pith. machine review for the scientific record. sign in

arxiv: 2604.27579 · v1 · submitted 2026-04-30 · 📡 eess.SP

Recognition: unknown

Joint Secrecy and Covert Communication (JSACC): An Enhanced Physical Layer Security Approach

Authors on Pith no claims yet

Pith reviewed 2026-05-07 07:50 UTC · model grok-4.3

classification 📡 eess.SP
keywords joint secrecy and covert communicationphysical layer securityreconfigurable intelligent surfaceoutage probabilityergodic ratediversity orderNakagami fadingcovert communication
0
0 comments X

The pith

JSACC dynamically switches between secrecy and covert modes with RIS to outperform conventional secrecy communication.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper proposes joint secrecy and covert communication (JSACC) to strengthen physical layer security by allowing a system to switch between a secrecy mode that conceals message content and a covert mode that hides the transmission itself. The switch occurs according to the observed difference in channel conditions between the legitimate receiver and potential eavesdroppers, while reconfigurable intelligent surfaces are added to increase the effective range. Closed-form expressions are derived for outage probability and ergodic rate under each mode, followed by high-SNR asymptotic analysis that yields the diversity order in terms of Nakagami fading parameters and the number of RIS elements. Simulations confirm the formulas and establish that JSACC achieves better reliability and security metrics than a conventional secrecy-only system. A reader would care because the hybrid adaptation offers a concrete way to improve wireless security performance without increasing transmit power or relying solely on higher-layer encryption.

Core claim

The JSACC system dynamically switches between secrecy and covert modes according to the channel difference between legitimate and illegitimate receivers, uses RIS to extend range, and derives closed-form outage probability and ergodic rate expressions for each scenario together with high-SNR approximations; these show that the diversity order depends on the Nakagami fading parameters and the number of RIS reflecting elements, with simulations confirming consistency with analysis and superiority over conventional secrecy communication.

What carries the argument

The dynamic mode-switching rule in JSACC that selects secrecy or covert operation based on the instantaneous channel difference between legitimate and illegitimate receivers, assisted by RIS reflection to extend range.

If this is right

  • Diversity order grows with larger Nakagami-m parameters and with more RIS reflecting elements.
  • JSACC achieves lower outage probability than conventional secrecy communication at the same SNR.
  • Closed-form ergodic rate expressions allow direct computation of average throughput for each mode.
  • High-SNR slope and diversity order formulas enable quick assessment of performance scaling with RIS size.
  • The approach applies to Nakagami fading channels and provides asymptotic approximations usable for system design.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • In networks with imperfect channel state information the switching threshold would need to be made robust, potentially reducing the observed gain over secrecy-only operation.
  • The same mode-selection logic could be applied to multi-antenna or multi-user settings to protect several legitimate receivers simultaneously.
  • Energy consumption of the RIS elements becomes a practical design variable once the diversity benefit is quantified.
  • JSACC performance expressions could serve as benchmarks for comparing against other hybrid physical-layer security techniques such as artificial noise injection.

Load-bearing premise

The system can obtain accurate, real-time knowledge of the channel difference between legitimate and illegitimate receivers to decide the operating mode without estimation errors or delays.

What would settle it

An experiment or simulation with realistic channel estimation errors in which the outage probability of JSACC becomes worse than that of a conventional secrecy system would falsify the claimed superiority.

Figures

Figures reproduced from arXiv: 2604.27579 by Haitao Du, Liqin Hu, Pan Li, Wei Yang Bryan Lim, Yanyu Cheng.

Figure 1
Figure 1. Figure 1: The system model of the JSACC, where Alice view at source ↗
Figure 2
Figure 2. Figure 2: AMDEP versus Alice’s and Jammer’s transmit view at source ↗
Figure 3
Figure 3. Figure 3: Security rate versus Pt. and approaches unity as P max J → ∞. These phenomena are consistent with intuition, since a larger Jammer’s power leads to higher uncertainty for Willie. In addition, the results indicate that the number of RIS elements has a negligible effect on the AMDEP, highlighting that the principal determinants of covertness performance are the powers transmitted by the Alice and Jammer. In view at source ↗
Figure 5
Figure 5. Figure 5: High-SNR OPs of Bob in the JSACC and conven view at source ↗
Figure 6
Figure 6. Figure 6: ERs versus the transmit SNR in the JSACC and view at source ↗
Figure 7
Figure 7. Figure 7: High-SNR approximations of ERs. 0 0.5 1 1.5 2 2.5 3 Switch threshold (Mbps) 1.35 1.4 1.45 1.5 Ergodic rate (Mbps) (a) JSACC-Simulation JSACC-Analytical CC-Analytical SC-Analytical 0 0.5 1 1.5 2 2.5 3 Switch threshold (Mbps) 0.2 0.4 0.6 0.8 1 Security Rate (b) Simulation Analytical view at source ↗
Figure 8
Figure 8. Figure 8: ERs and Security Rate versus switch threshold. view at source ↗
read the original abstract

