Next Article in Journal
Survey on Blockchain-Based Data Storage Security for Android Mobile Applications
Next Article in Special Issue
A Novel Non-Coherent Q-Ary TH-PPM Transceiver
Previous Article in Journal
Comparative Analysis of Audio Processing Techniques on Doppler Radar Signature of Human Walking Motion Using CNN Models
Previous Article in Special Issue
Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Comparison of Relay-Based Covert Communications: DF, CF and AF

Department of Mobile Convergence Engineering, Hanbat National University, Daejeon 34158, Republic of Korea
Sensors 2023, 23(21), 8747; https://doi.org/10.3390/s23218747
Submission received: 29 August 2023 / Revised: 21 October 2023 / Accepted: 24 October 2023 / Published: 26 October 2023
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)

Abstract

:
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through a relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we optimize the power distribution between the public and covert messages to achieve the maximum covert rate. We further make a delay-aware comparison among DF, CF and AF relay systems with the obtained closed-form covert rates and conduct an extensive examination on the asymptotic behaviors in different limits. Our analyses reveal that CF or AF tend to outperform DF for high source transmit power or low relay transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power. Numerical results verify our investigation into the performance comparison in various channel models.

1. Introduction

Recent advancements in wireless technology have opened up possibilities to enhance our daily lives. These include applications such as vehicle-to-everything (V2X) communication, low Earth orbit (LEO) satellites, dynamic public safety networks, and the Internet of Things (IoT) [1,2]. Meanwhile, as wireless communications technology thrives, the apprehension about safeguarding confidential data is steadily on the rise [3]. Cryptographic methods have traditionally been deemed highly efficient in terms of defense [4], but they come with certain drawbacks, such as the intricate process of generating secret keys and susceptibility to eavesdroppers equipped with superior computational capabilities. This has led to the emergence of physical layer security as an alternative approach [5]. Its primary advantage lies in its ability to thwart eavesdroppers effectively in wireless connections between legitimate parties and unauthorized entities. This is achieved through techniques including nullifying beamforming using multiple antennas or introducing artificial noise, which potentially mitigates the weaknesses associated with cryptography [6].
While the integration of cryptography and physical layer security can effectively prevent eavesdropping, there is a need for an even higher level of security where the existence of communications should remain hidden [7]. Particularly, even if the content of information is unavailable, adversaries may still conduct traffic analysis to gather metadata such as source of packets, the frequency at which request and response packets are transmitted, and even visible e-mail addresses [4]. These challenges have given rise to the concept of covert communications or low-probability-of-detection communications [7,8].
The authors in [8] investigated a primitive form of covert communications which consists of a covert transmitter, receiver and a warden. They claimed that a positive covert rate is achieved if the transmitter concurrently transmits public and covert messages, when there exists uncertainty in channel state information (CSI) or in noise level.
The applicability of covert communications has been widely studied in various relay-based communications systems as well. In [9], the authors presented two covert transmission strategies for a greedy amplify-and-forward (AF) half-duplex (HD) relay, which opportunistically transmits a covert message alongside the public message. In a similar context, the authors of [10,11] explored a multi-antenna decode-and-forward (DF) relay and a self-sustained AF relay using time switching and power splitting for energy harvesting, respectively. The work in [12] introduced an AF full-duplex (FD) relay, while [13] presented an AF joint FD/HD relay to support covert transmission. Additionally, [14] examined a two-way AF greedy relay that opportunistically sends covert messages, and [15] explored two-way intelligent reflecting surface-based covert communications. For multi-antenna DF relay-assisted covert communications, [16] analyzed achievable covert rates, considering both direct and relay links. Furthermore, secure communications with covertness requirements were addressed in [17] in the presence of an untrusted relay, and [18] discussed a similar system with an external eavesdropper, incorporating practical assumptions such as warden location uncertainty.
A majority of relay-based covert communications assume that a covert message originates either from relays and is sent on top of the source node [9,10,11,14,19,20] or from the source node such that the whole end-to-end communication needs to be hidden from wardens [12,13,15,16,21,22]. On the other hand, it is also possible that the source node transmits both public and covert messages in a way that only the covert portion is kept undetected [23]. Such a strategy is necessary when an entity is surrounded by adversaries and wishes to carry out a covert mission in disguise. However, there are a limited number of works on this type of a covert transmission, which requires more attention from the field.
In the fifth-generation (5G) and future communication networks, it is also worth noting that there is an opportunity to create an architecture that utilizes cloud processing for collaborative interference control and centralized computation. Depending on the hardware specifications and service requirements, the process of delivering content from the cloud to the user may employ rapid relaying protocols such as AF and compress-and-forward (CF) or a time-consuming but possibly more stable method such as DF. Consequently, it is essential to conduct a comprehensive examination of the potential for covert communications in DF, CF and AF relay systems. Our previous work [24] studied for the first time a CF relay-based covert communications system and a condition in which the CF and AF schemes become equivalent at optimum. Still, to the best of our knowledge, there are not sufficient studies on a performance comparison among DF, CF and AF relay-based covert communications.
In this paper, we generalize the system model of [24] to encompass DF, CF and AF relay protocols. To be specific, a source node that attempts to send both public and covert messages to a destination node through either a DF, CF or AF relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we obtain the optimal power distribution between the public and covert messages to achieve the maximum covert rate for each relay type. We further make a delay-aware comparison among DF, CF and AF relay systems with closed-form covert rates and conduct an comprehensive examination on the asymptotic behaviors in different limits. Our analyses show that CF or AF tend to outperform DF for high source transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power. Numerical results verify our investigation on the performance comparison. Our contributions can be summarized as follows:
  • Besides the CF and AF relays explored in [24], we provide in this paper the optimal public and covert rates of DF relay-based covert communications for completeness. We optimize the power distribution between the public and covert messages and obtain a closed-form expression of the achievable covert rate.
  • Noting that DF, CF and AF relays undergo different processing delays in practice, we develop upon the results of [24] and this paper delay-aware expressions of the achievable covert rate for each type of relays by adopting the delay relationship in [25].
  • We then examine and make a delay-aware comparison among the asymptotic behaviors of the achievable covert rates with DF, CF and AF relays in different limits of source and relay transmit power for practical usefulness.
  • Our analyses reveal that CF or AF tend to outperform DF for high source transmit power or low relay transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power.
  • We conduct various numerical examples, and they are in congruence with our studies on the asymptotic behaviors in various channel models.
  • The results of this paper can provide a useful guideline in an environment where multiple relays with different forwarding protocols exist or where a single relay is capable of selecting either DF, CF or AF. We suggest such covert communications scenarios as interesting future works.

