communication is to

establish shadow wireless networks [14], in which each hoptransmission should be kept covert to enable the end-to-endcovert communication, in order to guarantee the “invisibility”of the transmitters. Following the previous works that onlyfocused on covert transmissions in point-to-point communi-cation scenarios, in this work, for the first time, we considercovert communications in the context of amplify-and-forwardone-way relay networks. This is motivated by the scenariowhere the relay (R) tries to transmit its own information tothe destination (D) on top of forwarding the information fromthe source (S) to D. Specifically, for example, in some relaynetworks (possible application scenarios of sensor networksor IoT) the communication resources (e.g., spectrum, power)can be managed or owned by S, where S may not allowR to transmit its own information on top of forwarding S’smessages to D. This is due to the fact that R’s additional trans-mission may cause interference within the specific spectrumowned/managed by S and also consume more transmit power,which is possibly wirelessly transferred from S (owned byS) and should be only used for forwarding S’s information.Therefore, this additional transmission of R should be keptcovert from S.

We note that conceptually the covert transmission from Rto D is similar to steganography, in which covert informationis transmitted by hiding in innocuous objects [27]. Theseinnocuous objects are utilized as “cover text” to carry thecovert information. In our work, the innocuous objects are theforwarding transmissions from R to D. The main differencebetween our work and steganography is that in our work thecovert information is shielded by the forwarding transmissionsfrom R to D at the physical layer, while in steganography thecovert information is hidden and transmitted by encoding ormodifying some contents (e.g., shared videos or images) atthe application layer (as discussed in Section III of [14]).

In the literature, covert communications with positive trans-mission rate are achieved in the context of point-to-pointsystems by considering different uncertainty sources, such asrandom received noise power [22], random jamming signals[23], and imperfect CSI [25]. In the considered relay networks,as mentioned above the uncertainty is inherently embedded inthe forwarding strategies of the S’s information from R toD, where the covert transmission with a positive rate fromR to D does not require any extra uncertainty sources. Theperformance of the considered covert communication in relaynetworks and the covert communication in other point-to-point communication systems highly depends on the amount ofuncertainty appeared in the system model. As such, it is hard tocompare the achieved covert rate limits or warden’s detectionlimits directly, since the uncertainty sources are different andit is hard to quantify the corresponding amount of uncertaintyin the same manner.

Our main contributions are summarized below.

• We examine the possibility and achievable performanceof covert communications in one-way relay networks.Specifically, we propose two strategies for R to transmitthe covert information to D, namely the rate-control andpower-control transmission schemes, in which the trans-mission rate and transmit power of the covert messageare fixed and to be optimized regardless of the channelquality from R to D, respectively. We also identify thenecessary conditions that the covert transmission fromR to D can possibly occur without being detected by Swith probability one and clarify how R hides its coverttransmission in forwarding S’s message to D in these twoschemes.

• We derive the detection limits at S in terms of theprior probability of null hypothesis 1 − ω, the priorprobability of alternative hypothesis ω, the false alarmrate α and miss detection rate β are in closed-fromexpressions for the proposed two transmission schemes.Then, we determine the optimal detection threshold atS, which minimizes the detection error probability ξ =(1 − ω)α + ωβ and obtain the associated minimumdetection error probability ξ∗. Our analysis leads to manyuseful insights. For example, we analytically prove thatξ∗ increases with R’s maximum transmit power, whichindicates that boosting the forwarding ability of R alsoincreases its capacity to perform covert transmissions.This demonstrates a tradeoff between the achievableeffective covert rate and R’s ability to aid the transmissionfrom S to D.

• We analyze the effective covert rates achieved by thesetwo schemes subject to the covert constraint ξ∗ ≥min(1 − ω, ω) − ϵ, where ϵ ∈ [0, 1] is predeterminedto specify the covert constraint. Our analysis indicatesthat the achievable effective covert rate approaches zeroas the transmission rate from S to D approaches zero,which demonstrates that covert transmission from R toD is only feasible with the legitimate transmission fromS to D as the shield. Our examination shows that therate-control transmission scheme outperforms the power-

Page 3: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 3

Source Destination

Relay

Phase 1: Phase 2:

srh

rdhrs

h

Fig. 1. Covert communication in one-way relay networks.

control transmission scheme under some specific con-ditions, and vise versa. Our examination enables R toswitch between these two schemes in order to achieve ahigher effective covert rate.

The rest of this paper is organized as follows. Section IIdetails our system model and adopted assumptions. Section IIIand IV present the rate-control and power-control transmissionschemes, respectively. Thorough analysis on the performanceof these two transmission are provided in these two sectionsas well. Section V provides numerical results to confirm ouranalysis and provide useful insights on the impact of someparameters. Section VI draws conclusions.

Notation: Scalar variables are denoted by italic symbols.Vectors is denoted by lower-case boldface symbols. Given acomplex number, | · | denotes the modulus. Given a complexvector, (·)† denotes the conjugate transpose. E[·] denotesexpectation operation.

II. SYSTEM MODEL

A. Considered Scenario and Adopted Assumptions

As shown in Fig. 1, in this work we consider a one-wayrelay network, in which S transmits information to D withthe aid of R, since a direct link from S to D is not available.As mentioned in the introduction, S allocates some resourceto R in order to seek its help to relay the message to D.However, in some scenarios R may intend to use this resourceto transmit its own message to D as well, which is forbiddenby S and thus should be kept covert from S. As such, inthe considered system model S is also the warden to detectwhether R transmits its own information to D when it is aidingthe transmission from S to D.

We assume the wireless channels within our system modelare subject to independent quasi-static Rayleigh fading withequal block length and the channel coefficients are indepen-dent and identically distributed (i.i.d.) circularly symmetriccomplex Gaussian random variables with zero-mean and unit-variance. We also assume that each node is equipped with asingle antenna. The channel from S to R is denoted by hsr

and the channel from R to D is denoted by hrd. We assumeR knows both hsr and hrd perfectly, while S only knowshsr and D only knows hrd. Considering channel reciprocity,we assume the channel from R to S (denoted by hrs) is thesame as hsr and thus it is perfectly known by S. We furtherassume that R operates in the half-duplex mode and thus thetransmission from S to D occurs in two phases: phase 1 (Stransmits to R) and phase 2 (R transmits to D).

B. Transmission from Source to Relay (Phase 1)In phase 1, the received signal at R is given by

yr[i] =√Pshsrxb[i] + nr[i], (1)

where Ps is the fixed transmit power of S, xb is the transmittedsignal by S satisfying E[xb[i]x

†b[i]] = 1, i = 1, 2, . . . , n is the

index of each channel use (n is the total number of channeluses in each phase), and nr[i] is the AWGN at relay with σ2

r asits variance, i.e., nr[i] ∼ CN (0, σ2

r). In the literature, multipleapproaches have been developed to estimate the noise varianceat a receiver. In general, these approaches can be dividedinto two major categories: data-aided (DA) approaches andnon-data-aided (NDA) approaches [28]. The DA approachesassume that transmitted symbols are known at the receiverand maximum-likelihood estimation can be used to estimatethe noise variance. For the NDA approaches, transmit symbolsare unknown at the receiver and the noise variance is based onthe statistics of the received signals. In this work, we considerthat R operates in the AF mode and thus R will forward alinearly amplified version of the received signal to D in phase2. As such, the forwarded (transmitted) signal by R is givenby

xr[i] = Gyr[i] = G(√Pshsrxb[i] + nr[i]), (2)

which is a linear scaled version of the received signal by ascalar G. In order to guarantee the power constraint at R, thevalue of G is chosen such that E[xr[i]x

†r[i]] = 1, which leads

to G = 1/√Ps|hsr|2 + σ2

r .In this work, we also consider that the transmission rate

from S to D is predetermined, which is denoted by Rsd. Wealso consider a maximum power constraint at R, i.e., Pr ≤Pmaxr . As such, although R knows both hsr and hrd perfectly,

transmission outage from S to D still incurs when Cmaxsd <

Rsd, where Cmaxsd is the channel capacity from S to D for

Pr = Pmaxr . Then, the transmission outage probability is given

by δ = P[Cmaxsd < Rsd], which has been derived in a closed-

form expression [29]. We assume that all the nodes in thenetwork do not transmit signals when the outage occurs. Inpractice, the pair of Rsd and δ determines the specific aid(i.e., the value of Pmax

r ) required by S from R, which relatesto the amount of resource allocated to R by S as a payback.In this work, we assume both Rsd and δ are predetermined,which leads to a predetermined Pmax

r .