In this paper, we propose an enhanced physical layer security approach, named joint secrecy and covert communication (JSACC), which aims to improve the performance of physical layer security (PLS). The JSACC system can dynamically switch between secrecy mode and covert mode according to the channel difference between legitimate and illegitimate receivers. We further leverage reconfigurable intelligent surface (RIS) to extend the communication range. For each scenario, we derive the closed-form expressions for the outage probability (OP) and ergodic rate (ER). To further understand system performance, we derive asymptotic approximations in the high signal-to-noise ratio (SNR) regime to obtain the diversity order and high-SNR slope. We demonstrate that the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number. Simulation results are consistent with our theoretical analysis and reveal the superiority of the JSACC system over the conventional secrecy communication (SC) system.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 3 minor

Summary. The manuscript proposes a Joint Secrecy and Covert Communication (JSACC) scheme that dynamically switches between secrecy and covert modes according to the relative channel strengths of the legitimate and illegitimate receivers, assisted by a reconfigurable intelligent surface (RIS). For each mode, closed-form expressions are derived for outage probability (OP) and ergodic rate (ER). High-SNR asymptotic approximations are obtained to extract diversity order and high-SNR slope. The authors claim that the JSACC diversity order depends on the Nakagami-m fading parameters and the number of RIS reflecting elements. Monte-Carlo simulations are presented to validate the analysis and to show that JSACC outperforms conventional secrecy communication.

Significance. If the derivations are correct, the work supplies a concrete mechanism for combining secrecy and covert physical-layer security with RIS assistance and furnishes analytical performance metrics that could guide system design. The explicit dependence of diversity order on Nakagami parameters and RIS size, together with the closed-form OP/ER expressions, would constitute a useful addition to the PLS literature provided the asymptotic analysis is free of the weighting issue identified below.

major comments (3)
  1. [§IV-C] §IV-C (Asymptotic Analysis) and the diversity-order claim in the abstract: Mode selection is performed by comparing the instantaneous channel gains of the legitimate and illegitimate links; these gains are independent of SNR. Consequently the overall high-SNR outage probability is a convex combination P(mode_s)·OP_s^∞ + P(mode_c)·OP_c^∞ with SNR-independent weights. The diversity order of the mixture is therefore strictly the minimum of the two per-mode diversity orders. The manuscript states that “the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number” without demonstrating that the two modes possess identical diversity orders or explicitly writing the min{·,·} operation. An explicit high-SNR expansion of the composite OP (or a conditioning argument) is required to substantiate the claimed single diversity-order expression.
  2. [§II] §II (System Model) and §III (Performance Analysis): The derivations assume perfect instantaneous CSI of both the legitimate and the illegitimate receivers at the transmitter. For the covert mode this assumption is particularly strong, because the illegitimate receiver’s channel is precisely what the transmitter is trying to keep uncertain. No sensitivity analysis or robust formulation under imperfect CSI is provided, yet the closed-form OP/ER expressions and the diversity-order result rest directly on this assumption.
  3. [§IV-A] §IV-A and §IV-B (OP and ER derivations): The closed-form expressions are stated to be obtained after averaging over Nakagami-m fading and the discrete RIS phase shifts. However, the final expressions contain multiple nested sums and special functions whose numerical evaluation is not cross-checked against the Monte-Carlo curves in any table or figure. Without such verification, it is impossible to confirm that the analytic expressions are free of algebraic errors that would propagate into the asymptotic diversity-order formulas.
minor comments (3)
  1. Notation: The symbols for the mode-selection threshold and the RIS phase-shift vector are introduced without a dedicated nomenclature table; readers must hunt through the text to locate their definitions.
  2. Figure 3 (diversity-order plot): The legend does not indicate which curves correspond to the secrecy mode, covert mode, and JSACC composite; the caption should explicitly label the asymptotic slopes.
  3. Reference list: Several recent works on RIS-assisted covert communication (e.g., 2022–2023) are missing; the introduction would benefit from a brief comparison paragraph.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We are grateful to the referee for the detailed and insightful comments, which have helped us identify areas for improvement in our manuscript. Below, we provide point-by-point responses to the major comments. We will revise the manuscript to incorporate the suggested clarifications and verifications.

