Abstract
To prevent detection of communication between legitimate users by warden and guarantee a strong security in wireless networks, covert communication technique is recommended. The covert communication is based on hiding the main message in the background of noise which poses challenges such as low transmission rate. On the other hand, the transmit power in the conventional networks is supplied by separate built-in batteries, which are sometimes hard to be recharged or replaced especially in the military applications. In this work, to tackle the low transmission rate, we employ three dimensions beamforming in which we can focus the main beam on the legitimate user and minimize the leakage information at the warden. Moreover, in the proposed network, we intend to employ cooperative jamming (CJ) to increase covert rat in which the jammer is equipped to multiple antennas. Furthermore, to tackle the recharging or replacing batteries in the proposed network, we employ the energy harvesting (EH) technique. The simulation results reveal that the energy harvesting from the jammer’s signal reduce the total power consumption. Moreover, the simulation results show that the optimality gap is about 50% according to energy harvesting technique, and the 3D beamforming increases covert rate about 70% compared to two-dimensional beamforming method.
Similar content being viewed by others
References
Wang, D., et al. (2018). From IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and 5G technologies. IEEE Communications Magazine, 56(10), 114–120.
Lu, X., et al. (2021). Secure wirelessly powered networks at the physical layer: Challenges, countermeasures, and road ahead. Proceedings of the IEEE, 110(1), 193–209.
Zhang, Y., et al. (2017). Security optimization of exposure region-based beamforming with a uniform circular array. IEEE Transactions on Communications, 66(6), 2630–2641.
Cao, Y., et al. (2019). Secure transmission via beamforming optimization for NOMA networks. IEEE Wireless Communications, 27(1), 193–199.
Yu, X., et al. (2020). Robust and secure wireless communications via intelligent reflecting surfaces. IEEE Journal on Selected Areas in Communications, 38(11), 2637–2652.
Chen, X., et al. (2020). Securing aerial-ground transmission for NOMA-UAV networks. IEEE Network, 34(6), 171–177.
Zheng, T.-X., et al. (2021). Wireless covert communications aided by distributed cooperative jamming over slow fading channels. IEEE Transactions on Wireless Communications, 20(11), 7026–7039.
Bendary, A., Abdelaziz, A., & Koksal, C. E. (2021). Achieving positive covert capacity over MIMO AWGN channels. IEEE Journal on Selected Areas in Information Theory, 2(1), 149–162.
Forouzesh, M., et al. (2020). Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Transactions on Communications, 68(6), 3737–3749.
Chen, X., et al. (2021). Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations. IEEE Transactions on Wireless Communications, 20(8), 5467–5480.
Lv, L., et al. (2022). Achieving covert wireless communication with a multi-antenna relay. IEEE Transactions on Information Forensics and Security, 17, 760–773.
Hu, J., et al. (2018). Covert communication achieved by a greedy relay in wireless networks. IEEE Transactions on Wireless Communications, 17(7), 4766–4779.
Ren, Q., & Yao, G. (2021). Enhancing harvested energy utilization for energy harvesting wireless sensor networks by an improved uneven clustering protocol. IEEE Access, 9, 119279–119288.
Vignesh, S., et al. (2021). Analysis on energy harvesting techniques for underwater wireless sensor networks. In: 2021 Third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE.
Sharma, P., & Singh, A. K. (2021). Compact ambient RF energy harvesting CPW Fed Antenna for WLAN. In: 2021 5th international conference on trends in electronics and informatics (ICOEI). IEEE.
Zhao, B., & Zhao, X. (2021). Deep reinforcement learning resource allocation in wireless sensor networks with energy harvesting and relay. IEEE Internet of Things Journal, 9(3), 2330–2345.
Mortazavi, S. M., Ashtiani, F., & Mirmohseni, M. (2020). Optimal energy sharing for cooperative relaying in a random access network with energy harvesting nodes. IEEE Transactions on Green Communications and Networking, 5(1), 231–242.
Xu, S., & Song, X. (2022). Secure energy efficiency maximization for untrusted wireless-powered full-duplex relay networks under nonlinear energy harvesting. IEEE Systems Journal.
Gouissem, A., et al. (2022). A secure energy efficient scheme for cooperative IoT networks. IEEE Transactions on Communications.
Hu, J., et al. (2019). Covert transmission with a self-sustained relay. IEEE Transactions on Wireless Communications, 18(8), 4089–4102.
Yoon, I., & Noh, D. K. (2022). Adaptive data collection using UAV with wireless power transfer for wireless rechargeable sensor networks. IEEE Access, 10, 9729–9743.
Ruan, T., Chew, Z. J., & Zhu, M. (2017). Energy-aware approaches for energy harvesting powered wireless sensor nodes. IEEE Sensors Journal, 17(7), 2165–2173.
Chew, Z. J., Ruan, T., & Zhu, M. (2020). Energy savvy network joining strategies for energy harvesting powered TSCH nodes. IEEE Transactions on Industrial Informatics, 17(2), 1505–1514.
Shiu, Y.-S., et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.
Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.
Tao, L., et al. (2021). Achieving covert communication in uplink NOMA systems via energy harvesting jammer. IEEE Communications Letters, 25(12), 3785–3789.
Sobers, T. V., Bash, B. A., Guha, S., Towsley, D., & Goeckel, D. (2017). Covert communication in the presence of an uninformed jammer. IEEE Transactions on Wireless Communications, 16(9), 6193–6206.
Wang, H.-M., Yin, Q., Wang, W., & Xia, X.-G. (2013). Joint null-space beamforming and jamming to secure AF relay systems with individual power constraint. In: 2013 IEEE international conference on acoustics, speech and signal processing (pp. 2911−2914). IEEE.
Grant, M., & Boyd, S. (2014). “CVX: Matlab software for disciplined convex programming, version 2.1,” ed.
Luo, Z.-Q., Ma, W.-K., So, A.M.-C., Ye, Y., & Zhang, S. (2010). emidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27(3), 20–34.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Azerang, S.F., Samsami Khodadad, F. & Forouzesh, M. Covert communication based on energy harvesting and cooperative jamming. Wireless Netw 28, 3729–3738 (2022). https://doi.org/10.1007/s11276-022-03082-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03082-x