2. System Model

2.1. Received Signals

Figure 1 illustrates the system model under consideration, where the source node S and the destination node D communicates via the relay R. We make an assumption that a direct link between the source and destination nodes is absent due to environmental conditions, such as being located in shadowed areas or being separated by a considerable distance. In addition to transmitting public messages, the source node also attempts to transmit a covert message and wishes that the covert message detector incorporated within the relay fails to identify it.
The received signal at the relay is written as
y R = h S R P S α x P + 1 α x C + z R ,
where x P CN ( 0 , 1 ) and x C CN ( 0 , 1 ) indicate the public and covert messages, respectively, P S means the source transmit power, α controls the proportion of P S for x P , and z R CN ( 0 , σ R 2 ) denotes the additive noise. As in [26,27], we assume that the noise σ R 2 varies uncertainly in this work such that σ R , dB 2 U ( σ ¯ R , dB 2 ζ dB , σ ¯ R , dB 2 + ζ dB ) in decibel range. Here, σ ¯ R , dB 2 and ζ dB 0 stand for the mean and bounded range, respectively. It is assumed that all nodes have access to the global CSI since covert communications are carried out under the normal operation of relay.
We now consider three different types of relays, DF, CF and AF, in the following and derive the expressions for both the public and covert rates at the destination node.

2.1.1. DF Relay

We first note from (1) that the achievable rate for the combined message x S α x P + 1 α x C in the S-R hop is written by
r ¯ S = log 2 1 + h S R 2 P S σ R 2 .
Once the DF relay succeeds in decoding x S , it is forwarded to the destination node, and the received signal can be shown as
y D = h R D P R α x P + 1 α x C + z D ,
where P R is the relay transmit power. The resulting achievable rate for x S in the R-D hop is accordingly given by
r ¯ R = log 2 1 + h R D 2 P R σ D 2 .
It is evident from (2) and (4) that the actual data rate for x S is upper bounded by r ¯ S and r ¯ R for successful decoding at the relay and destination node.
The destination node first decodes the public message by taking the covert message as interference [28], leading to the achievable rate for the public message of
r P , DF = log 2 1 + h R D 2 P R α h R D 2 P R 1 α + σ D 2 .
Subsequently, the destination node recovers the covert message by removing the decoded public message, and the achievable rate for the covert message is derived as
r C , DF = log 2 1 + h R D 2 P R 1 α σ D 2 .
It is also clear that the actual data rates for x P and x C are limited by r P , DF and r C , DF , respectively.

2.1.2. CF Relay

In the presence of the finite wireless link capacity r ¯ R between the CF relay and destination node, the CF relay compresses the signal y R to a lower-resolution form y ˜ R . Previous works in [29,30] have demonstrated that the Gaussian model of the quantization noise ensures the existence of a quantization codebook as long as the mutual information I y R ; y ˜ R is less than or equal to the data rate. Consequently, we define q R y R y ˜ R C N 0 , Q R , where Q R signifies the degree of compression. The successful decompression condition at the destination node is then described by I y R ; y ˜ R r ¯ R where
I y R ; y ˜ R = log 2 1 + h S R 2 P S + σ R 2 Q R .
After y ˜ R is successfully decompressed, the destination node decodes the public and covert messages successively as described in Section 2.1.1. Thus, the achievable rates for the public and covert messages can be calculated in a similar manner by
r P , CF = log 2 1 + h S R 2 P S α h S R 2 P S 1 α + σ R 2 + Q R ,
r C , CF = log 2 1 + h S R 2 P S 1 α σ R 2 + Q R .

2.1.3. AF Relay

The destination node receives an amplified version of y R from the AF relay as
y D = h R D P R x R + z D ,
where x R y R / h S R 2 P S + σ R 2 represents the normalized unit-power signal from the AF relay. With some manipulations, we can derive the similar achievable rates for the public and covert messages to (5) or (8), and (6) or (9) as
r P , AF = log 2 1 + h S R 2 P S α h S R 2 P S 1 α + σ R 2 + σ ˜ D 2 ,
r C , AF = log 2 1 + h S R 2 P S 1 α σ R 2 + σ ˜ D 2 ,
respectively, where σ ˜ D 2 ( h S R 2 P S + σ R 2 ) σ D 2 / ( h R D 2 P R ) .