read point-by-point responses
  1. Referee: [§IV-C] §IV-C (Asymptotic Analysis) and the diversity-order claim in the abstract: Mode selection is performed by comparing the instantaneous channel gains of the legitimate and illegitimate links; these gains are independent of SNR. Consequently the overall high-SNR outage probability is a convex combination P(mode_s)·OP_s^∞ + P(mode_c)·OP_c^∞ with SNR-independent weights. The diversity order of the mixture is therefore strictly the minimum of the two per-mode diversity orders. The manuscript states that “the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number” without demonstrating that the two modes possess identical diversity orders or explicitly writing the min{·,·} operation. An explicit high-SNR expansion of the composite OP (or a conditioning argument) is required to substantiate the claimed single diversity-order expression.

    Authors: We thank the referee for this precise observation on the asymptotic behavior. We will revise §IV-C to include an explicit high-SNR expansion of the composite outage probability by conditioning on the mode. This will show that the diversity order is the minimum of the per-mode diversity orders. Both per-mode diversity orders depend on the Nakagami-m parameters and the number of RIS elements, thus the overall diversity order of JSACC depends on these factors as claimed. We will also explicitly state the min operation in the revised text. revision: yes

  2. Referee: [§II] §II (System Model) and §III (Performance Analysis): The derivations assume perfect instantaneous CSI of both the legitimate and the illegitimate receivers at the transmitter. For the covert mode this assumption is particularly strong, because the illegitimate receiver’s channel is precisely what the transmitter is trying to keep uncertain. No sensitivity analysis or robust formulation under imperfect CSI is provided, yet the closed-form OP/ER expressions and the diversity-order result rest directly on this assumption.

    Authors: We acknowledge that the perfect CSI assumption for the illegitimate receiver is particularly strong in the covert mode. This assumption enables the derivation of closed-form expressions. In the revised manuscript, we will add a discussion in §II on the implications of this assumption and its limitations for the covert communication scenario. We will also indicate that future work could explore robust designs under imperfect CSI. The current results provide performance benchmarks under ideal CSI conditions. revision: partial

  3. Referee: [§IV-A] §IV-A and §IV-B (OP and ER derivations): The closed-form expressions are stated to be obtained after averaging over Nakagami-m fading and the discrete RIS phase shifts. However, the final expressions contain multiple nested sums and special functions whose numerical evaluation is not cross-checked against the Monte-Carlo curves in any table or figure. Without such verification, it is impossible to confirm that the analytic expressions are free of algebraic errors that would propagate into the asymptotic diversity-order formulas.

    Authors: We thank the referee for highlighting the need for explicit verification. We will include a new table in the revised §IV that lists the analytical values from the closed-form OP and ER expressions alongside Monte-Carlo simulation results for selected parameter combinations. This cross-validation will confirm the correctness of the derivations and support the asymptotic analysis. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation chain

full rationale

The paper's derivations of closed-form OP/ER expressions and high-SNR asymptotics rely on standard Nakagami-m channel PDFs, RIS phase-shift models, and integral evaluations for outage and ergodic rate, followed by series expansions to extract diversity order. Mode selection probabilities are SNR-independent (determined solely by relative fading coefficients), yielding a fixed-weight convex combination of per-mode asymptotics whose slope is the min of the component orders; this follows directly from the channel statistics and element count without any fitted parameters renamed as predictions, self-definitional loops, or load-bearing self-citations. No uniqueness theorems or ansatzes are imported via prior author work. The analysis is self-contained against external benchmarks of fading-channel performance analysis.