C. Transmission Strategies at Relay (Phase 2)In this subsection, we detail the transmission strategies of R

when it does and does not transmit its own information to D.We also determine the condition that R can transmit its ownmessage to D without being detected by S with probabilityone, in which the probability to guarantee this condition isalso derived.

1) Relay’s Transmission without the Covert Message: In thecase when the relay does not transmit its own message (i.e.,covert message) to Bob, it only transmits xr to D. Accordingly,the received signal at D is given by

yd[i] =√P 0r hrdxr[i] + nd[i]

=√P 0r Ghrd

√Pshsrxb[i] +

√P 0r Ghrdnr[i] + nd[i], (3)

Page 4: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 4

where P 0r is the transmit power of xr at R in this case and

nd[i] is the AWGN at D with σ2d as its variance, i.e., nd[i] ∼

CN (0, σ2d). Accordingly, the signal-to-noise ratio (SNR) at the

destination for xb, which has been derived in a closed-formexpression in [30], is given by

γd =Ps|hsr|2P 0

r |hrd|2G2

P 0r |hrd|2G2σ2

r + σ2d

=γ1γ2

γ1 + γ2 + 1, (4)

where γ1 , (Ps|hsr|2)/σ2r , γ2 , (P 0

r |hrd|2)/σ2d, and the

scalar G is defined earlier as G = 1/√

Ps|hsr|2 + σ2r .

For a predetermined Rsd, R does not have to adopt themaximum transmit power for each channel realization in orderto guarantee a specific transmission outage probability. Whenthe transmission outage occurs (i.e., Cmax

sd < Rsd occurs), Rwill not transmit (i.e., P 0

r = 0). When Cmaxsd ≥ Rsd, R only

has to ensure Csd = Rsd, where Csd = 1/2 log2(1+γd). Then,following (4) the transmit power of R when Cmax

sd ≥ Rsd isgiven by P 0

r = µσ2d/|hrd|2, where

µ , (Ps|hsr|2 + σ2r)(2

2Rsd − 1)

[Ps|hsr|2 − σ2r(2

2Rsd − 1)]. (5)

We note that (5) indicates that R does not use its maximumtransmit power Pmax

r to forward S’s information when it doesnot transmit covert information to D. This is due to the fact thatthe transmission from S to D is of a fixed rate Rsd and a largertransmit power that leads to Csd > Rsd (not Csd = Rsd) doesnot bring in extra benefit to this transmission from S to D. Assuch, in order to save energy R only sets its transmit poweras per (5) to guarantee Csd = Rsd. Noting γd < γ1, we have1/2 log2(1 + γ1) > Rsd when Csd = Rsd. As such, µ givenin (5) is nonnegative. Following (4), we note that C∗

sd ≥ Rsd

requires |hrd|2 ≥ µσ2d/P

maxr . As such, the transmit power of

R without a covert message is given by

P 0r =

µσ2

d

|hrd|2 , |hrd|2 ≥ µσ2d

Pmaxr

,

0, |hrd|2 <µσ2

d

Pmaxr

.(6)

As per (6), we note that relay will forward message when|hrd|2 ≥ µσ2

d/Pmaxr is met. We denote this necessary condi-

tion as B. As such, R will forward xb to D and S will performdetection whenever condition B is met. Considering quasi-static Rayleigh fading, the cumulative distribution function(cdf) of |hrd|2 is given by F|hrd|2(x) = 1 − e−x and thusthe probability that B is guaranteed is given by

PB = exp

{− µσ2

d

Pmaxr

}. (7)

2) Relay’s Transmission with the Covert Message: In thecase when R transmits the covert message to D on top offorwarding xb, the received signal at D is given by

yd[i] =√P 1r Ghrd

√Pshsrxb[i] +

√P∆hrdxc[i]+√

P 1r Ghrdnr[i] + nd[i], (8)

where P 1r is R’s transmit power of xb in this case and P∆

is R’s transmit power of the covert message xc satisfyingE[xc[i]x

†c[i]] = 1. We note that the covert transmission from

R to D should not affect the transmission from S to D.Otherwise, S can easily observe this covert transmission. Assuch, here we assume D always first decodes xb with xc

as interference. Following (8), the signal-to-interference-plus-noise ratio (SINR) for xb is given by

γd =Ps|hsr|2P 1

r |hrd|2G2

P 1r |hrd|2G2σ2

r + P∆|hrd|2 + σ2d

=γ1γ3

γ3 + (γ1 + 1) (γ3P∆/P 1r + 1)

, (9)

where γ3 , (P 1r |hrd|2)/σ2

d. We will determine P 1r based on

different transmission strategies of the covert message from Rto D.

D. Decoding of the Covert Message

As discussed above, the covert transmission from R to Dshould not affect the transmission from S to D and thuswe have to guarantee the successful decoding of xb evenwhen xc is treated as interference to xb. We also note thatthis covert transmission cannot happen when the transmissionoutage from S to D occurs. This is, for example, due to thefact that when the transmission outage occurs R will requesta retransmission from S, which enables S to detect R’s coverttransmission with probability one if the covert transmissionhappened. Therefore, the covert transmission from R to Donly occur when the successful transmission from S to D isguaranteed (i.e., when xb is successfully decoded at D). Assuch, when the covert message is transmitted by R, successiveinterference cancellation (SIC) that allows a receiver to decodedifferent signals that arrive simultaneously is implemented atD. Taking advantage of SIC, D decodes the stronger signal(i.e., xb) first, subtracts it from the combined signal yd givenin (8), and finally decodes the weaker one (i.e., xc) from theresidue. We also note that D cannot jointly decode xb and xc

due to the fact that the codebooks used for encoding xb andxc are different in order to guarantee that the codebook forxc is unknown while the codebook for xb is known to the S.Hence, the effective received signal used to decode the covertmessage xc is given by

yd[i] =√P∆hrdxc[i] +

√P 1r hrdGnr[i] + nd[i]. (10)

Then, following (10) the SINR for xc is

γ∆ =P∆|hrd|2

P 1r |hrd|2G2σ2

r + σ2d

. (11)

E. Binary Detection at Source and the Covert Constraint

In this subsection, we present the optimal detection strategyadopted by S (i.e., Source).

In phase 2 when R transmits to D, S will detect whetherR transmits the covert message xc on top of forwarding S’smessage xb to D. R does not transmit xc in the null hypothesisH0 while it does in the alternative hypothesis H1. Then, the

Page 5: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 5

received signal at S in phase 2 is given by

ys[i] =

{ √P 0r hrsxr[i]+ns[i], H0,√

P 1r hrsxr[i]+

√P∆hrsxc[i]+ns[i], H1,

=

P 0r hrs√

Ps|hsr|2+σ2r

(√Pshsrxb[i]+nr[i])+ns[i], H0,

√P 1

r hrs√Ps|hsr|2+σ2

r

(√Pshsrxb[i]+

nr[i])+√P∆hrsxc[i]+ns[i], H1.

(12)

Noting that xb[i] is known by S, hence, S can cancel thecorresponding component from its received signal ys[i], dueto the fact the infinite blocklength is considered in this workand S can exactly estimate the scale factor of xb[i]. Then, theeffective received signal used for detection at S is given by

ys[i]=

P 0r hrs√

Ps|hsr|2+σ2r

nr[i]+ns[i], H0,√

P 1r hrs√

Ps|hsr|2+σ2r

nr[i]+√P∆hrsxc[i]+ns[i], H1.

(13)

Following (13), the probability density functions of the obser-vations ys under H0 and H1 are, respectively, given by

f(ys

∣∣H0) =n∏

i=1

f(ys[i]∣∣H0)

=1(

2πσ2H0

)n2exp

{− 1

2σ2H0

n∑i=1

|ys[i]|2}, (14)

f(ys

∣∣H1) =n∏

i=1

f(ys[i]∣∣H1)

=1(

2πσ2H1

)n2exp

{− 1

2σ2H1

n∑i=1

|ys[i]|2}, (15)

where σ2H0

, P 0r |hrs|2σ2

r/(Ps|hsr|2+σ2r)+σ2

s and σ2H1

,P 1r |hrs|2σ2

r/(Ps|hsr|2+σ2r)+P∆|hrs|2+σ2

s . Following (14) and(15), based on the Fisher-Neyman factorization theorem [31],we note that the term T (n) =

∑ni=1 |ys[i]|2 is the sufficient

test statistic for the detector at S. As such, the detector at Sfor an arbitrary threshold is given by

1

nT (n)

D1

≷D0

τ, (16)

where τ is the threshold for (1/n)T (n), which will be deter-mined later, D1 and D0 are the binary decisions that inferwhether R transmits covert message or not, respectively. Wewill examine how S sets the optimal value of τ in order to min-imize the detection error probability in the following sectionsfor considered different transmission strategies. Consideringinfinite blocklength, i.e., n → ∞, we have

limn→∞

1

nT (n)=

{P 0r |hrs|2ϕ+ σ2

s , H0,

P 1r |hrs|2ϕ+ P∆|hrs|2+σ2

s , H1,(17)

where ϕ , σ2r/(Ps|hsr|2 + σ2

r).

