Performance Comparison of Relay-Based Covert Communications: DF, CF and AF

In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through a relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we optimize the power distribution between the public and covert messages to achieve the maximum covert rate. We further make a delay-aware comparison among DF, CF and AF relay systems with the obtained closed-form covert rates and conduct an extensive examination on the asymptotic behaviors in different limits. Our analyses reveal that CF or AF tend to outperform DF for high source transmit power or low relay transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power. Numerical results verify our investigation into the performance comparison in various channel models.


Introduction
Recent advancements in wireless technology have opened up possibilities to enhance our daily lives.These include applications such as vehicle-to-everything (V2X) communication, low Earth orbit (LEO) satellites, dynamic public safety networks, and the Internet of Things (IoT) [1,2].Meanwhile, as wireless communications technology thrives, the apprehension about safeguarding confidential data is steadily on the rise [3].Cryptographic methods have traditionally been deemed highly efficient in terms of defense [4], but they come with certain drawbacks, such as the intricate process of generating secret keys and susceptibility to eavesdroppers equipped with superior computational capabilities.This has led to the emergence of physical layer security as an alternative approach [5].Its primary advantage lies in its ability to thwart eavesdroppers effectively in wireless connections between legitimate parties and unauthorized entities.This is achieved through techniques including nullifying beamforming using multiple antennas or introducing artificial noise, which potentially mitigates the weaknesses associated with cryptography [6].
While the integration of cryptography and physical layer security can effectively prevent eavesdropping, there is a need for an even higher level of security where the existence of communications should remain hidden [7].Particularly, even if the content of information is unavailable, adversaries may still conduct traffic analysis to gather metadata such as source of packets, the frequency at which request and response packets are transmitted, and even visible e-mail addresses [4].These challenges have given rise to the concept of covert communications or low-probability-of-detection communications [7,8].
The authors in [8] investigated a primitive form of covert communications which consists of a covert transmitter, receiver and a warden.They claimed that a positive covert rate is achieved if the transmitter concurrently transmits public and covert messages, when there exists uncertainty in channel state information (CSI) or in noise level.
The applicability of covert communications has been widely studied in various relaybased communications systems as well.In [9], the authors presented two covert transmission strategies for a greedy amplify-and-forward (AF) half-duplex (HD) relay, which opportunistically transmits a covert message alongside the public message.In a similar context, the authors of [10,11] explored a multi-antenna decode-and-forward (DF) relay and a self-sustained AF relay using time switching and power splitting for energy harvesting, respectively.The work in [12] introduced an AF full-duplex (FD) relay, while [13] presented an AF joint FD/HD relay to support covert transmission.Additionally, [14] examined a two-way AF greedy relay that opportunistically sends covert messages, and [15] explored two-way intelligent reflecting surface-based covert communications.For multi-antenna DF relay-assisted covert communications, [16] analyzed achievable covert rates, considering both direct and relay links.Furthermore, secure communications with covertness requirements were addressed in [17] in the presence of an untrusted relay, and [18] discussed a similar system with an external eavesdropper, incorporating practical assumptions such as warden location uncertainty.
A majority of relay-based covert communications assume that a covert message originates either from relays and is sent on top of the source node [9][10][11]14,19,20] or from the source node such that the whole end-to-end communication needs to be hidden from wardens [12,13,15,16,21,22].On the other hand, it is also possible that the source node transmits both public and covert messages in a way that only the covert portion is kept undetected [23].Such a strategy is necessary when an entity is surrounded by adversaries and wishes to carry out a covert mission in disguise.However, there are a limited number of works on this type of a covert transmission, which requires more attention from the field.
In the fifth-generation (5G) and future communication networks, it is also worth noting that there is an opportunity to create an architecture that utilizes cloud processing for collaborative interference control and centralized computation.Depending on the hardware specifications and service requirements, the process of delivering content from the cloud to the user may employ rapid relaying protocols such as AF and compressand-forward (CF) or a time-consuming but possibly more stable method such as DF.Consequently, it is essential to conduct a comprehensive examination of the potential for covert communications in DF, CF and AF relay systems.Our previous work [24] studied for the first time a CF relay-based covert communications system and a condition in which the CF and AF schemes become equivalent at optimum.Still, to the best of our knowledge, there are not sufficient studies on a performance comparison among DF, CF and AF relay-based covert communications.
In this paper, we generalize the system model of [24] to encompass DF, CF and AF relay protocols.To be specific, a source node that attempts to send both public and covert messages to a destination node through either a DF, CF or AF relay on which a covert message detector is embedded.By taking the minimum detection error probability (DEP) at the relay into account, we obtain the optimal power distribution between the public and covert messages to achieve the maximum covert rate for each relay type.We further make a delay-aware comparison among DF, CF and AF relay systems with closed-form covert rates and conduct an comprehensive examination on the asymptotic behaviors in different limits.Our analyses show that CF or AF tend to outperform DF for high source transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power.Numerical results verify our investigation on the performance comparison.Our contributions can be summarized as follows:

