Skip to main content
Log in

Covert communication with beamforming over MISO channels in the finite blocklength regime

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

This paper considers beamforming techniques for covert communication over multiple input single output (MISO) channels with finite blocklength. We first show that the optimal input distribution for covert communication over complex Gaussian channels is circular symmetric complex Gaussian. By reviewing our previous results on the throughput of Gaussian random coding over additive white Gaussian noise (AWGN) channels, the achievability and converse bounds on the attainable throughput over MISO channels are analyzed. Then, the optimal beamforming strategies and their relationship with the transmitting power are thoroughly investigated in a variety of situations in terms of several types of channel state information available at both ends of the system. We reveal the fact that the maximal allowable transmit power is not constrained by covertness requirement when there is full channel information of the adversary, while there is an upper bound of the transmit power which is based on beamforming and an outage-based covertness criterion if there is only partial channel information of the adversary. Finally, numerical results are presented to show that the throughput of covert communication can be increased notably by adopting a proper beamforming strategy in MISO channels in comparison with the single antenna case.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Shafiee S, Liu N, Ulukus S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Trans Inform Theor, 2009, 55: 4033–4039

    Article  MathSciNet  Google Scholar 

  2. Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theor, 2010, 56: 3088–3104

    Article  MathSciNet  Google Scholar 

  3. Khisti A, Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inform Theor, 2010, 56: 5515–5532

    Article  MathSciNet  Google Scholar 

  4. Zhang L, Wu G, Li S Q. Capacity bounds of transmit beamforming over MISO time-varying channels with imperfect feedback. Sci China Inf Sci, 2010, 53: 1417–1430

    Article  Google Scholar 

  5. Liu T, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inform Theor, 2009, 55: 2547–2553

    Article  MathSciNet  Google Scholar 

  6. Gerbracht S, Scheunert C, Jorswieck E A. Secrecy outage in MISO systems with partial channel information. IEEE Trans Inform Forensic Secur, 2012, 7: 704–716

    Article  Google Scholar 

  7. Rezki Z, Khisti A, Alouini M S. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation. In: Proceedings of IEEE Global Communications Conference (GLOBECOM’2014), Austin, 2014. 1602–1607

  8. Zhou X, Rezki Z, Alomair B, et al. Achievable rates of secure transmission in Gaussian MISO channel with imperfect main channel estimation. IEEE Trans Wirel Commun, 2016, 15: 4470–4485

    Article  Google Scholar 

  9. Bash B A, Goeckel D, Towsley D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J Sel Areas Commun, 2013, 31: 1921–1930

    Article  Google Scholar 

  10. Wang L, Wornell G W, Zheng L. Fundamental limits of communication with low probability of detection. IEEE Trans Inform Theor, 2016, 62: 3493–3503

    Article  MathSciNet  Google Scholar 

  11. Bloch M R. Covert communication over noisy channels: a resolvability perspective. IEEE Trans Inform Theor, 2016, 62: 2334–2354

    Article  MathSciNet  Google Scholar 

  12. Abdelaziz A, Koksal C E. Fundamental limits of covert communication over MIMO AWGN channel. In: Proceedings of 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, 2017. 1–9

  13. Wang K, Gong Y, Zhou G M, et al. A novel covert communication system based on symmetric α-stable distribution (in Chinese). Sci Sin Inform, 2017, 47: 374–384

    Article  Google Scholar 

  14. Zhu Y, Yu M Y, Hu H X, et al. Efficient construction of provably secure steganography under ordinary covert channels (in Chinese). Sci Sin Inform, 2013, 43: 657–669

    Google Scholar 

  15. Lee S, Baxley R J, Weitnauer M A, et al. Achieving undetectable communication. IEEE J Sel Top Signal Process, 2015, 9: 1195–1205

    Article  Google Scholar 

  16. Che P H, Bakshi M, Jaggi S. Reliable deniable communication: hiding messages in noise. In: Proceedings of IEEE International Symposium on Information Theory (ISIT2013), Istanbul, 2013. 2945–2949

  17. He B, Yan S H, Zhou X Y, et al. On covert communication with noise uncertainty. IEEE Commun Lett, 2017, 21: 941–944

    Article  Google Scholar 

  18. Shahzad K, Zhou X, Yan S. Covert communication in fading channels under channel uncertainty. In: Proceedings of IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, 2017. 1–5

  19. Sobers T V, Bash B A, Goeckel D, et al. Covert communication with the help of an uninformed jammer achieves positive rat. In: Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, 2015. 625–629

  20. Soltani R, Goeckel D, Towsley D, et al. Covert wireless communication with artificial noise generation. IEEE Trans Wirel Commun, 2018, 17: 7252–7267

    Article  Google Scholar 

  21. Li J, Petropulu A P. On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans Wirel Commun, 2011, 10: 1176–1187

    Article  Google Scholar 

  22. Tahmasbi M, Bloch M R. Second-order asymptotics of covert communications over noisy channels. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), Barcelona, 2016. 2224–2228

  23. Tahmasbi M, Bloch M R. First- and second-order asymptotics in covert communication. IEEE Trans Inform Theor, 2019, 65: 2190–2212

    Article  MathSciNet  Google Scholar 

  24. Tang H, Wang J, Zheng Y R. Covert communication with extremely low power under finite block length over slow fading. In: Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, 2018. 657–661

  25. Yu X, Wei S, Luo Y. One-shot achievability and converse bounds of Gaussian random coding in AWGN channels under covert constraint. In: Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, 2019

  26. Yu X, Wei S, Luo Y. Finite blocklength analysis of Gaussian random coding in AWGN channels under covert constraints. IEEE Transactions on Information Forensics & Security, 2019. doi: https://doi.org/10.1109/TIFS.2020.3032292

  27. Polyanskiy Y, Poor H V, Verdu S. Channel coding rate in the finite blocklength regime. IEEE Trans Inform Theor, 2010, 56: 2307–2359

    Article  MathSciNet  Google Scholar 

  28. Yan S H, Cong Y R, Hanly S V, et al. Gaussian signalling for covert communications. IEEE Trans Wirel Commun, 2019, 18: 3542–3553

    Article  Google Scholar 

  29. Telatar I E. Capacity of multi-antenna Gaussian channels. Eur Trans Telecommun, 1999, 10: 585–595

    Article  MathSciNet  Google Scholar 

  30. Yu X, Wei S, Luo Y. Finite blocklength analysis of Gaussian random coding in AWGN channels under covert constraints. 2019. ArXiv: 1909.11324

  31. Tse D, Viswanath P. Fundamentals of Wireless Communication. Cambridge: Cambridge University Press, 2005

    Book  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61871264).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, X., Luo, Y. & Chen, W. Covert communication with beamforming over MISO channels in the finite blocklength regime. Sci. China Inf. Sci. 64, 192303 (2021). https://doi.org/10.1007/s11432-019-2919-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2919-5

Keywords

Navigation