Axiom & Free-Parameter Ledger

0 free parameters · 3 axioms · 0 invented entities

Based solely on the abstract, the work relies on standard wireless fading models and ideal RIS behavior; no explicit free parameters are named, but the mode-switching rule and RIS element count function as key variables.

axioms (3)
  • domain assumption Wireless channels follow Nakagami-m fading
    Invoked when stating that diversity order depends on Nakagami fading parameters.
  • ad hoc to paper Perfect channel state information is available for both legitimate and illegitimate receivers
    Required for the dynamic switching decision described in the abstract.
  • domain assumption RIS elements can be configured to perfectly enhance the legitimate link and degrade the illegitimate link
    Used to claim extended communication range and improved security.

pith-pipeline@v0.9.0 · 5469 in / 1560 out tokens · 74103 ms · 2026-05-07T07:50:55.652723+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

51 extracted references · 3 canonical work pages

  1. [1]

    NOMA-assisted secure short-packet communications in IoT,

    Z. Xiang, W. Yang, Y. Cai, Z. Ding, Y. Song, and Y. Zou, “NOMA-assisted secure short-packet communications in IoT,” IEEE Wireless Commun., vol. 27, no. 4, pp. 8–15, Aug. 2020

  2. [2]

    Physical layer security in cognitive radio inspired NOMA network,

    Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical layer security in cognitive radio inspired NOMA network,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 700–714, Jun. 2019

  3. [3]

    On the secrecy capacity of fading channels,

    P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, 2008

  4. [4]

    Secure communication over fading channels,

    Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470–2492, 2008

  5. [5]

    On the performance of pinching-antenna systems (PASS) with orthogonal and non-orthogonal multiple access,

    Y. Cheng, C. Ouyang, Y. Liu, and G. K. Karagiannidis, “On the performance of pinching-antenna systems (PASS) with orthogonal and non-orthogonal multiple access,” arXiv preprint arXiv:2506.02420, 2025

  6. [6]

    Hiding information in noise: Fundamental limits of covert wireless communication,

    B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26– 31, 2015

  7. [7]

    Covert wireless communications under quasi-static fading with channel uncertainty,

    K. Shahzad and X. Zhou, “Covert wireless communications under quasi-static fading with channel uncertainty,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1104–1116, 2020

  8. [8]

    Federated transfer learning with client selection for intrusion detection in mobile edge computing,

    Y. Cheng, J. Lu, D. Niyato, B. Lyu, J. Kang, and S. Zhu, “Federated transfer learning with client selection for intrusion detection in mobile edge computing,” IEEE Commun. Lett., vol. 26, no. 3, pp. 552–556, Mar. 2022

  9. [9]

    Enhancing the secrecy rate with direction-range focusing with FDA and RIS,

    C. Li, S. Roth, and A. Sezgin, “Enhancing the secrecy rate with direction-range focusing with FDA and RIS,” IEEE Trans. Veh. Technol., pp. 1–14, Jan. 2025

  10. [10]

    Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,

    X. Li, M. Liu, S. Dang, N. C. Luong, C. Yuen, A. Nallanathan, and D. Niyato, “Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,” IEEE Trans. Wireless Commun., pp. 1–1, Mar. 2025

  11. [11]

    Performance analysis and optimization for jammer-aided multiantenna UA V covert communication,

    H. Du, D. Niyato, Y.-A. Xie, Y. Cheng, J. Kang, and D. I. Kim, “Performance analysis and optimization for jammer-aided multiantenna UA V covert communication,” IEEE J. Sel. Areas Commun., vol. 40, no. 10, pp. 2962–2979, 2022

  12. [12]

    Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?

    X. Guan, Q. Wu, and R. Zhang, “Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?” IEEE Wireless Commun. Lett., vol. 9, no. 6, pp. 778– 782, 2020

  13. [13]

    Intelligent reflecting surface and UA V assisted secrecy communication in millimeter-wave networks,

    G. Sun, X. Tao, N. Li, and J. Xu, “Intelligent reflecting surface and UA V assisted secrecy communication in millimeter-wave networks,” IEEE Trans. Veh. Technol., vol. 70, no. 11, pp. 11 949–11 961, 2021

  14. [14]

    Secrecy performance analysis of RIS-aided wireless communication systems,

    L. Yang, J. Yang, W. Xie, M. O. Hasna, T. Tsiftsis, and M. Di Renzo, “Secrecy performance analysis of RIS-aided wireless communication systems,” IEEE Trans. Veh. Technol., vol. 69, no. 10, pp. 12 296–12 300, 2020

  15. [15]

    RIS-assisted green secure communications: Active RIS or passive RIS?