The detection performance of S is normally measured byits detection error probability, which is defined as

ξ , (1− ω)α+ ωβ, (18)

where ω = P(H1) is the probability that R transmits a covertmessage, 1 − ω = P(H0) is the probability that R does nottransmit a covert message, α = P(D1|H0) is S’s false alarmrate, and β = P(D0|H1) is S’s miss detection rate.

In practice, it is hard to know ξ at R since the thresholdτ adopted by S is unknown. In this work, we consider theworst-case scenario where τ is optimized at S to minimizeξ. As such, the covert constraint considered in this work isξ∗ ≥ min{1− ω, ω} − ϵ, where ξ∗ is the minimum detectionerror probability achieved at S.

III. RATE-CONTROL TRANSMISSION SCHEME

In this section, we consider the rate-control transmissionscheme, in which R transmits a covert message to D witha constant rate when some specific realizations of |hrd|2 areguaranteed. To this end, R varies its transmit power as perhrd such that P∆|hrd|2 is fixed as Q. Specifically, we firstdetermine R’s transmit power in H1 and then analyze thedetection error probability at S, based on which we also deriveS’s optimal detection threshold. Furthermore, we derive theeffective covert rate achieved by the rate-control transmissionscheme.

A. Transmit Power at Relay under H1

Following (9) and defining Q = P∆|hrd|2, in order toguarantee Csd = Rsd under H1, P 1

r is given as

P 1r =

µ(Q+ σ2d)

|hrd|2, (19)

which requires C∗sd ≥ Rsd that leads to |hrd|2 ≥ (µσ2

d +µQ+Q)/Pmax

r . We note that P 1r is the transmit power of the

relay to forward the signal from S to D. In practical scenario,R can set the value of P 1

r as per the system parameters hsr,hrd, Ps, σ2

r , σ2d, Rsd, and Q. The values of these system

parameters are known by R. Specifically, hsr can hrd can beobtained through channel estimations. The values of σ2

r andσ2d can be achieved through a priori measurements collected

from the environment, where σ2d is fed back from D to R.

The value of Rsd is predetermined by the QoS requirementof the communication from S to D, while the value of Q is adesign parameter to determine at R. Considering the maximumpower constraint at R (i.e., P 1

r +P∆ ≤ Pmaxr under this case),

R has to give up the transmission of the covert message (i.e.,P∆ = 0) when P 1

r > Pmaxr −P∆ and sets P 1

r the same as P 0r

given in (6). This is due to the fact that S knows hrs and itcan detect with probability one when the total transmit powerof R is greater than Pmax

r . Then, the transmit power of xr

under H1 for the rate-control transmission scheme is given by

P 1r =

µ(Q+σ2

d)|hrd|2 , |hrd|2 ≥ µσ2

d+µQ+QPmax

r,

µσ2d

|hrd|2 ,µσ2

d

Pmaxr

≤ |hrd|2 <µσ2

d+µQ+QPmax

r,

0, |hrd|2 <µσ2

d

Pmaxr

.

(20)

Page 6: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 6

As per (20), when R cannot support the transmission fromS to D (i.e., when |hrd|2 < µσ2

d/Pmaxr ), R or D will send

the retransmission request to S and R should not forward xb,since this forwarding will definitely fail. In the meantime, S isaware of that the received energy comes from the R’s coverttransmission if R has transmitted the covert message duringthis period. Due to that the CSI of all the channels is availableto R, R knows exactly when the transmission outage from Rto D occurs and thus R will not transmit covert informationto D when this outage occurs. In summary, S cannot detectR’s covert transmission with probability one only when thecondition |hrd|2 ≥ (µσ2

d + µQ+Q)/Pmaxr is guaranteed. We

denote this necessary condition for covert communication asC. Considering quasi-static Rayleigh fading, the cumulativedistribution function (cdf) of |hrd|2 is given by F|hrd|2(x) =1− e−x and thus the probability that C is guaranteed is givenby

PC = exp

{−µσ2

d + µQ+Q

Pmaxr

}. (21)

We note that PC is a monotonically decreasing function ofQ, which indicates that the probability that R will transmit acovert message decreases as Q increases.

In this work, we consider quasi-static Rayleigh fadingchannels where the channels remain constant within eachtransmission period and vary independently from one periodto another. We would like to clarify that R could possiblytransmit a covert message to D without being detected duringa retransmission from S to D (i.e., new transmission period)when the condition C is met.

B. Detection Error Probability at Source

In this subsection, we derive S’s false alarm rate, i.e., α,and miss detection rate, i.e., β.

Theorem 1: When the condition B is guaranteed, for agiven τ , the false alarm and miss detection rates at S arederived as

α =

1, τ < σ2

s ,1−P−1

B κ1(τ), σ2s ≤ τ ≤ ρ1,

0, τ > ρ1,(22)

β =

0, τ < σ2

s ,P−1B κ2(τ), σ2

s ≤ τ ≤ ρ2,1, τ > ρ2,

(23)

where

ρ1 , Pmaxr |hrs|2ϕ+ σ2

s , (24)

ρ2 , Pmaxr |hrs|2

(ϕ+

(ϕµ+ 1)Q

µσ2d

)+ σ2

s ,

κ1(τ) , exp

{−ϕµσ2

d|hrs|2

τ − σ2s

},

κ2(τ) , exp

{−(ϕµσ2

d + (ϕµ+ 1)Q)|hrs|2

τ − σ2s

}.

Proof: Considering the maximum power constraint at Runder H0 (i.e., P 0

r ≤ Pmaxr ) and following (6), (16), and (17),

the false alarm rate under the condition B is given by

α = P[

µσ2d

|hrd|2|hrs|2ϕ+ σ2

s ≥ τ∣∣B]

=

1, τ < σ2

s ,

P[

µσ2d

Pmaxr

≤ |hrd|2 ≤ µσ2d|hrs|2ϕτ−σ2

s

]P−1B , σ2

s ≤ τ ≤ ρ1,

0, τ > ρ1.(25)

Then, substituting F|hrd|2(x) = 1 − e−x into the aboveequation (hrs is perfectly known by S and thus it is not arandom variable here) we achieve the desired result in (22).

Considering the maximum power constraint at R under H1

(i.e., P 1r + P∆ ≤ Pmax

r ) and following (16), (17), and (20),the miss detection rate under the condition B is given by

β = P[µ(Q+ σ2

d)|hrs|2ϕ|hrd|2

+Q|hrs|2

|hrd|2+ σ2

s < τ∣∣B]

=

0, τ < σ2

s ,

P[|hrd|2≥

(ϕµ(σ2d+Q)+Q)|hrs|2

τ−σ2s

]P−1B , σ2

s ≤ τ ≤ ρ2,

1, τ > ρ2.(26)

Then, substituting F|hrd|2(x) = 1− e−x into (26) we achievethe desired result in (23).

We note that the false alarm and miss detection rates givenin Theorem 1 are functions of the threshold τ and we nextexamine how S sets the value of τ to minimize its detectionerror probability in the following subsection.

C. Optimization of the Detection Threshold at Source

In this subsection, we derive the optimal value of the detec-tion threshold τ that minimizes the detection error probabilityξ for the rate-control transmission scheme.