•
Besides the CF and AF relays explored in [24], we provide in this paper the optimal public and covert rates of DF relay-based covert communications for completeness.
We optimize the power distribution between the public and covert messages and obtain a closed-form expression of the achievable covert rate.

•
Noting that DF, CF and AF relays undergo different processing delays in practice, we develop upon the results of [24] and this paper delay-aware expressions of the achievable covert rate for each type of relays by adopting the delay relationship in [25].

•
We then examine and make a delay-aware comparison among the asymptotic behaviors of the achievable covert rates with DF, CF and AF relays in different limits of source and relay transmit power for practical usefulness.

•
Our analyses reveal that CF or AF tend to outperform DF for high source transmit power or low relay transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power.

•
We conduct various numerical examples, and they are in congruence with our studies on the asymptotic behaviors in various channel models.

•
The results of this paper can provide a useful guideline in an environment where multiple relays with different forwarding protocols exist or where a single relay is capable of selecting either DF, CF or AF.We suggest such covert communications scenarios as interesting future works.

System Model 2.1. Received Signals
Figure 1 illustrates the system model under consideration, where the source node S and the destination node D communicates via the relay R. We make an assumption that a direct link between the source and destination nodes is absent due to environmental conditions, such as being located in shadowed areas or being separated by a considerable distance.In addition to transmitting public messages, the source node also attempts to transmit a covert message and wishes that the covert message detector incorporated within the relay fails to identify it.The received signal at the relay is written as where x P ∼ CN(0, 1) and x C ∼ CN(0, 1) indicate the public and covert messages, respectively, P S means the source transmit power, α controls the proportion of P S for x P , and z R ∼ CN(0, σ 2 R ) denotes the additive noise.As in [26,27], we assume that the noise R,dB and ζ dB ≥ 0 stand for the mean and bounded range, respectively.It is assumed that all nodes have access to the global CSI since covert communications are carried out under the normal operation of relay.
We now consider three different types of relays, DF, CF and AF, in the following and derive the expressions for both the public and covert rates at the destination node.

DF Relay
We first note from (1) that the achievable rate for the combined message Once the DF relay succeeds in decoding x S , it is forwarded to the destination node, and the received signal can be shown as where P R is the relay transmit power.The resulting achievable rate for x S in the R-D hop is accordingly given by It is evident from ( 2) and ( 4) that the actual data rate for x S is upper bounded by rS and rR for successful decoding at the relay and destination node.
The destination node first decodes the public message by taking the covert message as interference [28], leading to the achievable rate for the public message of Subsequently, the destination node recovers the covert message by removing the decoded public message, and the achievable rate for the covert message is derived as It is also clear that the actual data rates for x P and x C are limited by r P,DF and r C,DF , respectively.

CF Relay
In the presence of the finite wireless link capacity rR between the CF relay and destination node, the CF relay compresses the signal y R to a lower-resolution form ỹR .Previous works in [29,30] have demonstrated that the Gaussian model of the quantization noise ensures the existence of a quantization codebook as long as the mutual information I(y R ; ỹR ) is less than or equal to the data rate.Consequently, we define q R y R − ỹR CN(0, Q R ), where Q R signifies the degree of compression.The successful decompression condition at the destination node is then described by I(y R ; ỹR ) ≤ rR where After ỹR is successfully decompressed, the destination node decodes the public and covert messages successively as described in Section 2.1.1.Thus, the achievable rates for the public and covert messages can be calculated in a similar manner by

