pith. machine review for the scientific record. sign in

arxiv: 1907.01350 · v2 · submitted 2019-07-02 · 📡 eess.SP

Recognition: unknown

Covert Communication Using Null Space and 3D Beamforming

Authors on Pith no claims yet
classification 📡 eess.SP
keywords covertrateintendedjammingbeamformingcommunicationcommunicationsconsider
0
0 comments X
read the original abstract

Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs beamforming to place the intended receiver in the null space of the jamming and a multi-antenna transmitter equipped with three-dimensional (3D) antennas that is able to beamform toward its intended recipient. To evaluate this design, we formulate an optimization problem and present an iterative algorithm to solve it. Numerical results consider both the rate of covert communications with the proposed architecture and the gap between the result from our optimization and that obtained from exhaustive search.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Joint Secrecy and Covert Communication (JSACC): An Enhanced Physical Layer Security Approach

    eess.SP 2026-04 unverdicted novelty 4.0

    JSACC dynamically switches between secrecy and covert modes using RIS, derives closed-form outage probability and ergodic rate, shows diversity order depends on Nakagami parameters and RIS elements, and outperforms co...