Theorem 2: The optimal threshold that minimizes ξ for therate-control transmission scheme is given by

τ∗ =

{ρ1, τ ‡ ≤ σ2

s ,min

{τ ‡, ρ1

}, τ ‡ > σ2

s ,(27)

where

τ ‡ , (ϕµ+ 1)Q|hrs|2

ln(

ω1

1−ω1

(1 + (ϕµ+1)Q

ϕµσ2d

)) + σ2s , (28)

ω1 , 1

2exp

{− (µ+ 1)Q

Pmaxr

}. (29)

Proof: As discussed before, S will perform detectionwhenever condition B is met and R can transmit covertmessage when condition C is guaranteed. In our work, weassume that R will transmit a covert message with probability50% when C is true. As per (7) and (21), the probabilityP(H1) is given by

P(H1) =1

2P[C∣∣B] = ω1. (30)

Then, P(H0) is given by

P(H0) = 1− P(H1) = 1− ω1. (31)

Page 7: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 7

Since ρ2 > ρ1 as given in Theorem 1, following (22) and(23), we have the detection error probability at S as

ξ =

1− ω1, τ ≤ σ2

s ,1−ω1−P−1

B [(1−ω1)κ1(τ)−ω1κ2(τ)], σ2

s < τ ≤ ρ1,ω1P−1

B κ2(τ), ρ1 ≤ τ < ρ2,ω1, τ ≥ ρ2.

(32)

We first note that ξ = 1 − ω1 or ω1 are the worst casefor S and thus S does not set τ ≤ σ2

s or τ > ρ2. Following(32), we derive the first derivative of ξ with respect to τ whenρ1 ≤ τ < ρ2 as

∂(ξ)

∂τ=

ω1P−1B

(ϕµ

(σ2d +Q

)+Q

)|hrs|2

(τ − σ2s)

2κ2(τ) > 0. (33)

This demonstrates that ξ is an increasing function of τ whenρ1 ≤ τ < ρ2. Thus, S will set ρ1 as the threshold to minimizeξ if ρ1 ≤ τ < ρ2. We next derive the first derivative of ξ withrespect to τ for σ2

s < τ ≤ ρ1 as

∂(ξ)

∂τ=

P−1B |hrs|2

(τ − σ2s)

2

[ω1

(ϕµ

(σ2d +Q

)+Q

)κ2(τ)−

(1− ω1)ϕµσ2dκ1(τ)

]=

ω1P−1B

(ϕµ

(σ2d +Q

)+Q

)|hrs|2κ2(τ)

(τ − σ2s)

2×{

1− (1− ω1)ϕµσ2d

ω1 (ϕµ(σ2d +Q) +Q)

exp

{(ϕµ+ 1)Q|hrs|2

τ − σ2s

}}.

(34)

We note that ω1P−1B

(ϕµ

(σ2d +Q

)+Q

)|hrs|2κ2(τ)/(τ −

σ2s)

2 > 0 due to σ2s < τ and κ2(τ) > 0 as given in Theorem 1.

As such, without the constraint τ ≤ ρ1, the value of τ thatensures ∂(ξ)/∂τ = 0 in (34) is given by τ ‡. We note that∂(ξ)/∂τ < 0, for τ < τ ‡, and ∂(ξ)/∂τ > 0, for τ > τ ‡. Thisis due to the term exp{(ϕµ+ 1)Q|hrs|2/(τ − σ2

s)} in (34)is monotonically decreasing with respect to τ . This indicatesthat τ ‡ minimizes ξ without the constraint τ ≤ ρ1. We alsonote that ξ given in (32) is a not a continuous function ofτ following Theorem 1 when τ ‡ ≤ σ2

s . This is due to that1 − ω1 − P−1

B [(1 − ω1)κ1(τ) − ω1κ2(τ)] is monotonicallyincreasing with respect to τ when τ ‡ ≤ σ2

s . We note thatξ is also monotonically increasing with respect to τ forρ1 ≤ τ < ρ2, thus will lead to ω1 ≥ 1 − ω1. As such, ifτ ‡ ≤ σ2

s , the optimal threshold is τ∗ = ρ1.. If τ ‡ > σ2s ,

following (33) and noting ξ is a continuous function of τ , wecan conclude that the optimal threshold is τ∗ = min

{τ ‡, ρ1

}.

This completes the proof of Theorem 2.

Following Theorem 2, we obtain the minimum detectionerror probability at S in the following corollary.

Corollary 1: The minimum value of ξ at S is

ξ∗ =

(1− ω1)

{1− exp

(µσ2

d

Pmaxr

)×(

1− ϕµσ2d

ϕµσ2d+(ϕµ+1)Q

)×(

ω1

1−ω1

(1 + (ϕµ+1)Q

ϕµσ2d

))− ϕµσ2d

(ϕµ+1)Q

}, τ∗ = τ ‡,

ω1 exp{− (ϕµ+1)Q

ϕPmaxr

}, τ∗ = ρ1.

(35)

Proof: Substituting τ∗ into (32), we obtain the minimumvalue of ξ as ξ∗ = 1− ω1 −P−1

B [(1− ω1)κ1(τ)− ω1κ2(τ)],which completes the proof of Corollary 1.

Based on Theorem 1, Theorem 2, and Corollary 1, we drawthe following useful insights.

Remark 1: We conclude that detection error probability ξ∗

tends to 0 when R’s additional covert power Q approachesinfinity. This follows from (27) for τ∗ = ρ1, since when Q →∞ we have τ ‡ < σ2

s as per (28) and thus τ∗ = ρ1.Remark 2: When the maximum power constraint Pmax

r

approaches infinity, the minimum detection error probabilityξ∗ approaches a fixed value given by

limPmax

b →∞ξ∗ =

1

2

{1−

(1− ϕµσ2

d

ϕµσ2d + (ϕµ+ 1)Q

)︸ ︷︷ ︸

f1(Q)

×

(1 +

(ϕµ+ 1)Q

ϕµσ2d

)− ϕµσ2d

(ϕµ+1)Q

︸ ︷︷ ︸f2(Q)

}. (36)

The result in (36) follows from (27) for τ∗ = τ ‡, sincewhen Pmax

r → ∞ we have ρ1 → ∞ as per (24) and thusρ1 > τ ‡ (then τ∗ = τ ‡). Following (36), we can concludethat ξ∗ monotonically decreases with Q when Pmax

r → ∞.In order to prove this conclusion, we next prove that f2(Q)in (36) monotonically increases with Q, since f1(Q) in(36) is a monotonically increasing function of Q. Defining(ϕµ+ 1)Q/µσ2

d = x, following (35) we have f2(Q) = f2(x),where

f2(x) = (1 + x)−1/x. (37)

In order to determine the monotonicity of f2(x) with respectto x, we derive its first derivative as

∂f2(x)

∂x= exp

{− ln(1 + x)

x

}(1 + x) ln(1 + x)− x

x2(1 + x). (38)

We note that whether ∂f2(x)/∂x > 0 or ∂f2(x)/∂x < 0depends on g(x) , (1+ x) ln(1+ x)− x. As such, we derivethe first derivative of g(x) with respect to x as

∂g(x)

∂x= ln(1 + x). (39)

Noting that x ≥ 0 and ∂g(x)/∂x ≥ 0, we conclude thatg(x) monotonically decreases with x. Then, we have g(x) ≥g(0) = 0 and thus ∂f2(x)/∂x ≥ 0. This leads to that f2(Q)monotonically increases with Q and thus ξ∗ monotonically

Page 8: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 8

decreases with Q for τ∗ = τ ‡.When Pmax

r → ∞, ω1 approaches 1/2 as per (29) and ξ∗ =ω1 − ϵ can be written as(

1− ϕµσ2d

ϕµσ2d + (ϕµ+ 1)Q

)︸ ︷︷ ︸

f1(Q)

(1 +

(ϕµ+ 1)Q

ϕµσ2d

)− ϕµσ2d

(ϕµ+1)Q

︸ ︷︷ ︸f2(Q)

= 2ϵ. (40)

Defining y = ϕµσ2d/((ϕµ+ 1)Q) and following the expres-

sion of f2(Q) in (40), we have

limy→0

f2(Q) = limy→0

(y

y + 1

)y

= 00 = 1. (41)

As per (40), for y → 0 the approximated close-form expres-sion of Qϵ is given by

Qϵ =ϕµσ2

d

(ϕµ+ 1)

(1

1− 2ϵ− 1

). (42)

Remark 3: We have that the minimum detection errorprobability ξ∗ tends to 0 when the data transmission rate Rsd

approaches 0 or infinity. As Rsd → 0, as per (5) we haveµ → 0 and thus τ ‡ → σ2

s (then optimal threshold τ∗ is equalto τ ‡) following (28). Then, from (35) for τ∗ = τ ‡ we can seethat ξ∗ → 0 as µ → 0. As Rsd → ∞, following (5) again wenote that µ will be negative and thus the transmission from Sto D fails, which leads to ξ∗ → 0 as discussed in Section III-A.This result means that there exists an optimal value of Rsd thatmaximizes ξ∗ and thus maximizes the effective covert rate forgiven other system parameters. We will numerically examinethe impact of Rsd on covert communications in Section V.