2.2. Covert Message Detection

The covert message detector at the relay is designed to identify the presence of any additional messages apart from the public message. To achieve this, it first removes the public message from the received signal y R . This process results in an effective residual signal z ˜ R y R h S R P S x P assuming that the relay perfectly knows h S R and P S [31]. We then establish null and alternative hypotheses as
H 0 : z ˜ R = z R , H 1 : z ˜ R = h S R P S α 1 x P + 1 α x C + z R ,
where the null hypothesis H 0 represents an event that the source node did not transmit a covert message, and the alternative hypothesis H 1 denotes an event that a covert message exists. With a radiometer [26] as a detection measure, the detector can utilize the sufficient test statistic T for (13) after collecting an N number of ample signals, which reduces to the average power E [ z ˜ R 2 ] as
H 0 : T = σ R 2 , H 1 : T = 2 h S R 2 P S 1 α + σ R 2 ,
and the covert message detector decides that a covert link exists if T τ for some threshold τ .
The DEP Pr e is composed of false alarm and miss probabilities as
Pr e = Pr T τ | H 0 False alarm Pr H 0 + Pr T < τ | H 1 Miss Pr H 1 ,
where the detector assumes that the covert transmission occurs at random, i.e., Pr ( H 0 ) = Pr ( H 1 ) = 0.5 . The optimal τ minimizing the DEP can be obtained from [24] as
τ = 2 h S R 2 P S 1 α + 1 ζ σ ¯ R 2 ,
and the corresponding minimum DEP is also given by [24]
Pr e τ = τ = 1 2 1 1 2 ln ζ ln τ τ 2 h S R 2 P S 1 α ,
as long as ζ σ ¯ R 2 2 h S R 2 P S ( 1 α ) + σ ¯ R 2 / ζ . Note that (16) yields the worst-case minimum DEP assuming that the detector uses the exact value of α .

3. Problem Formulation

To make a performance comparison among the three types of relay schemes, we first need to identify the optimal power distribution between the public and covert messages that maximizes the covert rate. Depending on the type of relay, we formulate optimization problems as discussed below.

3.1. DF Relay

First, when the DF relay is considered, we solve
( P 1 ) : max α , b P , b C b C ,
subject   to :   b P r ¯ P ,
b P + b C min r ¯ S σ R 2 = ζ σ ¯ R 2 , r ¯ R ,
b P r P , DF ,
b C r C , DF ,
Pr e τ = τ ε ,
ζ σ ¯ R 2 2 h S R 2 P S 1 α + 1 ζ σ ¯ R 2 ,
0 α 1 ,
where b P and b C denote the actual rates for public and covert messages, respectively. We impose the minimum quality of service r ¯ P on b P in (18b) and the upper bounds discussed in Section 2.1.1 on both of b P and b C in (18c)–(18e). We also emphasize that (P1) provides the worst-case performance of the covert rate by considering the conservative constraint in (18c). To be specific, we take the lowest possible r ¯ S into account by setting σ R 2 = ζ σ ¯ R 2 . Constraints (18f) and (18g) guarantee a positive minimum DEP for 0 ε 0.5 , and (18h) sets a feasible region for α .

3.2. CF Relay

When the CF relay is implemented, we tackle
( P 2 ) : max α , Q R r C , CF σ R 2 = ζ σ ¯ R 2 ,
subject to : I y R ; y ˜ R σ R 2 = ζ σ ¯ R 2 r ¯ R ,
r P , CF σ R 2 = ζ σ ¯ R 2 r ¯ P ,
Pr e τ = τ ε ,
ζ σ ¯ R 2 2 h S R 2 P S 1 α + 1 ζ σ ¯ R 2 ,
0 α 1 , Q R 0 .
(P2) also provides the worst-case performance by maximizing the worst-case covert rate in (19a) and taking the worst-case compression into consideration such that the minimum amount of quantization error becomes the largest in (19b), both by setting the noise variance at the CF relay to σ R 2 = ζ σ ¯ R 2 . The minimum guaranteed public rate threshold r ¯ P is imposed on (19c), and Constraints (19d) and (19e) assure a positive minimum DEP for 0 ε 0.5 . Lastly, (19f) indicates general feasible regions for α and Q R .

3.3. AF Relay

For the AF relay, we optimize
( P 3 ) : max α r C , AF σ R 2 = ζ σ ¯ R 2 ,
subject to : r P , AF σ R 2 = ζ σ ¯ R 2 r ¯ P ,
Pr e τ = τ ε ,
ζ σ ¯ R 2 2 h S R 2 P S 1 α + 1 ζ σ ¯ R 2 ,
0 α 1 .
Similar to (P2), we maximize the worst-case covert rate in (20a) subject to the worst-case rate for public messages in (20b) by setting the noise variance at the AF relay to σ R 2 = ζ σ ¯ R 2 . Constraints (20c)–(20e) are equivalent to (P1) and (P2).

4. Proposed Solutions

In this section, we provide the optimal solutions for (P1), (P2) and (P3).

