Optimal Beamforming for Covert Communication in MIMO Relay Systems
He Zhu
School of System Information Science, Future University Hakodate, Hakodate, Japan
Search for more papers by this authorCorresponding Author
Huihui Wu
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China
Correspondence: Huihui Wu ([email protected])
Search for more papers by this authorYulong Shen
School of Computer Science and Technology, Xidian University, Xi'an, China
Search for more papers by this authorXiaohong Jiang
School of System Information Science, Future University Hakodate, Hakodate, Japan
Search for more papers by this authorHe Zhu
School of System Information Science, Future University Hakodate, Hakodate, Japan
Search for more papers by this authorCorresponding Author
Huihui Wu
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China
Correspondence: Huihui Wu ([email protected])
Search for more papers by this authorYulong Shen
School of Computer Science and Technology, Xidian University, Xi'an, China
Search for more papers by this authorXiaohong Jiang
School of System Information Science, Future University Hakodate, Hakodate, Japan
Search for more papers by this authorABSTRACT
This paper investigates the optimal beamforming design for covert communication in a multiple-input multiple-output (MIMO) relay system consisting of source, destination, relay and warden. For both scenarios when each transmitting node knows the perfect or partial warden's channel state information (CSI), we first develop theoretical models to depict the inherent relationship between the beamforming matrices at source/relay and end-to-end covert performance of the system regard the minimum detection error probability and covert capacity. Based on these models, we then formulate the optimal beamforming for covert capacity maximization under perfect and partial CSI as linear non-convex (LNC) and non-linear non-convex (NLNC) optimization problems, respectively. We then apply Lagrangian and Hadamard inequality methods to solve the LNC optimization problem to determine the closed-form expressions for the optimal beamforming matrices at source/relay, based on which a stochastic gradient descent algorithm is developed to evaluate the maximum covert capacity. For the complicated NLNC problem, we propose an efficient search algorithm based on S-procedure lemma and interior point methods to identify the optimal beamforming matrices to reach the maximum covert capacity. Finally, we provide extensive numerical results to illustrate the covert performance enhancement from adopting the optimal beamforming in MIMO relay systems.
Open Research
Data Availability Statement
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
- 1H. Xiao, C. Xu, Y. Ma, S. Yang, L. Zhong, and G.-M. Muntean, “Edge Intelligence: A Computational Task Offloading Scheme for Dependent IoT Application,” IEEE Transactions on Wireless Communications 21, no. 9 (2022): 7222–7237.
- 2H. Xiao, C. Xu, Z. Feng, et al., “A Transcoding-Enabled 360 VR Video Caching and Delivery Framework for Edge-Enhanced Next-Generation Wireless Networks,” IEEE Journal on Selected Areas in Communications 40, no. 5 (2022): 1615–1631.
- 3H. Xiao, Z. Huang, Z. Xu, et al., “Task-Driven Cooperative Internet of the Robotic Things Crowdsourcing: From the Perspective of Hierarchical Game-Theoretic,” IEEE Internet of Things Journal 11, no. 20 (2024): 32350–32362.
10.1109/JIOT.2024.3349538 Google Scholar
- 4C. Xu, M. Wang, X. Chen, L. Zhong, and L. A. Grieco, “Optimal Information Centric Caching in 5G Device-To-Device Communications,” IEEE Transactions on Mobile Computing 17, no. 9 (2018): 2114–2126.
- 5H. Xiao, C. Xu, C. Fang, S. Yang, and L. Zhong, “ VAAC-IM: Viewing Area Adaptive Control in Immersive Media Transmission,” in Proceedings of the 34th Edition of the Workshop on Network and Operating System Support for Digital Audio and Video (New York, NY: Association for Computing Machinery, 2024), 8–14.
10.1145/3651863.3651877 Google Scholar
- 6P. Yadav, S. Kumar, and R. Kumar, “A Comprehensive Survey of Physical Layer Security Over Fading Channels: Classifications, Applications, and Challenges,” Transactions on Emerging Telecommunications Technologies 32, no. 9 (2021): e4270.