D. Optimization of Effective Covert Rate

In this section, we examine the effective covert rate achievedin the considered system subject to a covert constraint.

1) Effective Covert Rate: From (11), the SINR of xc at Din the rate-control transmission scheme is given as

γ∆ =P∆|hrd|2

P 1r |hrd|2G2σ2

r + σ2d

=Q

µ(Q+σ2d)

η|hsr|2+1 + σ2d

, (43)

where η , Ps/σ2r . Then, the covert rate achieved by R is

R∆ = log2(1+γ∆). As such, we can see that the covert rate isfixed when Q is fixed as per (43). We next derive the effectivecovert rate, i.e., the covert rate averaged over all realizationsof |hrd|2, in the following theorem.

Theorem 3: The achievable effective covert rate Rc by R inthe rate-control transmission scheme is derived as a functionof Q given by

Rc = R∆PC = log2

1 +Q

µ(Q+σ2d)

η|hsr|2+1 + σ2d

×

exp

{−µσ2

d + µQ+Q

Pmaxr

}. (44)

Based on Theorem 3, we note that Rc is not an increasingfunction of Q and thus R∆, since as Q increases R∆ increasesas per (44) while PC decreases following (21). This indicatesthat there may exists an optimal value of Q that maximizesthe effective covert rate, which motivates our following opti-mization of Q in the considered system model.

2) Maximization of Rc with the Covert Constraint: As per(30) and (31), note that ω1 ≤ 1/2, the covert constraint isgiven by

ξ∗ ≥ min {1− ω, ω} − ϵ = ω1 − ϵ. (45)

Following Theorem 2, the optimal value of Q that maxi-mizes Rc subject to the covert constraint ξ∗ ≥ ω1 − ϵ can beobtained through numerical search, which is given by

Q∗ =argmaxQ

Rc, (46)

s.t. ξ∗ ≥ ω1 − ϵ.

We note that the optimization problem (46) is of one dimen-sion, which can be solved by efficient numerical search. Themaximum value of Rc is then achieved by substituting Q∗ into(44), which is denoted by R∗

c .

IV. POWER-CONTROL TRANSMISSION SCHEME

In this section, we consider the power-control transmissionscheme, in which R transmits a covert message to D witha constant transmit power if possible. Specifically, we firstdetermine R’s transmit power in H1 and then analyze thedetection error probability at S, based on which we also deriveS’s optimal detection threshold. Furthermore, we derive the ef-fective covert rate achieved by the power-control transmissionscheme.

A. Transmit Power at Relay

Following (9), when Csd = Rsd we have

P 1r = µP∆ +

µσ2d

|hrd|2. (47)

We note that Csd = Rsd requires C∗sd ≥ Rsd and thus

|hrd|2 ≥ µσ2d/[P

maxr − (µ+ 1)P∆]. Considering the maxi-

mum power constraint at R (i.e., P 1r + P∆ ≤ Pmax

r underthis case), R has to give up the transmission of the covertmessage (i.e., P∆ = 0) when P 1

r > Pmaxr − P∆ and sets

P 1r the same as P 0

r given in (6). This is due to the fact thatS knows hrs and it can detect the covert transmission withprobability one when the total transmit power of R is greaterthan Pmax

r . Then, the transmit power of xr under H1 for thepower-control transmission scheme is given by

P 1r =

µP∆ +

µσ2d

|hrd|2 , |hrd|2 ≥ µσ2d

Pmaxr −(µ+1)P∆

,µσ2

d

|hrd|2 ,µσ2

d

Pmaxr

≤ |hrd|2 <µσ2

d

Pmaxr −(µ+1)P∆

,

0, |hrd|2 <µσ2

d

Pmaxr

.

(48)

As per (48), we note that R also does not transmit a covertmessage when it cannot support the transmission from S to D(i.e., when |hrd|2 < µσ2

d/Pmaxr ). This is due to the fact that a

Page 9: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 9

transmission outage occurs when |hrd|2 < µσ2d/P

maxr and R

or D would request a retransmission from S, which enables Sto detect R’s covert transmission with probability one if thiscovert transmission happened, since R cannot and thus doesnot forward S’s information to D when |hrd|2 < µσ2

d/Pmaxr .

In summary, R could possibly transmit a covert messagewithout being detected only when the condition |hrd|2 ≥µσ2

d/[Pmaxr − (µ+ 1)P∆] is guaranteed. We again denote this

necessary condition for covert communication as C. NotingF|hrd|2(x) = 1− e−x, the probability that C is guaranteed isgiven by

PC = exp

{− µσ2

d

Pmaxr − (µ+ 1)P∆

}. (49)

We note that PC is a monotonically decreasing function ofP∆, which indicates that the probability that R can transmit acovert message (without being detected with probability one)decreases as P∆ increases. Following (47) and noting P 1

r +P∆ ≤ Pmax

r , we have Pmaxr > (µ+ 1)P∆.

B. Detection Error Probability at Source

In this subsection, we derive S’s false alarm rate, i.e., α =P(D1|H0), and miss detection rate, i.e., β = P(D0|H1).

Theorem 4: When the condition B is guaranteed, for agiven τ , the false alarm and miss detection rates at S arederived as

α =

1, τ < σ2

s ,1−P−1

B κ1(τ), σ2s ≤ τ ≤ ρ1,

0, τ > ρ1,(50)

β =

0, τ < ρ3,P−1B κ3(τ), ρ3 ≤ τ ≤ ρ4,

1, τ > ρ4,(51)

where

ρ3 , (ϕµ+ 1)P∆|hrs|2 + σ2s ,

ρ4 , (Pmaxr ϕ+ (ϕµ+ 1)P∆) |hrs|2 + σ2

s ,

κ3(τ) , exp

{−ϕµσ2

d|hrs|2

τ − ρ3

},

and ρ1 and κ1(τ) are defined in (24).Proof: Considering the maximum power constraint at R

under H0 (i.e., P 0r ≤ Pmax

r ) and following (6), (16), and (17),the false alarm rate under the condition B is given by

α = P[

µσ2d

|hrd|2|hrs|2ϕ+ σ2

s ≥ τ∣∣B]

=

1, τ < σ2

s ,

P[

µσ2d

Pmaxr

≤|hrd|2≤ µσ2d|hrs|2ϕτ−σ2

s

]P−1B , σ2

s ≤ τ ≤ ρ1,

0, τ > ρ1.(52)

Then, substituting F|hrd|2(x) = 1 − e−x into the aboveequation we achieve the desired result in (50).

We first clarify that we have ρ3 < ρ4. Then, considering themaximum power constraint at R under H1 (i.e., P 1

r + P∆ ≤

Pmaxr ) and following, (16), (17), and (48), the miss detection

rate under the condition B is given by

β = P[(

µP∆ +µσ2

d

|hrd|2

)|hrs|2ϕ+ P∆|hrs|2 + σ2

s < τ∣∣B]

=

0, τ < ρ3,

P[|hrd|2≥ ϕµσ2

d|hrs|2τ−(ϕµ+1)P∆|hrs|2−σ2

s

]P−1B , ρ3 ≤ τ ≤ ρ4,

1, τ > ρ4.(53)

Then, substituting F|hrd|2(x) = 1 − e−x into the aboveequation we achieve the desired result in (51).

We note that the false alarm and miss detection rates givenin Theorem 4 are functions of the threshold τ and we examinehow S sets the value of τ to minimize its detection errorprobability in the following subsection.

C. Optimization of the Detection Threshold at Source

In this subsection, we first derive a constraint (i.e., an upperbound) on P∆ to ensure a non-zero detection error probabilityat S. Then, under this constraint we derive the lower and upperbounds on the optimal value of τ that minimizes the detectionerror probability ξ for the power-control transmission scheme.

Theorem 5: R’s transmit power of the covert message P∆

should satisfy

P∆ ≤ Pu∆ , ϕPmax

r

ϕµ+ 1(54)

in order to guarantee ξ > 0 and when (54) is guaranteed theoptimal τ at S that minimizes ξ should satisfy ρ3 ≤ τ∗ ≤ ρ1.