4.1. DF Relay

(P1) reveals that the minimum quality of service for public messages r ¯ P should satisfy r ¯ P min ( r ¯ S | σ R 2 = ζ σ ¯ R 2 , r ¯ R ) to ensure the feasibility, which we assume throughout this subsection.
Constraints (18f) and (18g) can be rewritten by
α 1 ζ 1 4 ε 1 ζ σ ¯ R 2 2 h S R 2 P S ,
α 1 ζ 1 ζ σ ¯ R 2 2 h S R 2 P S ,
respectively. It is clear that (22) is automatically fulfilled when (21) is satisfied for 0 ε 0.5 . Hence, Constraints (18f)–(18h) are reduced to α ¯ α 1 with
α ¯ max 1 ζ 1 4 ε 1 ζ σ ¯ R 2 2 h S R 2 P S , 0 2 .
We also note that decreasing b P enlarges the feasible region of b C in (18c) and α in (18d). Therefore, we may simply set the optimal b P to the minimum required rate from (18b), i.e.,
b P = r ¯ P ,
without loss of optimality.
With these in hand, (P1) is reformulated into
( P 1.1 ) : max α , b C b C ,
subject to : b C min r ¯ S σ R 2 = ζ σ ¯ R 2 r ¯ P , r ¯ R r ¯ P , r C , DF ,
α 2 r ¯ P 1 h R D 2 P R + σ D 2 2 r ¯ P h R D 2 P R ,
α ¯ α 1 ,
where Constraint (25b) comes from merging (18c) and (18e), and (25c) is a re-expression of (18d), both using (24). Noticing that the upper bound of b C on the right hand side in (25b) is a decreasing function of α from (6), we can conclude that the optimal α should be as low as possible. That is,
α DF = min max 2 r ¯ P 1 h R D 2 P R + σ D 2 2 r ¯ P h R D 2 P R , α ¯ , 1 ,
and consequently,
b C = min r ¯ S σ R 2 = ζ σ ¯ R 2 r ¯ P , r ¯ R r ¯ P , r C , DF α = α , = min log 2 1 + γ S R , min r ¯ P , log 2 1 + γ R D r ¯ P , log 2 1 + γ R D 1 α ¯ ,
where γ S R , min h S R 2 P S / ( ζ σ ¯ R 2 ) and γ R D h R D 2 P R / ( σ D 2 ) . It is worth noting that the optimal achievable covert rate is, accordingly, r C , DF = b C .

4.2. CF Relay

From our previous work [24], the optimal solutions for (P2) are obtained as
Q R = h S R 2 P S + ζ σ ¯ R 2 σ D 2 h R D 2 P R ,
α CF = min max h S R 2 P S + ζ σ ¯ R 2 + Q R 2 r ¯ P 1 h S R 2 P S 2 r ¯ P , α ¯ , 1 ,
which yields
r C , CF = min log 2 1 + γ S R , min 1 + γ S R , min + 1 γ R D 1 r ¯ P , log 2 1 + γ S R , min 1 α ¯ 1 + γ S R , min + 1 γ R D 1 .
We refer readers to [24] for detail.

4.3. AF Relay

In our previous work [24], we discovered that the optimal power allocation and the resultant covert rates for our considered CF and AF relay systems coincide with each other, i.e.,
α A F = α C F ,
for (P3). It is easily seen that the CF public rate r P , CF in (8) and covert rate r C , CF in (9) are equivalent to (11) and (12), respectively, when the CF relay employs an adequate quantization strategy with the optimal quantization noise Q R in (28), i.e., Q R = σ ˜ D 2 . The resulting optimal covert rate for the AF relay is accordingly given by
r C , AF = r C , CF .
We refer readers to [24] for detail.

5. Performance Comparison with Relay Processing Delay

We now examine the optimal covert rates of different types of relays by taking the processing delay into account. Since Section 4.3 and [24] revealed that the optimal power distributions and covert rates are equivalent for AF and CF relays, here, we concentrate on the comparison between DF and AF assuming that the delay difference the AF and CF is negligible.
The authors in [25] developed the relationship between the codeword lengths of DF relay L D F and AF relay L A F that yield the same processing delay by
L A F 2 1 + δ 2 + δ L D F
in the moderate to high transmit power regime for a delay factor δ 0 . We note that δ = 0 indicates an equal processing delay while high δ means a larger difference in processing time between DF and AF. Utilizing (33), the public and covert rates between DF and AF are related by
r P , DF = 2 + δ 2 1 + δ r P , AF and r C , DF = 2 + δ 2 1 + δ r C , AF .
We can thus conduct a delay-aware comparison if r ¯ P of (P1) is first replaced by r ¯ P ( 2 ( 1 + δ ) ) / ( 2 + δ ) , and the obtained r P , DF and r C , DF are scaled by ( 2 + δ ) / ( 2 ( 1 + δ ) ) subsequently. For DF relay, this maintains the minimum required quality of service for public messages in (24) but leads to modification on the covert rate in (27) as
r P , DF , delay = r ¯ P , r C , DF , delay = 2 + δ 2 1 + δ min ( log 2 1 + γ S R , min 2 1 + δ 2 + δ r ¯ P ,
log 2 1 + γ R D 2 1 + δ 2 + δ r ¯ P , log 2 1 + γ R D 1 α ¯ ) ,
respectively.
Let us investigate the asymptotic behaviors of the covert rates with the DF relay in (36) and the AF relay in (32).

5.1. High Source Transmit Power

For high P S ,
r C , DF , delay 2 + δ 2 1 + δ min log 2 1 + γ R D 2 1 + δ 2 + δ r ¯ P , log 2 1 + γ R D 1 α ¯
2 + δ 2 1 + δ log 2 1 + γ R D 1 α ¯ r C , AF min log 2 1 + γ R D r ¯ P , log 2 1 + γ R D 1 α ¯
log 2 1 + γ R D 1 α ¯ ,
where we used the fact that α ¯ 1 for high P S from (23). Comparing (37) and (38), we can thus expect that r C , DF , delay < r C , AF for high P S .