    W. Lv, J. Bai, Q. Yan, and H. M. Wang, “RIS-assisted green secure communications: Active RIS or passive RIS?” IEEE Wireless Commun. Lett., vol. 12, no. 2, pp. 237–241, 2022

  16. [16]

    Secrecy transmission in large-scale UA V- enabled wireless networks,

    J. Yao and J. Xu, “Secrecy transmission in large-scale UA V- enabled wireless networks,” IEEE Trans. Commun., vol. 67, no. 11, pp. 7656–7671, 2019

  17. [17]

    Physical layer security over fluid antenna systems: Secrecy performance analysis,

    F. R. Ghadi, K.-K. Wong, F. J. López-Martínez, W. K. New, H. Xu, and C.-B. Chae, “Physical layer security over fluid antenna systems: Secrecy performance analysis,” IEEE Trans. Wireless Commun., 2024

  18. [18]

    Secure transmission with mul- tiple antennas—part II: The mimome wiretap channel,

    A. Khisti and G. W. Wornell, “Secure transmission with mul- tiple antennas—part II: The mimome wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, 2010

  19. [19]

    Improving physical layer security via cooperative diversity in energy-constrained cognitive radio networks with multiple eavesdroppers,

    H. A. Shah and I. Koo, “Improving physical layer security via cooperative diversity in energy-constrained cognitive radio networks with multiple eavesdroppers,” Int. J. Commun. Syst., vol. 32, no. 14, p. e4008, 2019

  20. [20]

    Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications,

    H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 375–388, 2020

  21. [21]

    Covert communications: A comprehensive survey,

    X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F. R. Yu, and A. Nallanathan, “Covert communications: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173– 1198, 2023

  22. [22]

    Covert communication in the presence of an uninformed jam- mer,

    T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert communication in the presence of an uninformed jam- mer,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 6193– 6206, 2017

  23. [23]

    Covert communication assisted by UA V-IRS,

    C. Wang, X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, and D. Niyato, “Covert communication assisted by UA V-IRS,” IEEE Trans. Commun., vol. 71, no. 1, pp. 357–369, 2022

  24. [24]

    Performance analysis and power allocation for covert mobile edge computing with RIS-aided NOMA,

    Y. Cheng, J. Lu, D. Niyato, B. Lyu, M. Xu, and S. Zhu, “Performance analysis and power allocation for covert mobile edge computing with RIS-aided NOMA,” IEEE Trans. Mobile Comput., vol. 23, no. 5, pp. 4212–4227, May 2023

  25. [25]

    Covert communication achieved by a greedy relay in wireless networks,

    J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4766–4779, 2018

  26. [26]

    Physical layer covert communication in B5G wireless networks—its research, applications, and challenges,

    Y. Jiang, L. Wang, H.-H. Chen, and X. Shen, “Physical layer covert communication in B5G wireless networks—its research, applications, and challenges,” Proc. IEEE, vol. 112, no. 1, pp. 47–82, 2024

  27. [27]

    Covert communication via blockchain: Hiding patterns and communication patterns,

    T. Zhang, Q. Wu, Q. Wang, T. Han, B. Li, and Y. Zhu, “Covert communication via blockchain: Hiding patterns and communication patterns,” Comput. Stand. Interfaces, vol. 90, p. 103851, 2024

  28. [28]

    Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,

    X. Li, M. Liu, S. Dang, N. C. Luong, C. Yuen, A. Nallanathan, and D. Niyato, “Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,” IEEE Trans. Wireless Commun., 2025

  29. [29]

    Covert communication with finite blocklength in A WGN channels,

    S. Yan, B. He, Y. Cong, and X. Zhou, “Covert communication with finite blocklength in A WGN channels,” in Proc. IEEE Int. Conf. Commun. (ICC). IEEE, 2017, pp. 1–6. 13

  30. [30]

    Covert communication using null space and 3D beamforming,

    M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert communication using null space and 3D beamforming,” arXiv preprint arXiv:1907.01350, 2019

  31. [31]

    Covert ambient backscatter communication under surveillance of UA V relaying,

    X. Wu, L. Xu, N. Zhao, X. Jiang, B. Li, W. Lu, and A. Nal- lanathan, “Covert ambient backscatter communication under surveillance of UA V relaying,” IEEE Trans. Commun., 2025

  32. [32]

    Covert channel detection: machine learning approaches,

    M. A. Elsadig and A. Gafar, “Covert channel detection: machine learning approaches,” IEEE Access, vol. 10, pp. 38 391–38 405, 2022

  33. [33]

    Achieving covertness and secrecy: a new paradigm for secure wireless communica- tion,

    H. Wu, Y. Zhang, Y. Shen, and X. Jiang, “Achieving covertness and secrecy: a new paradigm for secure wireless communica- tion,” arXiv preprint arXiv:2008.00147, 2020

  34. [34]

    Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,

    M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,” IEEE Internet Things J., vol. 8, no. 9, pp. 7170–7181, 2020

  35. [35]

    Secrecy and covert communications against UA V surveillance via multi-hop networks,

    H.-M. Wang, Y. Zhang, X. Zhang, and Z. Li, “Secrecy and covert communications against UA V surveillance via multi-hop networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 389–401, 2019

  36. [36]

    Distributed secure transmission for covert communication under multi-user network,

    Y. Huang and J. Lei, “Distributed secure transmission for covert communication under multi-user network,” IET Commun., vol. 16, no. 16, pp. 1901–1911, 2022

  37. [37]

    Enhancing covert secrecy rate in a zero-forcing UA V jammer-assisted covert communication,

    X. Chen, Z. Chang, and T. Hämäläinen, “Enhancing covert secrecy rate in a zero-forcing UA V jammer-assisted covert communication,” IEEE Wireless Commun. Lett., 2024

  38. [38]

    The influence of secrecy on the communication structure of covert networks,

    R. Lindelauf, P. Borm, and H. Hamers, “The influence of secrecy on the communication structure of covert networks,” Social Networks, vol. 31, no. 2, pp. 126–137, 2009

  39. [39]

    Down- link and uplink intelligent reflecting surface aided networks: NOMA and OMA,

    Y. Cheng, K. H. Li, Y. Liu, K. C. Teh, and H. V. Poor, “Down- link and uplink intelligent reflecting surface aided networks: NOMA and OMA,” IEEE Trans. Wireless Commun., vol. 20, no. 6, pp. 3988–4000, Jun. 2021

  40. [41]

    Towards smart and reconfigurable envi- ronment: Intelligent reflecting surface aided wireless network,

    Q. Wu and R. Zhang, “Towards smart and reconfigurable envi- ronment: Intelligent reflecting surface aided wireless network,” IEEE Commun. Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020

  41. [42]

    Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,

    L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, Mar. 2022

  42. [43]

    Covert transmission assisted by intelligent reflecting surface,

    J. Si, Z. Li, Y. Zhao, J. Cheng, L. Guan, J. Shi, and N. Al- Dhahir, “Covert transmission assisted by intelligent reflecting surface,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5394–5408, Aug. 2021

  43. [44]

    Cascaded channel estimation for large intelligent metasurface assisted massive mimo,

    Z.-Q. He and X. Yuan, “Cascaded channel estimation for large intelligent metasurface assisted massive mimo,” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 210–214, 2019

  44. [45]

    Channel estimation and low- complexity beamforming design for passive intelligent surface assisted MISO wireless energy transfer,

    D. Mishra and H. Johansson, “Channel estimation and low- complexity beamforming design for passive intelligent surface assisted MISO wireless energy transfer,” in Proc. IEEE Int. Conf. Acoustics, Speech Signal Process. (ICASSP). IEEE, 2019, pp. 4659–4663

  45. [46]

    Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,

    X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, 2021

  46. [47]

    Intelligent reflecting surface assisted covert communication with transmis- sion probability optimization,

    J. Kong, F. T. Dagefus, J. Choi, and P. Spasojevic, “Intelligent reflecting surface assisted covert communication with transmis- sion probability optimization,” IEEE Wireless Commun. Lett., vol. 10, no. 8, pp. 1825–1829, 2021

  47. [48]

    Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,

    L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, 2021

  48. [49]

    On covert communi- cation with noise uncertainty,

    B. He, S. Yan, X. Zhou, and V. K. Lau, “On covert communi- cation with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–944, 2017

  49. [50]

    A simple design of IRS-NOMA transmission,

    Z. Ding and H. V. Poor, “A simple design of IRS-NOMA transmission,” IEEE Commun. Lett., vol. 24, no. 5, pp. 1119– 1123, 2020

  50. [51]

    On the impact of phase shifting designs on IRS-NOMA,

    Z. Ding, R. Schober, and H. V. Poor, “On the impact of phase shifting designs on IRS-NOMA,” IEEE Wireless Commun. Lett., vol. 9, no. 10, pp. 1596–1600, Oct. 2020

  51. [52]

    Non-orthogonal multiple access in large-scale het- erogeneous networks,

    Y. Liu, Z. Qin, M. Elkashlan, A. Nallanathan, and J. A. McCann, “Non-orthogonal multiple access in large-scale het- erogeneous networks,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2667–2680, 2017