Unlock instant, AI-driven research and patent intelligence for your innovation.

A Robust Beamforming Design Method for Non-ideal WCSI Covert Communications

A covert communication and beamforming technology, applied in secure communication, electrical components, radio transmission systems, etc.

Active Publication Date: 2022-02-08
CHINA UNIV OF MINING & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although practical covert communication has been studied for decades through the study of spread spectrum techniques [3], the information-theoretic limits of covert communication were only recently derived [4]-[6]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Robust Beamforming Design Method for Non-ideal WCSI Covert Communications
  • A Robust Beamforming Design Method for Non-ideal WCSI Covert Communications
  • A Robust Beamforming Design Method for Non-ideal WCSI Covert Communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] In the present invention, the following notation is adopted: bold lowercase letters and uppercase letters represent vectors and matrices respectively. Re(·) and Im(·) denote the real and imaginary parts of their arguments, respectively. with mean μ and variance σ 2 The complex-valued circularly symmetric Gaussian distribution is obtained by using To represent.

[0146] Scenarios considered by the present invention are as figure 1 As shown, Alice (base station) has been sending data stream x to Carol (regular user) c , and in private stream x b sent to Bob, where represents the null hypothesis that Alice does not send private streams to Bob, and Denotes an alternative assumption that Alice sends a private stream of data to Bob. At the same time, Willie is observing the communication environment as an eavesdropper and trying to identify whether Alice is transmitting to Bob; Alice can use the transmission to Carol as a cover to achieve covert communication. It...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a robust beamforming design method for non-ideal WCSI (Willie's Channel State Information) covert communication, considering a general unicast beamforming network, the present invention studies Alice's beamformer design, which can maximize Bob's covert rate. For non-ideal WCSI, relaxation and constraint based methods form robust beamformers. Willie's optimal decision threshold is derived, and the false positive and missed detection probabilities in this case are analyzed.

Description

technical field [0001] The present invention relates to a robust beamforming design method for non-ideal WCSI (Willie's Channel State Information) covert communication. Background technique [0002] Due to the nature of wireless communication and its broadcasting, it is vulnerable to malicious security attacks. By utilizing encryption and key exchange techniques, traditional security methods focus on preventing transmitted wireless signal forms from being decoded by unintentional users [1], but not hiding them. For many wireless scenarios, such as law enforcement and military communications, the transmitted signal should not be detected in order to perform covert missions. Thus, the paradigm of covert communication, also known as low-probability-of-detection (LPD) communication, aims to hide the transmission state and preserve the user's privacy or secrecy. [0003] In a typical covert communication scenario, a sender (Alice) wishes to send information to a covert receiver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/0426
CPCH04K1/003H04B7/043
Inventor 马帅高梦迪张蕴琪石嘉纪金伟李晓茹李世银
Owner CHINA UNIV OF MINING & TECH