5.2. High Relay Transmit Power

For high P R ,
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , AF min log 2 1 + γ S R , min r ¯ P , log 2 1 + γ S R , min 1 α ¯ .
We further examine the asymptotic performance for different limits of r ¯ P . First, for low r ¯ P 0 ,
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min ,
r C , AF log 2 1 + γ S R , min 1 α ¯ .
We are able to infer that
2 + δ 2 1 + δ log 2 1 + γ S R , min A F D F log 2 1 + γ S R , min 1 α ¯ 2 + δ 2 1 + δ A F D F 0 ,
since α ¯ 1 for typically high DEP threshold ε . “DF” above the inequalities in (43) indicates that r C , DF , delay > r C , AF , and “AF” under them means that r C , DF , delay < r C , AF . Due to δ 0 , we can anticipate that r C , DF , delay > r C , AF .
On the other hand, for high r ¯ P ,
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , AF log 2 1 + γ S R , min r ¯ P ,
from which we can draw
2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P A F D F log 2 1 + γ S R , min r ¯ P 2 + δ 2 1 + δ A F D F 1 .
Since δ 0 , it is predicted that r C , DF , delay < r C , AF .
We now proceed with our discussion on high relay transmit power by studying the impact of other parameters.

5.2.1. High Relay Transmit Power with Low Processing Delay

With low δ 0 , (39) and (40) reduce to
r C , DF , delay log 2 1 + γ S R , min r ¯ P ,
r C , AF min log 2 1 + γ S R , min r ¯ P , log 2 1 + γ S R , min 1 α ¯ .
We have two different cases according to the relative value of r ¯ P . When r ¯ P is set low, (47) and (48) can be approximated as
r C , DF , delay log 2 1 + γ S R , min ,
r C , AF log 2 1 + γ S R , min 1 α ¯ ,
and we predict that r C , DF , delay > r C , AF . In contrast, if r ¯ P is set high, we have
r C , DF , delay log 2 1 + γ S R , min ,
r C , AF log 2 1 + γ S R , min .
It is anticipated that r C , DF , delay = r C , AF in this case.

5.2.2. High Relay Transmit Power with High Processing Delay

With high δ ,
r C , DF , delay 1 2 log 2 1 + γ S R , min r ¯ P ,
r C , AF min log 2 1 + γ S R , min r ¯ P , log 2 1 + γ S R , min 1 α ¯ .
We once again encounter different cases depending on r ¯ P . When r ¯ P is low, (53) and (54) become close to
r C , DF , delay 1 2 log 2 1 + γ S R , min ,
r C , AF log 2 1 + γ S R , min 1 α ¯ .
For a typically high DEP threshold that results in α ¯ 1 . We can thus expect that r C , DF , delay > r C , AF . Next, if r ¯ P is set high, we have
r C , DF , delay 1 2 log 2 1 + γ S R , min r ¯ P ,
r C , AF log 2 1 + γ S R , min r ¯ P .
In this case, it is anticipated that r C , DF , delay < r C , AF .

5.2.3. High Relay Transmit Power with Low DEP Threshold

For low ε 0 , (23) shows that
α ¯ max 1 ζ 1 ζ σ ¯ R 2 2 h S R 2 P S , 0 2 .
Then, based on the noise uncertainty bound ζ , we draw two different results. First, for low ζ 0 dB or 1, we have α ¯ 1 , and (39) and (40) are approximated by
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , AF log 2 1 + γ S R , min 1 α ¯ ,
and r C , DF , delay > r C , AF is predicted.
On the other hand, with high ζ , we have α ¯ 0 , and, as a result,
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , AF log 2 1 + γ S R , min r ¯ P ,
and we can anticipate that r C , DF , delay < r C , AF .

5.2.4. High Relay Transmit Power with High DEP Threshold

For high ε 0.5 , (23) reveals that α ¯ 1 . Then,
r C , DF , delay 2 + δ 2 1 + δ log 2 1 + γ S R , min r ¯ P ,
r C , AF log 2 1 + γ S R , min 1 α ¯ .
It is clear that r C , DF , delay > r C , AF for this case.

5.3. Low Relay Transmit Power

For high P R 0 ,
r C , DF , delay 2 + δ 2 1 + δ min log 2 1 + γ R D 2 1 + δ 2 + δ r ¯ P , log 2 1 + γ R D 1 α ¯ ,
r C , AF min log 2 1 + γ S R , min γ S R , min + 1 γ R D 1 r ¯ P , log 2 1 + γ S R , min 1 α ¯ γ S R , min + 1 γ R D 1 .
In addition, for moderate to high P S with γ S R , min 1 , and (67) is approximately expressed as
r C , AF min log 2 1 + γ R D r ¯ P , log 2 1 + γ R D 1 α ¯ .
Thus, r C , DF , delay < r C , AF is expected.