Proof: As discussed before, S will perform detectionwhenever condition B is met. In our work, we assume thatR will transmit a covert message with probability 50% whenC is guaranteed. As per (7) and (49), the probability P(H1)is given by

P(H1) =1

2P(C

∣∣B) = ω2, (55)

where

ω2 , 1

2exp

{− µ(µ+ 1)σ2

dP∆

(Pmaxr (Pmax

r − (µ+ 1)P∆))

}. (56)

Then, P(H0) is given by

P(H0) = 1− P(H1) = 1− ω2. (57)

When ρ1 < ρ3 that requires P∆ > ϕPmaxr /(ϕµ+1) as per

Theorem 4, following (50) and (51), we have

ξ =

1− ω2, τ ≤ σ2

s ,(1− ω2)

(1− P−1

B κ1(τ)), σ2

s < τ < ρ1,0, ρ1 ≤ τ ≤ ρ3,ω2P−1

B κ3(τ), ρ3 < τ < ρ4,ω2, τ ≥ ρ4.

(58)

This indicates that S can simply set τ ∈ [ρ1, ρ3] to ensureξ = 0 when P∆ > ϕPmax

r /(ϕµ + 1), i.e., S can detect thecovert transmission with probability one. As such, P∆ shouldsatisfy (54) in order to guarantee ξ > 0.

Page 10: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 10

We next prove ρ3 ≤ τ∗ ≤ ρ1. When P∆ ≤ ϕPmaxr /(ϕµ +

1), i.e., ρ3 < ρ1, following (50) and (51), we have

ξ =

1− ω2, τ ≤ σ2s ,

(1− ω2)(1− P−1

B κ1(τ)), σ2

s < τ ≤ ρ3,1− ω2 − P−1

B ×[(1− ω2)κ1(τ)− ω2κ3(τ)] , ρ3 < τ < ρ1,ω2P−1

B κ3(τ), ρ1 ≤ τ < ρ4,ω2, τ ≥ ρ4.

(59)

Obviously, S will not set τ ≤ σ2s or τ ≥ ρ4, since ξ = 1−ω1

or ω1 are the worst case for S.For σ2

s < τ ≤ ρ3, we derive the first derivative of ξ withrespect to τ as

∂(ξ)

∂τ= −

(1− ω2)P−1B ϕµσ2

d|hrs|2

(τ − σ2s)

2κ1(τ) < 0. (60)

This demonstrates that ξ is a decreasing function of τ whenσ2s < τ ≤ ρ3. For ρ1 ≤ τ < ρ4, we derive the first derivative

of ξ with respect to τ as

∂(ξ)

∂τ=

ω2P−1B ϕµσ2

d|hrs|2

(τ − ρ3)2κ3(τ) > 0. (61)

This proves that ξ is an increasing function of τ whenρ1 ≤ τ < ρ4. Noting that ξ is a continuous function of τ andconsidering (60) and (61), we can conclude that τ∗ shouldsatisfy ρ3 ≤ τ∗ ≤ ρ1, no mater what is the value of ξ forρ3 < τ < ρ1.

The lower and upper bounds on τ∗ given in Theorem 5significantly facilitate the numerical search for τ∗ at S. Then,following Theorem 5 and (59), τ∗ can be obtained through

τ∗ = argminρ3≤τ≤ρ1

{1− ω2 − P−1

B [(1− ω2)κ1(τ)− ω2κ3(τ)]}.

(62)

Substituting τ∗ into (59), we can obtain the minimum detec-tion error probability ξ∗ for the power-control transmissionscheme.

D. Optimization of Effective Covert RateIn this section, we examine the effective covert rate achieved

by the power-control transmission scheme subject to the covertconstraint.

1) Effective Covert Rate: Following (11), the SINR atdestination for covert communication is given as

γ∆ =P∆|hrd|2

P 1r |hrd|2G2σ2

r + σ2d

=P∆(η|hsr|2 + 1)|hrd|2

µP∆|hrd|2 + (η|hsr|2 + µ+ 1)σ2d

. (63)

Then, the covert rate achieved by R is R∆ = log2(1+γ∆). Wenext derive the effective covert rate, i.e., averaged R∆ over allrealizations of |hrd|2, in the following theorem.

Theorem 6: The achievable effective covert rate Rc by Rwith the power-control transmission scheme is derived as afunction of P∆ given by

Rc =1

ln 2exp

{− µσ2

d

Pmaxr − (µ+ 1)P∆

}×[

ln

(β1

β2

)+ e

β2α2 Ei

(−β2

α2

)− e

β1α1 Ei

(−β1

α1

)], (64)

where

β1 , [η|hsr|2 + µ+ 1](Pmaxr − P∆)σ

2d,

β2 ,{

η|hsr|2 + µ+ 1

[Pmaxr − (µ+ 1)P∆]−1

+ µ2P∆

}σ2d,

α1 , P∆

[η|hsr|2 + (µ+ 1)

][Pmax

r − (µ+ 1)P∆] ,

α2 , µP∆[Pmaxr − (µ+ 1)P∆],

and the exponential integral function Ei(·) is given by

Ei(x) = −∫ ∞

−x

e−t

tdt, [x < 0]. (65)

Proof: A positive covert rate is only achievable under thecondition C and thus Rc is given by

Rc =

∫ ∞

µσ2d

Pmaxr −(µ+1)P∆

R∆f(|hrd|2)d|hrd|2

a=

1

ln 2exp

{− µσ2

d

Pmaxr − (µ+ 1)P∆

}×∫ ∞

0

ln

(β1 + α1x

β2 + α2x

)e−xdx, (66)

where a= is achieved by setting x = |hrd|2 −

µσ2d/[P

maxr − (µ+ 1)P∆]. We then solve the integral in (66)

with the aid of [32, Eq. (4.337.1)]∫ ∞

0

e−νx ln(θ + x)dx =1

ν

[ln θ + eνθEi(−θν)

], (67)

and achieve the result given in (64).Based on Theorem 6, we note that Rc is not an increasing

function of P∆, since as P∆ increases R∆ increases butPC (i.e., the probability that the condition C is guaranteed)decreases. This motivates our following optimization of P∆

in order to maximize the effective covert rate subject to thecovert constraint.

2) Maximization of Rc with the Covert Constraint: As per(55) and (57), note that ω2 ≤ 1/2, the covert constraint isgiven by

ξ∗ ≥ min {1− ω, ω} − ϵ = ω2 − ϵ. (68)

Following Theorem 5 the optimal value of P∆ that maxi-mizes Rc subject to this constraint can be obtained through

P ∗∆ = argmax

0≤P∆≤Pu∆

Rc (69)

s.t. ξ∗ ≥ ω2 − ϵ.

We note that this is a two-dimensional optimization problemthat can be solved by efficient numerical searches. Specifically,for each given P∆, ξ∗ should be obtained based on (62) whereτ∗ is also numerically searched. We note that the numericalsearch of P ∗

∆ and τ∗ is efficient since their lower and upperbounds are explicitly given. The maximum value of Rc isdenoted by R∗

c .

Page 11: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 11

-10 -5 0 5 10 15 20 25 30

0

0.1

0.2

0.3

0.4

0.5

0 0.5 1 1.5 2

0

0.1

0.2

0.3

0.4

0.5

Fig. 2. (a) ξ∗ versus Pmaxr with different value of σ2

d for the rate-control transmission scheme, where Ps = 10 dB, σ2

r = 0 dB, Rsd =1 bits per channel use, |hsr|2 = |hrs|2 = 1, and Q = 0.1. (b) ξ∗ versusRsd with different value of σ2

d for the rate-control transmission scheme, wherePs = Pmax

r = 10 dB, σ2r = 0 dB, |hsr|2 = |hrs|2 = 1, and Q = 0.1.

V. NUMERICAL RESULTS

In this section, we first present numerical results to verifyour analysis on the performance of covert communicationsin relay networks. Then, we provide a thorough performancecomparison between the rate-control and power-control trans-mission schemes. Based on our examination, we draw manyuseful insights with regard to the impact of some systemparameters (e.g., Pmax

r , Rsd, and ϵ ) on covert communicationsin wireless relay networks.

