Covert Communications: A Comprehensive Survey

Xinying Chen, Jianping An, Zehui Xiong, Chengwen Xing, Nan Zhao*, F. Richard Yu, Arumugam Nallanathan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

86 Citations (Scopus)

Abstract

Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.

Original languageEnglish
Pages (from-to)1173-1198
Number of pages26
JournalIEEE Communications Surveys and Tutorials
Volume25
Issue number2
DOIs
Publication statusPublished - 2023

Keywords

  • Covert communication
  • information hiding
  • low probability of detection
  • physical layer security
  • square root law

Fingerprint

Dive into the research topics of 'Covert Communications: A Comprehensive Survey'. Together they form a unique fingerprint.

Cite this