6. Numerical Results

We assess and compare the covert communication performance in the considered relay systems through numerical simulations. The nodes are placed in a straight line as shown in Figure 2, and the channel coefficient h XY between node X and Y for X , Y { S , R , D } is set to be a function of X - Y distance d XY . [32]. Concretely, we let h XY = L XY h ^ XY , where L XY L 0 ( d XY / d 0 ) β means the path loss and the small-scale channel variable h ^ XY follows C N ( 0 , 1 ) from Figure 3, Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8 and other distributions in Figure 9, which are be described in detail. L 0 specifies the path loss at a reference distance d 0 = 1 m, β denotes the path loss exponent.
We consider the following system set-ups unless otherwise stated: the bandwidth W = 20 MHz, R-S distance d R S = 100 m, R-D distance d R D = 100 m, source transmit power P S = 23 dBm, CF relay transmit power P R = 23 dBm, mean noise power at the CF relay σ ¯ R 2 = 160 dBm/Hz, noise uncertainty bound ζ = 5 dB, noise power at the destination node σ D 2 = 160 dBm/Hz, minimum DEP threshold ε = 0.45 , pathloss exponent β = 3.5 , quality of service for public message r ¯ P , D = 1.5 bps/Hz, and processing delay factor δ = 5.0 .
Figure 3 shows the average covert rate r C for a different source transmit power P S . We first observe that the covert rate of every scheme first increases until a certain P S value and then decreases afterwards. We note that α is lower bounded by α ¯ , and it is preferred to have as low α as possible for a high covert rate. When P S is low, (23) shows that α ¯ becomes small. Since r C in (6), (9) and (12) are proportional to P S , a steady increase in P S has a favorable effect on the improvement of covert rates without excessively increasing α ¯ .
On the other hand, if P S increases beyond a certain value, α ¯ increases as much as power allocated to the covert message becomes small. This happens since the uncertainty of the noise σ R 2 at the receiver becomes relatively negligible when P S is large, i.e., σ R 2 0 in (14). Therefore, even a minimal variation in P S makes the detector decide on the existence of covert transmission.
We can also verify that as P S increases, CF and AF outperform DF, as discussed in Section 5.1. Moreover, as the DF processing delay compared to CF or AF decreases, leading to small δ , the figure shows that DF gradually outperforms the others, which corresponds to the conclusion made in Section 5.2.1.
Figure 4 illustrates the average covert rate in the practical range of P R . We notice that DF outperforms CF or AF for high P R since CF or AF compresses or amplifies the noise as well as the actual signal, respectively, which may deteriorate the quality of the received signal at the destination node. In a low P R region, however, CF or AF demonstrates a higher covert rate, which is in accordance with our asymptotic result in Section 5.3.
Figure 5 presents the average covert rate r C for different public rate thresholds r ¯ P . It is observed that every relay scheme experiences a decrement in a covert rate since the optimal values in (27), (30) and (32) are negatively related with r ¯ P .
We also mark that for a short DF processing delay, DF outperforms CF or AF when r ¯ P is low, but for δ > = 5.0 , CF or AF exhibits a higher covert rate when r ¯ P is high with moderate P R = 23 dBm. This corresponds to our analyses in the beginning of Section 5.2 and Section 5.2.2. It is worth noting that, however, the performance of DF, CF and AF tends to converge when r ¯ P is high with a low DF processing delay δ = 0 , which is discussed in Section 5.2.1.
Figure 6 depicts the average covert rate r C as a function of the processing delay factor δ . The figure shows a straightforward result. Specifically, for an intermediate minimum required quality of service for public messages r ¯ P = 1.5 bps/Hz, we see that DF outperforms CF or AF for short DF processing delay, and vice versa for a longer DF processing delay.
Figure 7 compares the average covert rate r C in terms of noise uncertainty bound ζ . The covert rates exhibit unimodality. If ζ is low and there is less variance in σ R 2 , α ¯ approaches one, which results in low covertness. A gradual increase in ζ thus improves covertness by confusing the detector. However, a steady increase in ζ beyond a certain ζ begins to have an adverse impact on the covert rates since the worst-case covert rate has an inverse relationship with ζ in (P1), (P2) and (P3). The figure also verifies that DF tends to outperform CF or AF with low DF processing delay, and the opposite is observed for high processing delay.
Figure 8 displays the average covert rate r C for various minimum DEP threshold ε . We see that the covert rates decline if we impose higher DEP requirements. Moreover, with a moderate DF processing delay δ = 3.0 and a high noise uncertainty ζ = 5 dB, CF or AF outperforms DF when the DEP threshold is low, and vice versa if the DEP threshold is high. This matches our asymptotic analyses in Section 5.2.3 and Section 5.2.4.
Figure 9 provides the average covert rates r C in terms of the public rate threshold r ¯ P under different channel models: Nakagami-m, Weibull and gamma fading [33]. Particularly, we may express the small-scale channel gain | h ^ XY | in a non-linear form as
h ^ XY k = i = 1 m H 1 2 + H 2 2 ,
where H 1 and H 2 are independent and identically distributed Gaussian random variables following N ( 0 , r ^ k / ( 2 m ) ) with r ^ E [ | h ^ XY | k ] 1 / k being a k-root mean value [34]. It can be shown that | h ^ XY | follows Rayleigh fading, as used in the previous figures, by setting k = 2 and m = 1 , Nakagami-m fading by k = 2 , Weibull fading by m = 1 , and gamma fading by k = 1 . To ensure the average small-scale channel gain to be normalized by E [ | h ^ XY | k ] 1 / k = 1 , we here specify r ^ = 1 for all channel models.
Similar to Figure 5, the covert rates of all relay schemes decline since r ¯ P has a negative effect on the optimal values in (27), (30) and (32) regardless of channel models. Another common observation for δ 5.0 in Figure 9 is that DF outperforms CF or AF when r ¯ P is low, but CF or AF outperforms DF when r ¯ P is high with moderate P R = 23 dBm. This also corresponds to the analyses in the beginning of Section 5.2 and Section 5.2.2.
In addition, we can notice that the covert rates are improved for all relay types in the low r ¯ P regime but decline in the high r ¯ P regime when the distribution parameters m or k increase. The reason for such a phenomenon lies in the fact that m or k is inversely proportional to the spread in | h ^ XY | in each channel model. This means that when m or k is lower, there is a relatively higher possibility that | h ^ XY | is sufficiently strong to support a high r ¯ P . In contrast, for a higher m or k, more stable covert and public rates are achievable with reduced randomness in | h ^ XY | , but only until a certain r ¯ P . To summarize, it becomes easier to meet high r ¯ P when m or k is lower, while higher and more stable rates can be achieved when m or k is higher for Nakagami-m, Weibull and gamma fading.

