TY - JOUR
T1 - Covert Communications
T2 - A Comprehensive Survey
AU - Chen, Xinying
AU - An, Jianping
AU - Xiong, Zehui
AU - Xing, Chengwen
AU - Zhao, Nan
AU - Yu, F. Richard
AU - Nallanathan, Arumugam
N1 - Publisher Copyright:
© 1998-2012 IEEE.
PY - 2023
Y1 - 2023
N2 - Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
AB - Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
KW - Covert communication
KW - information hiding
KW - low probability of detection
KW - physical layer security
KW - square root law
UR - http://www.scopus.com/inward/record.url?scp=85153362530&partnerID=8YFLogxK
U2 - 10.1109/COMST.2023.3263921
DO - 10.1109/COMST.2023.3263921
M3 - Article
AN - SCOPUS:85153362530
SN - 1553-877X
VL - 25
SP - 1173
EP - 1198
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 2
ER -