A. Rate-Control Transmission Scheme

In Fig. 2 (a), we plot the minimum detection error prob-ability ξ∗ versus R’s maximum transmit power Pmax

r andobserve that ξ∗ increases with Pmax

r . This shows that thecovert transmission becomes easier as the desired performanceof the normal transmission increases, since the transmissionoutage probability decreases with Pmax

r for a fixed Rsd. Wealso observe ξ∗ approach to a specific value as Pmax

r → ∞,which is discussed in Remark 2. This observation demonstratesthat the covert transmission can still be possibly detected byS even without the maximum power constraint at R. In Fig. 2(b), we plot ξ∗ versus the transmission rate from S to D (i.e.,Rsd). We first observe that ξ∗ is not a monotonic functionof Rsd and ξ∗ → 0 as Rsd → 0 or Rsd → ∞. Thisobservation indicates that there may exist an optimal valueof Rsd that maximizes ξ∗. In Fig. 2, we finally observe thatξ∗ is a monotonic increasing function of σ2

d.

B. Power-Control Transmission Scheme

In Fig. 3 (a), we plot the minimum detection error prob-ability ξ∗ versus R’s maximum transmit power Pmax

r andobserve that ξ∗ increases with Pmax

r . This shows that the

0 5 10 15 20

0

0.1

0.2

0.3

0.4

0.5

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

0

0.1

0.2

0.3

0.4

0.5

Fig. 3. (a) ξ∗ versus Pmaxr with different value of σ2

d for the power-control transmission scheme, where Ps = 10 dB, σ2

r = 0 dB, Rsd =1 bits per channel use, |hsr|2 = |hrs|2 = 1, and P∆ = −10 dB. (b)ξ∗ versus Rsd with different value of σ2

d for the power-control transmissionscheme, where Ps = Pmax

r = 10 dB, σ2r = 0 dB, |hsr|2 = |hrs|2 = 1,

and P∆ = −10 dB.

covert transmission becomes easier as the desired performanceof the normal transmission increases, since the transmissionoutage probability decreases with Pmax

r for a fixed Rsd.We also observe ξ∗ does not approach 1/2 (but a specificvalue that is lower than 1/2) as Pmax

r → ∞, which is thesame as the result discussed in Remark 2 for the rate-controltransmission scheme. This observation demonstrates that thecovert transmission can still be possibly detected by S evenwithout the maximum power constraint at R. Fig. 3 (b), weplot ξ∗ versus the transmission rate from S to D (i.e., Rsd). Wefirst observe that ξ∗ is not a monotonic function of Rsd andξ∗ → 0 as Rsd → 0 or Rsd → ∞. This observation indicatesthat there may exist an optimal value of Rsd that maximizesξ∗. In Fig. 3, we finally observe that ξ∗ is not a monotonicfunction of σ2

d.

C. Performance Comparisons between the Rate-Control andPower-Control Transmission Schemes

Fig. 4 illustrates R∗c versus Pmax

r with different values of Ps

for the rate-control and power-control transmission schemesusing (46) and (69), respectively. In this figure, we first observethat for both schemes R∗

c monotonically increases as Pmaxr in-

creases, which demonstrates that the covert message becomeseasier to be transmitted when more power is available at R.we also observe that R∗

c is not a monotonic function of Ps. InFig. 4, it illustrates that the power-control transmission schemeoutperforms the rate-control transmission scheme when Pmax

r

is in the low regime. However, when Pmaxr is larger than some

specific values (e.g., when Pmaxr ≥ 13 dB), the performance

of rate-control transmission scheme is better than that of thepower-control transmission scheme. This is mainly due tothe fact that the transmit power constraints are not limits of

Page 12: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 12

0 5 10 15 20 25 30

0

0.05

0.1

0.15

0.2

Fig. 4. R∗c versus Pmax

r under different value of Ps, where σ2r = σ2

d =0 dB, ϵ = 0.1, Rsd = 1 bits per channel use, and |hsr|2 = 1.

5 10 15 20 25 30

0

0.05

0.1

0.15

0.2

Fig. 5. R∗c versus Ps under different value of Pmax

r , where σ2r = σ2

d =0 dB, ϵ = 0.1, and Rsd = 1.5 bits per channel use.

the covert transmission when Pmaxr is large, and thus under

this case selecting a proper covert transmission rate (in therate-control transmission scheme) can gain more benefit. Wenote that this observation demonstrates the significance of ourwork, since with our analysis R can easily determine whichtransmission is better under the specific system settings.

In Fig. 5, we plot the averaged maximum effective covertrate, i.e., R∗

c , which is achieved by averaging R∗c over |hsr|2,

versus S’s transmit power Ps with different values of R’smaximum transmit power Pmax

r . In this figure, we first observethat R∗

c is zero when Ps is effectively small (e.g., due to thefact that S is far from R and D). This is due to the fact thatwhen Ps is sufficient small, the normal transmission fromS to D with the fixed rate Rsd may not be supported and

R does not forward S’s information to D. Meanwhile, thecovert transmission from R to D cannot be achieved due tothe lack of the shield from the normal transmission. We alsoobserve that R∗

c → 0 when Ps → ∞. This is due to thefact that ϕ given in (17) decreases (and thus P 0

r |hrs|2ϕ andP 1r |hrs|2ϕ decrease) with Ps, which leads to a lower detection

error probability at S as per (35) and (62) (i.e., it becomeseasier for S to detect the covert transmission). In Fig. 5, wefurther observe that the achieved R∗

c decreases significantlyas Pmax

r decreases (e.g., when R is with less transmit powerthan S), which demonstrates that it is the power constraint at Rthat mainly limits the performance of the covert transmission.Based on this observation, we can predict that R∗

c → 0 whenPmaxr → 0. This is due to the fact that as Pmax

r → 0 Rcannot support the normal transmission from S to D, not tomention the covert transmission from itself to D (due to thelack of the shield). Finally, we observe that the power-controltransmission scheme outperforms the rate-control transmissionscheme when Ps or Pmax

r is low. This observation is consistentwith that found in Fig. 4.

VI. CONCLUSION

This work examined covert communication in one-wayrelay networks over quasi-static Rayleigh fading channels, inwhich R opportunistically transmits its own information tothe destination covertly on top of forwarding S’s messagein AF mode, while S tries to detect this covert transmission.Specifically, we proposed the rate-control and power-controltransmission schemes for R to convey covert information toD. We analyzed S’s detection limits of the covert transmissionfrom R to D in terms of the detection error probability anddetermined the achievable effective covert rates subject to ξ∗ ≥min{1 − ω, ω} − ϵ for these two schemes. Our examinationshowed that the rate-control transmission scheme outperformsthe power-control transmission scheme under some specif-ic conditions, and otherwise the power-control transmissionscheme outperforms the rate-control transmission scheme. Assuch, our conducted analysis enabled R to switch betweenthese two strategies to achieve the maximum covert rate. Ourinvestigation also demonstrated that covert communication inthe considered relay networks is feasible and the effectivecovert rate achieved by R increases with its forwarding ability.

REFERENCES

[1] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication inwireless relay networks,” in Proc. IEEE GLOBECOM, Dec. 2017, pp.1–6.

[2] M. Bloch and J. Barros, Physical-Layer Security: From InformationTheory to Security Engineering. Cambridge University Press, 2011.

[3] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in WirelessCommunications. CRC Press, 2013.

[4] N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land,“Artificial noise: Transmission optimization in multi-input single-outputwiretap channels,” IEEE Trans. Commun., vol. 63, no. 5, pp. 1771–1783,May 2015.

[5] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook ofApplied Cryptography. CRC Press, 1996.

[6] J. Talbot and D. Welsh, Complexity and Cryptography: An Introduction.Cambridge University Press, 2006.

[7] S. Yan and R. Malaney, “Location-based beamforming for enhancingsecrecy in rician wiretap channels,” IEEE Trans. Wireless Commun.,vol. 15, no. 4, pp. 2780–2791, Apr. 2016.

Page 13: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 13

[8] Y. Deng, L. Wang, S. A. R. Zaidi, J. Yuan, and M. Elkashlan, “Aritificial-noise aided secure transmission in large scale spectrum sharing net-works,” IEEE Trans. Commun., vol. 64, no. 5, pp. 2116–2129, May2016.

[9] S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificial-noise-aided secure transmission in wiretap channels with transmitter-sidecorrelation,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8286–8297, Dec. 2016.

[10] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, “Artificial-noise-aided secure transmission with directional modulation based on randomfrequency diverse arrays,” IEEE Access, vol. 5, pp. 1658–1667, Jan.2017.

[11] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing thephysical layer security of non-orthogonal multiple access in large-scalenetworks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Mar. 2017.

[12] A. Mukherjee, “Physical-layer security in the internet of things: Sensingand communication confidentiality under resource constraints,” Proceed-ings of the IEEE, vol. 103, no. 10, pp. 1747–1761, Oct. 2015.

[13] P. H. Che, S. Kadhe, M. Bakshi, C. Chan, S. Jaggi, and A. Sprintson,“Reliable, deniable and hidable communication: A quick survey,” inProc. IEEE Inf. Theory Workshop, Nov. 2014, pp. 227–231.

[14] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding informationin noise: fundamental limits of covert wireless communication,” IEEECommun. Mag., vol. 53, no. 12, pp. 26–31, Dec. 2015.

[15] M. Bloch, “Covert communication over noisy channels: A resolvabilityperspective,” IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2334–2354,May 2016.

[16] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, SpreadSpectrum Communications Handbook, 1st ed. McGraw-Hill, 1994.

[17] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communi-cation with low probability of detection on AWGN channels,” IEEE J.Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.

[18] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication:Hiding messages in noise,” in Proc. IEEE Int. Symp. Inf. Theory, Jul.2013, pp. 2945–2949.

[19] L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits ofcommunication with low probability of detection,” IEEE Trans. Inf.Theory, vol. 62, no. 6, pp. 3493–3503, Jun. 2016.

[20] A. Abdelaziz and C. E. Koksal, “Fundamental limits of covert commu-nication over MIMO AWGN channel,” arXiv preprint, pp. 1–20, May2017, arXiv:1705.02303v3.

[21] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. T. Walkenhorst, “Achievingundetectable communication,” IEEE J. Sel. Topics Signal Process.,vol. 9, no. 7, pp. 1195–1205, Oct. 2015.

[22] B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communicationwith noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–944, Apr. 2017.

[23] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covertcommunication in the presence of an uninformed jammer,” IEEE Trans.Wireless Commun., vol. 16, no. 9, pp. 6193–6206, Sep. 2017.

[24] D. Goeckel, B. A. Bash, S. Guha, and D. Towsley, “Covert communi-cations when the warden does not know the background noise power,”IEEE Commun. Lett., vol. 20, no. 2, pp. 236–239, Feb. 2016.

[25] K. Shahzad, X. Zhou, and S. Yan, “Covert communication in fadingchannels under channel uncertainty,” in Proc. IEEE VTC Spring, Jun.2017, pp. 1–5.

[26] S. Yan, B. He, Y. Cong, and X. Zhou, “Covert communication withfinite blocklength in AWGN channels,” in Proc. IEEE ICC, May 2017,pp. 1–6.

[27] N. Provos and P. Honeyman, “Hide and seek: An introduction tosteganography,” IEEE Security Privacy, vol. 99, no. 3, pp. 32–44, May2003.

[28] T. Cui and C. Tellambura, “Power delay profile and noise varianceestimation for OFDM,” IEEE Commun. Lett., vol. 10, no. 1, pp. 25–27, Apr. 2006.

[29] M. Molu and N. Goertz, “An analytical approach to the outage proba-bility of amplify-and-forward relaying with an MRC receiver,” in Proc.IEEE VTC Spring, Jun. 2013, pp. 1–5.

[30] Y. Deng, K. J. Kim, T. Q. Duong, M. Elkashlan, G. K. Karagiannidis,and A. Nallanathan, “Full-duplex spectrum sharing in cooperative singlecarrier systems,” IEEE Trans. Cogn. Commun. and Netw., vol. 2, no. 1,pp. 68–82, Mar. 2016.

[31] M. H. DeGroot, Probability and Statistics, 4th ed. Pearson, 2011.[32] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and

Products, 7th ed. Academic Press, 2007.

Jinsong Hu received the B.S. degree from the Nan-jing University of Science and Technology, Nanjing,China, in 2013. He is currently pursuing the Ph.D.degree with the School of Electronic and OpticalEngineering, Nanjing University of Science andTechnology, Nanjing, China. He is also a VisitingPh.D. Student with the Australian National Universi-ty from 2017 to 2018. His research interests includearray signal processing, covert communications, andphysical layer security.

Shihao Yan (S’11-M’15) received the Ph.D degreein Electrical Engineering from The University ofNew South Wales, Sydney, Australia, in 2015. Hereceived the B.S. in Communication Engineeringand the M.S. in Communication and InformationSystems from Shandong University, Jinan, China, in2009 and 2012, respectively. From 2015 to 2017,he was a Postdoctoral Research Fellow in the Re-search School of Engineering, The Australia Na-tional University, Canberra, Australia. He is current-ly a University Research Fellow in the School of

Engineering, Macquarie University, Sydney, Australia. His current researchinterests are in the areas of wireless communications and statistical signalprocessing, including physical layer security, covert communications, andlocation spoofing detection.

Xiangyun Zhou (SM’17) is a Senior Lecturer at theAustralian National University (ANU). He receivedthe Ph.D. degree from ANU in 2010. His research in-terests are in the fields of communication theory andwireless networks. He has been serving as an Editorfor various IEEE journals, including IEEE TRANS-ACTIONS ON WIRELESS COMMUNICATIONS,IEEE WIRELESS COMMUNICATIONS LETTER-S and IEEE COMMUNICATIONS LETTERS. Heserved as a guest editor for IEEE COMMUNI-CATIONS MAGAZINE’s feature topic on wireless

physical layer security in 2015. He also served as symposium/track andworkshop co-chairs for major IEEE conferences. He was the chair of theACT Chapter of the IEEE Communications Society and Signal ProcessingSociety from 2013 to 2014. He is a recipient of the Best Paper Award atICC’11 and IEEE ComSoc Asia-Pacific Outstanding Paper Award in 2016.He was named the Best Young Researcher in the Asia-Pacific Region in 2017by IEEE ComSoc Asia-Pacific Board.

Feng Shu was born in 1973. He received thePh.D., M.S., and B.S. degrees from the SoutheastUniversity, Nanjing, in 2002, XiDian University,Xian, China, in 1997, and Fuyang teaching College,Fuyang, China, in 1994, respectively. From Sept.2009 to Sept. 2010, he is a visiting post-doctorat the University of Texas at Dallas. In October2005, he joined the School of Electronic and Op-tical Engineering, Nanjing University of Science andTechnology, Nanjing, China, where he is currentlya Professor and supervisor of Ph.D and graduate

students. He is also with Fujian Agriculture and Forestry University andawarded with Mingjian Scholar Chair Professor in Fujian Province. Hisresearch interests include wireless networks, wireless location, and array signalprocessing. He has published about 200 papers, of which more than 100 are inarchival journals including more than 40 papers on IEEE Journals and morethan 70 SCI-indexed papers. He holds six Chinese patents.

Page 14: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert … · 2018-08-28 · Transactions on Wireless Communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Covert Communication

1536-1276 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2018.2831217, IEEETransactions on Wireless Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 14

Jun Li (M’09-SM’16) received the Ph.D. degreein electronic engineering from Shanghai Jiao TongUniversity, Shanghai, China, in 2009. From January2009 to June 2009, he was with the Department ofResearch and Innovation, Alcatel Lucent ShanghaiBell, as a Research Scientist. Since 2015, he is withthe School of Electronic and Optical Engineering,Nanjing University of Science and Technology, Nan-jing, China. His research interests include networkinformation theory, channel coding theory, wirelessnetwork coding, and cooperative communications.

Jiangzhou Wang (F’17) is currently Head of theSchool of Engineering and Digital Arts and a Pro-fessor at the University of Kent, United Kingdom.He has authored over 300 papers in internationaljournals and conferences in the areas of wirelessmobile communications and three books. He is anIEEE Fellow and IET Fellow. He received the BestPaper Award from IEEE GLOBECOM2012 and wasan IEEE Distinguished Lecturer from 2013 to 2014.He is the Technical Program Chair of IEEE ICC2019in Shanghai. He was the Executive Chair of IEEE

ICC2015 in London and the Technical Program Chair of IEEE WCNC2013.He was an Editor for IEEE Transactions on Communications from 1998to 2013 and was a Guest Editor for IEEE Journal on Selected Areasin Communications, IEEE Communications Magazine, and IEEE WirelessCommunications. His research interests include massive MIMO, Cloud RAN,NOMA, D2D, and secure communications.