7. Conclusions

In this paper, we conducted an extensive performance comparison on covert communications among DF, CF and AF relay systems by taking the decoding processing delay into consideration. To this end, we first provided closed-form power distribution solutions between public and covert messages and the corresponding optimal covert rates for each relay protocol, extending our previous results in [24]. Then, we developed delay-aware expressions of the achievable covert rate for each type of relays by adopting the delay relationship in [25]. For high source transmit power or low relay transmit power, our analysis showed that CF or AF tends to outperform DF. For high relay transmit power, various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power. Numerical results verify our investigation on the performance comparison in various channel models. The results of this paper can provide a useful guideline in an environment where multiple relays with different forwarding protocols exist or where a single relay is capable of selecting either DF, CF or AF. We suggest such covert communications scenarios as interesting future works.

Funding

This research was partially supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2021R1I1A3050126). This work was partially supported by Korea Research Institute for defense Technology planning and advancement (KRIT) grant funded by the Korea government (DAPA (Defense Acquisition Program Administration)) (21-106-A00-007, Space-Layer Intelligent Communication Network Laboratory, 2022).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Ko, S.-W.; Chae, H.; Han, K.; Lee, S.; Seo, D.-W.; Huang, K. V2X-Based Vehicular Positioning: Opportunities, Challenges, and Future Directions. IEEE Wirel. Commun. 2021, 28, 144–151. [Google Scholar] [CrossRef]
  2. Qazi, S.; Khawaja, B.A.; Farooq, Q.U. IoT-Equipped and AI-Enabled Next Generation Smart Agriculture: A Critical Review, Current Challenges and Future Trends. IEEE Access 2022, 10, 21219–21235. [Google Scholar] [CrossRef]
  3. Zhang, J.; Yan, Z.; Fei, S.; Wang, M.; Li, T.; Wang, H. Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond? IEEE Netw. 2022, 36, 105–112. [Google Scholar] [CrossRef]
  4. Forouzan, B.A. Cryptography and Network Security; McGraw-Hill: New York, NY, USA, 2007. [Google Scholar]
  5. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  6. Angueira, P.; Val, I.; Montalbán, J.; Seijo, Ó.; Iradier, E.; Fontaneda, P.S.; Fanari, L.; Arriola, A. A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry. IEEE Commun. Surv. Tutor. 2022, 24, 810–838. [Google Scholar] [CrossRef]
  7. Jiang, X.; Chen, X.; Tang, J.; Zhao, N.; Zhang, X.Y.; Niyato, D.; Wong, K.-K. Covert Communication in UAV-Assisted Air-Ground Networks. IEEE Wirel. Commun. 2021, 28, 190–197. [Google Scholar] [CrossRef]
  8. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef]
  9. Hu, J.; Yan, S.; Zhou, X.; Shu, F.; Li, J.; Wang, J. Covert Communication Achieved by a Greedy Relay in Wireless Networks. IEEE Trans. Wirel. Commun. 2018, 17, 4766–4779. [Google Scholar] [CrossRef]
  10. Lv, L.; Li, Z.; Ding, H.; Al-Dhahir, N.; Chen, J. Achieving Covert Wireless Communication with a Multi-Antenna Relay. IEEE Trans. Inf. Forensics Secur. 2022, 17, 760–773. [Google Scholar] [CrossRef]
  11. Hu, J.; Yan, S.; Shu, F.; Wang, J. Covert Transmission with a Self-Sustained Relay. IEEE Trans. Wirel. Commun. 2019, 18, 4089–4102. [Google Scholar] [CrossRef]
  12. Wang, J.; Tang, W.; Zhu, Q.; Li, X.; Rao, H.; Li, S. Covert Communication with the Help of Relay and Channel Uncertainty. IEEE Wirel. Commun. Lett. 2019, 8, 317–320. [Google Scholar] [CrossRef]
  13. Sun, R.; Yang, B.; Ma, S.; Shen, Y.; Jiang, X. Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control. IEEE Trans. Commun. 2021, 69, 6198–6212. [Google Scholar] [CrossRef]
  14. Fu, Z.; Ju, B.; Moon, J.; Hwang, S.; Lee, I. Covert Communications in Two-way Relay Systems with Energy Harvesting. In Proceedings of the 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022; pp. 985–989. [Google Scholar]
  15. Deng, D.; Li, X.; Dang, S.; Gursoy, M.C.; Nallanathan, A. Covert Communications in Intelligent Reflecting Surface-Assisted Two-Way Relaying Networks. IEEE Trans. Veh. Technol. 2022, 71, 12380–12385. [Google Scholar] [CrossRef]
  16. Wang, M.; Xu, Z.; Xia, B.; Guo, Y.; Chen, Z. DF Relay Assisted Covert Communications: Analysis and Optimization. IEEE Trans. Veh. Technol. 2023, 72, 4073–4078. [Google Scholar] [CrossRef]
  17. Forouzesh, M.; Azmi, P.; Kuhestani, A. Secure Transmission with Covert Requirement in Untrusted Relaying Networks. In Proceedings of the 2018 9th International Symposium on Telecommunications (IST), Tehran, Iran, 17–19 December 2018; pp. 670–675. [Google Scholar]
  18. Forouzesh, M.; Khodadad, F.S.; Azmi, P.; Kuhestani, A.; Ahmadi, H. Simultaneous Secure and Covert Transmissions against Two Attacks under Practical Assumptions. IEEE Internet Things J. 2023, 10, 10160–10171. [Google Scholar] [CrossRef]
