A Robust Beamforming Design Method for Non-ideal WCSI Covert Communications
A covert communication and beamforming technology, applied in secure communication, electrical components, radio transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0145] In the present invention, the following notation is adopted: bold lowercase letters and uppercase letters represent vectors and matrices respectively. Re(·) and Im(·) denote the real and imaginary parts of their arguments, respectively. with mean μ and variance σ 2 The complex-valued circularly symmetric Gaussian distribution is obtained by using To represent.
[0146] Scenarios considered by the present invention are as figure 1 As shown, Alice (base station) has been sending data stream x to Carol (regular user) c , and in private stream x b sent to Bob, where represents the null hypothesis that Alice does not send private streams to Bob, and Denotes an alternative assumption that Alice sends a private stream of data to Bob. At the same time, Willie is observing the communication environment as an eavesdropper and trying to identify whether Alice is transmitting to Bob; Alice can use the transmission to Carol as a cover to achieve covert communication. It...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