- 7B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication,” IEEE Communications Magazine 53, no. 12 (2015): 26–31.
- 8J. Wang, W. Tang, Q. Zhu, X. Li, H. Rao, and S. Li, “Covert Communication With the Help of Relay and Channel Uncertainty,” IEEE Wireless Communications Letters 8, no. 1 (2018): 317–320.
- 9J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert Communication Achieved by a Greedy Relay in Wireless Networks,” IEEE Transactions on Wireless Communications 17, no. 7 (2018): 4766–4779.
- 10J. Hu, S. Yan, F. Shu, and J. Wang, “Covert Transmission With a Self-Sustained Relay,” IEEE Transactions on Wireless Communications 18, no. 8 (2019): 4089–4102.
- 11J. Bai, J. He, Y. Chen, Y. Shen, and X. Jiang, “On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems,” IEEE Transactions on Information Forensics and Security 17 (2022): 2920–2935.
- 12L. Lv, Z. Li, H. Ding, N. Al-Dhahir, and J. Chen, “Achieving Covert Wireless Communication With a Multi-Antenna Relay,” IEEE Transactions on Information Forensics and Security 17 (2022): 760–773.
- 13C. Gao, B. Yang, D. Zheng, X. Jiang, and T. Taleb, “Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems,” IEEE Transactions on Communications 72, no. 2 (2023): 1020–1032.
10.1109/TCOMM.2023.3327272 Google Scholar
- 14Y. Su, H. Sun, Z. Zhang, Z. Lian, Z. Xie, and Y. Wang, “Covert Communication With Relay Selection,” IEEE Wireless Communications Letters 10, no. 2 (2020): 421–425.
- 15R. Sun, B. Yang, S. Ma, Y. Shen, and X. Jiang, “Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control,” IEEE Transactions on Communications 69, no. 9 (2021): 6198–6212.
- 16Y. Liu, H. Wu, and X. Jiang, “Joint Selection of FD/HD and AF/DF for Covert Communication in Two-Hop Relay Systems,” Ad Hoc Networks 148 (2023): 103207.
- 17C. Wang, Z. Li, J. Shi, and D. W. K. Ng, “Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications: Joint Active and Passive Beamforming Optimization,” IEEE Transactions on Communications 69, no. 6 (2021): 3984–4000.
- 18C. Wu, S. Yan, X. Zhou, R. Chen, and J. Sun, “Intelligent Reflecting Surface (IRS)-aided Covert Communication With warden's Statistical CSI,” IEEE Wireless Communications Letters 10, no. 7 (2021): 1449–1453.
- 19X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “UAV-Relayed Covert Communication Towards a Flying Warden,” IEEE Transactions on Communications 69, no. 11 (2021): 7659–7672.
- 20A. Abdelaziz and C. E. Koksal, “ Fundamental Limits of Covert Communication Over MIMO AWGN Channel,” in 2017 IEEE Conference on Communications and Network Security (Las Vegas, NV: IEEE, 2017), 1–9.
10.1109/CNS.2017.8228657 Google Scholar
- 21S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications Under Variational Distance Constraint,” IEEE Transactions on Information Forensics and Security 16 (2021): 4605–4620.
- 22X. Chen, W. Sun, C. Xing, et al., “Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden With Uncertain Locations,” IEEE Transactions on Wireless Communications 20, no. 8 (2021): 5467–5480.
- 23M. V. Jamali and H. Mahdavifar, “Covert Millimeter-Wave Communication: Design Strategies and Performance Analysis,” IEEE Transactions on Wireless Communications 21, no. 6 (2021): 3691–3704.
10.1109/TWC.2021.3123307 Google Scholar
- 24S. Ma, Y. Zhang, H. Li, et al., “Robust Beamforming Design for Covert Communications,” IEEE Transactions on Information Forensics and Security 16 (2021): 3026–3038.
- 25M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert Communication Using Null Space and 3D Beamforming: Uncertainty of willie's Location Information,” IEEE Transactions on Vehicular Technology 69, no. 8 (2020): 8568–8576.
- 26O. Shmuel, A. Cohen, and O. Gurewitz, “Multi-Antenna Jamming in Covert Communication,” IEEE Transactions on Communications 69, no. 7 (2021): 4644–4658.
- 27A. Bendary, A. Abdelaziz, and C. E. Koksal, “Achieving Positive Covert Capacity Over MIMO AWGN Channels,” IEEE Journal on Selected Areas in Information Theory 2, no. 1 (2021): 149–162.
- 28L. Bai, J. Xu, and L. Zhou, “Covert Communication for Spatially Sparse Wave Massive MIMO Channels,” IEEE Transactions on Communications 71, no. 3 (2023): 1615–1630.
10.1109/TCOMM.2023.3237998 Google Scholar
- 29J. Heo, S. Sung, H. Lee, I. Hwang, and D. Hong, “MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective,” IEEE Communications Surveys & Tutorials 25, no. 3 (2023): 1543–1570.
- 30Y. Deng, M. Elkashlan, P. L. Yeoh, N. Yang, and R. K. Mallik, “Cognitive MIMO Relay Networks With Generalized Selection Combining,” IEEE Transactions on Wireless Communications 13, no. 9 (2014): 4911–4922.
- 31T. Mir, M. Waqas, S. Tu, et al., “Relay Hybrid Precoding in UAV-Assisted Wideband Millimeter-Wave Massive MIMO System,” IEEE Transactions on Wireless Communications 21, no. 9 (2022): 7040–7054.
- 32Z. Peng, X. Chen, W. Xu, C. Pan, L.-C. Wang, and L. Hanzo, “Analysis and Optimization of Massive Access to the IoT Relying on Multi-Pair Two-Way Massive MIMO Relay Systems,” IEEE Transactions on Communications 69, no. 7 (2021): 4585–4598.
- 33S. Gerbracht, C. Scheunert, and E. A. Jorswieck, “Secrecy Outage in MISO Systems With Partial Channel Information,” IEEE Transactions on Information Forensics and Security 7, no. 2 (2011): 704–716.
10.1109/TIFS.2011.2181946 Google Scholar
- 34B. A. Bash, D. Goeckel, and D. Towsley, “Limits of Reliable Communication With Low Probability of Detection on AWGN Channels,” IEEE Journal on Selected Areas in Communications 31, no. 9 (2013): 1921–1930.
- 35S.-H. Lee, L. Wang, A. Khisti, and G. W. Wornell, “Covert Communication With Channel-State Information at the Transmitter,” IEEE Transactions on Information Forensics and Security 13, no. 9 (2018): 2310–2319.
- 36Y. Zou, X. Wang, and W. Shen, “Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks,” IEEE Journal on Selected Areas in Communications 31, no. 10 (2013): 2099–2111.
- 37S. Loyka, “The Capacity and Optimal Signaling for Gaussian MIMO Channels Under Interference Constraints,” IEEE Transactions on Communications 68, no. 6 (2020): 3386–3400.
- 38H. Xiao, Y. Zhuang, C. Xu, et al., “Transcoding-Enabled Cloud–Edge–Terminal Collaborative Video Caching in Heterogeneous Iot Networks: An Online Learning Approach With Time-Varying Information,” IEEE Internet of Things Journal 11, no. 1 (2023): 296–310.
10.1109/JIOT.2023.3312916 Google Scholar
- 39D. W. K. Ng, E. S. Lo, and R. Schober, “Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer,” IEEE Transactions on Wireless Communications 13, no. 8 (2014): 4599–4615.
- 40C. Helmberg, F. Rendl, R. J. Vanderbei, and H. Wolkowicz, “An Interior-Point Method for Semidefinite Programming,” SIAM Journal on Optimization 6, no. 2 (1996): 342–361.
- 41S. Zhao, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, “Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems,” IEEE Transactions on Information Forensics and Security 15 (2020): 3775–3790.
- 42S. Wagner, R. Couillet, M. Debbah, and D. T. Slock, “Large System Analysis of Linear Precoding in Correlated Miso Broadcast Channels Under Limited Feedback,” IEEE Transactions on Information Theory 58, no. 7 (2012): 4509–4537.