  19. Bai, J.; He, J.; Chen, Y.; Shen, Y.; Jiang, X. On Covert Communication Performance with Outdated CSI in Wireless Greedy Relay Systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2920–2935. [Google Scholar] [CrossRef]
  20. Su, Y.; Sun, H.; Zhang, Z.; Lian, Z.; Xie, Z.; Wang, Y. Covert Communication with Relay Selection. IEEE Wirel. Commun. Lett. 2021, 10, 421–425. [Google Scholar] [CrossRef]
  21. Forouzesh, M.; Azmi, P.; Kuhestani, A.; Yeoh, P.L. Covert Communication and Secure Transmission over Untrusted Relaying Networks in the Presence of Multiple Wardens. IEEE Trans. Commun. 2020, 68, 3737–3749. [Google Scholar] [CrossRef]
  22. Yu, X.; Yan, S.; Hu, J.; Haskell-Dowl, P.; Han, Y.; Ng, D.W.K. On Relaying Strategies in Multi-Hop Covert Wireless Communications. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 666–672. [Google Scholar]
  23. Gao, C.; Yang, B.; Jiang, X.; Inamura, H.; Fukushi, M. Covert Communication in Relay-Assisted IoT Systems. IEEE Internet Things J. 2021, 8, 6313–6323. [Google Scholar] [CrossRef]
  24. Moon, J. Covert Communications in a Compress-and-Forward Relay System. ICT Express, 2023; in press. [Google Scholar] [CrossRef]
  25. Makki, B.; Alouini, M.-S. End-to-End Performance Analysis of Delay-Sensitive Multi-Relay Networks. IEEE Commun. Lett. 2019, 23, 2159–2163. [Google Scholar] [CrossRef]
  26. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication with Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  27. Si, J.; Li, Z.; Zhao, Y.; Cheng, J.; Guan, L.; Shi, J.; Al-Dhahir, N. Covert Transmission Assisted by Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 5394–5408. [Google Scholar] [CrossRef]
  28. Ta, H.Q.; Ho-Van, K.; da Costa, D.B.; Kim, S.W.; Oh, H. Covert Communications over Non-Orthogonal Multiple Overt Channels. IEEE Access 2022, 10, 122361–122375. [Google Scholar] [CrossRef]
  29. Park, S.-H.; Simeone, O.; Sahin, O.; Shitz, S.S. Fronthaul Compression for Cloud Radio Access Networks: Signal processing advances inspired by network information theory. IEEE Signal Process. Mag. 2014, 31, 69–79. [Google Scholar] [CrossRef]
  30. Gamal, A.E.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  31. Kim, S.W.; Ta, H.Q. Covert Communications over Multiple Overt Channels. IEEE Trans. Commun. 2022, 70, 1112–1124. [Google Scholar] [CrossRef]
  32. Moon, J.; Simeone, O.; Park, S.-H.; Lee, I. Online Reinforcement Learning of X-Haul Content Delivery Mode in Fog Radio Access Networks. IEEE Signal Process. Lett. 2019, 26, 1451–1455. [Google Scholar] [CrossRef]
  33. Yacoub, M.D. The α-η-κ-μ Fading Model. IEEE Trans. Antennas Propag. 2016, 64, 3597–3610. [Google Scholar] [CrossRef]
  34. Yacoub, M.D. The α-μ Distribution: A Physical Fading Model for the Stacy Distribution. IEEE Trans. Veh. Technol. 2007, 56, 27–34. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 23 08747 g001
Figure 2. Node placements.
Figure 2. Node placements.
Sensors 23 08747 g002
Figure 3. Average covert rate versus source transmit power with δ = 5.0 .
Figure 3. Average covert rate versus source transmit power with δ = 5.0 .
Sensors 23 08747 g003
Figure 4. Average covert rate versus relay transmit power with δ = 5.0 .
Figure 4. Average covert rate versus relay transmit power with δ = 5.0 .
Sensors 23 08747 g004
Figure 5. Average covert rate versus minimum quality of service for public messages with δ = 5.0 .
Figure 5. Average covert rate versus minimum quality of service for public messages with δ = 5.0 .
Sensors 23 08747 g005
Figure 6. Average covert rate versus processing delay factor.
Figure 6. Average covert rate versus processing delay factor.
Sensors 23 08747 g006
Figure 7. Average covert rate versus noise uncertainty bound with δ = 5.0 .
Figure 7. Average covert rate versus noise uncertainty bound with δ = 5.0 .
Sensors 23 08747 g007
Figure 8. Average covert rate versus minimum DEP threshold with δ = 5.0 .
Figure 8. Average covert rate versus minimum DEP threshold with δ = 5.0 .
Sensors 23 08747 g008
Figure 9. Average covert rate versus minimum quality of service for public messages with δ = 5.0 and different channel models.
Figure 9. Average covert rate versus minimum quality of service for public messages with δ = 5.0 and different channel models.
Sensors 23 08747 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Moon, J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors 2023, 23, 8747. https://doi.org/10.3390/s23218747

AMA Style

Moon J. Performance Comparison of Relay-Based Covert Communications: DF, CF and AF. Sensors. 2023; 23(21):8747. https://doi.org/10.3390/s23218747

Chicago/Turabian Style

Moon, Jihwan. 2023. "Performance Comparison of Relay-Based Covert Communications: DF, CF and AF" Sensors 23, no. 21: 8747. https://doi.org/10.3390/s23218747

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop