HUI Hui, WANG Ying, ZHANG Yanxiang. Covert Transmission Against Joint Transmission Detection Based on Cooperative Jamming[J]. Computer Engineering and Applications, 2022, 58(8): 109-116.
[1] YASSEIN M B,ALJAWARNEH S,QAWASMEH E,et al.Comprehensive study of symmetric key and asymmetric key encryption algorithms[C]//Proceedings of International Conference on Engineering and Technology(ICET).Washington DC,USA:IEEE Press,2017:1-7.
[2] 任品毅,唐晓.面向5G的物理层安全技术综述[J].北京邮电大学学报,2018,41(5):69-77.
REN P Y,TANG X.A review on physical layer security techniques for 5G[J].Journal of Beijing University of Posts and Telecommunications,2018,41(5):69-77.
[3] 盛剑会,樊银亭,夏敏捷.面向无线传感网的物理层安全性能分析[J].计算机工程与应用,2021,57(8):91-95.
SHENG J H,FAN Y T,XIA M J.Physical layer security performance analysis for wireless sensor network[J].Computer Engineering and Applications,2021,57(8):91-95.
[4] BASH B,GOECKEL D,TOWSLEY D.Limits of reliable communication with low probability of detection on AWGN channels[J].IEEE Journal of Selected Areas in Communications,2013,31(9):1921-1930.
[5] WANG J,TANG W,ZHU Q,et al.Covert communication with the help of relay and channel uncertainty[J].IEEE Wireless Communications Letters,2019,8(1):317-320.
[6] SHAHZAD K,ZHOU X.Covert wireless communications under quasi-static fading with channel uncertainty[J].IEEE Transactions on Information Forensics and Security,2021,16:1104-1116.
[7] 林钰达,金梁,周游,等.噪声不确定时基于波束成形的隐蔽无线通信性能分析[J].通信学报,2020,41(7):49-58.
LIN Y D,JIN L,ZHOU Y,et al.Performance analysis of covert wireless communication based on beam forming with noise uncertainty[J].Journal on Communications,2020,41(7):49-58.
[8] 吴惠惠.基于物理层安全的无线隐蔽通信容量研究[D].西安:西安电子科技大学,2019.
WU H H.Research on wireless covert communication ca-pacity based on physical layer security[D].Xi’an:Xidian University,2019.
[9] SHAHZAD K,ZHOU X,YAN S,et al.Achieving covert wireless communications using a full-duplex receiver[J].IEEE Transactions on Wireless Communications,2018,17(12):8517-8530.
[10] HU J,SHAHZAD K,YAN S,et al.Covert communications with a full-duplex receiver over wireless fading channels[C]//Proceeding of IEEE International Conference on Communications(ICC).Washington DC,USA:IEEE Press,2018:1-6.
[11] SOBERS T V,BASH B A,GUHA S,et al.Covert commu-nication in the presence of an uninformed jammer[J].IEEE Transactions on Wireless Communications,2017,16(9):6193-6206.
[12] SHAHZAD K.Relaying via cooperative jamming in covert wireless communications[C]//Proceeding of International Conference on Signal Processing and Communication Systems(ICSPCS).Washington DC,USA:IEEE Press,2018:1-6.
[13] FOROUZESH M,AZMI P,KUHESTANI A,et al.Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens[J].IEEE Transactions on Communications,2020,68(6):3737-3749.
[14] WU H,LIAO X,DANG Y,et al.Limits of covert communication on two-hop AWGN channels[C]//Proceedings of International Conference on Networking and Network Applications.Washington DC,USA:IEEE Press,2017:42-47.
[15] VO V N,NGUYEN T G,SO-IN C,et al.Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy[J].IEEE Access,2018,6:23406-23419.