AF Relay
The destination node receives an amplified version of y R from the AF relay as where x R y R / |h SR | 2 P S + σ 2 R represents the normalized unit-power signal from the AF relay.With some manipulations, we can derive the similar achievable rates for the public and covert messages to (5) or (8), and ( 6) or (9) as respectively, where σ2

Covert Message Detection
The covert message detector at the relay is designed to identify the presence of any additional messages apart from the public message.To achieve this, it first removes the public message from the received signal y R .This process results in an effective residual signal zR y R − h SR √ P S x P assuming that the relay perfectly knows h SR and P S [31].We then establish null and alternative hypotheses as where the null hypothesis H 0 represents an event that the source node did not transmit a covert message, and the alternative hypothesis H 1 denotes an event that a covert message exists.With a radiometer [26] as a detection measure, the detector can utilize the sufficient test statistic T for (13) after collecting an N → ∞ number of ample signals, which reduces to the average power E[| zR | 2 ] as and the covert message detector decides that a covert link exists if T ≥ τ for some threshold τ.
The DEP Pr(e) is composed of false alarm and miss probabilities as Pr(e)=Pr(T ≥ τ|H 0 )

Miss
Pr(H 1 ), (15) where the detector assumes that the covert transmission occurs at random, i.e., Pr(H 0 ) = Pr(H 1 ) = 0.5.The optimal τ minimizing the DEP can be obtained from [24] as and the corresponding minimum DEP is also given by [24] Pr(e) as long as 16) yields the worst-case minimum DEP assuming that the detector uses the exact value of α.

Problem Formulation
To make a performance comparison among the three types of relay schemes, we first need to identify the optimal power distribution between the public and covert messages that maximizes the covert rate.Depending on the type of relay, we formulate optimization problems as discussed below.

DF Relay
First, when the DF relay is considered, we solve b P ≤ r P,DF , (18d) Pr(e)| τ=τ ≥ ε, (18f) where b P and b C denote the actual rates for public and covert messages, respectively.We impose the minimum quality of service rP on b P in (18b) and the upper bounds discussed in Section 2.1.1 on both of b P and b C in (18c)-(18e).We also emphasize that (P1) provides the worst-case performance of the covert rate by considering the conservative constraint in (18c).To be specific, we take the lowest possible rS into account by setting σ 2 R = ζ σ2 R .Constraints (18f) and (18g) guarantee a positive minimum DEP for 0 ≤ ε ≤ 0.5, and (18h) sets a feasible region for α.

CF Relay
When the CF relay is implemented, we tackle Pr(e)| τ=τ ≥ ε, (19d) (P2) also provides the worst-case performance by maximizing the worst-case covert rate in (19a) and taking the worst-case compression into consideration such that the minimum amount of quantization error becomes the largest in (19b), both by setting the noise variance at the CF relay to The minimum guaranteed public rate threshold rP is imposed on (19c), and Constraints (19d) and (19e) assure a positive minimum DEP for 0 ≤ ε ≤ 0.5.Lastly, (19f) indicates general feasible regions for α and Q R .

AF Relay
For the AF relay, we optimize subject to: Pr(e)| τ=τ ≥ ε, (20c) Similar to (P2), we maximize the worst-case covert rate in (20a) subject to the worst-case rate for public messages in (20b) by setting the noise variance at the AF relay to 20e) are equivalent to (P1) and (P2).

Proposed Solutions
In this section, we provide the optimal solutions for (P1), (P2) and (P3). ,rR ) to ensure the feasibility, which we assume throughout this subsection.
Constraints (18f) and (18g) can be rewritten by respectively.It is clear that ( 22) is automatically fulfilled when ( 21) is satisfied for 0 ≤ ε ≤ 0.5.Hence, Constraints (18f)-(18h) are reduced to ᾱ ≤ α ≤ 1 with We also note that decreasing b P enlarges the feasible region of b C in (18c) and α in (18d).Therefore, we may simply set the optimal b P to the minimum required rate from (18b), i.e., b P = rP , (24) without loss of optimality.With these in hand, (P1) is reformulated into where Constraint (25b) comes from merging (18c) and (18e), and (25c) is a re-expression of (18d), both using (24).Noticing that the upper bound of b C on the right hand side in (25b) is a decreasing function of α from (6), we can conclude that the optimal α should be as low as possible.That is, and consequently, where It is worth noting that the optimal achievable covert rate is, accordingly, r C,DF = b C .

CF Relay
From our previous work [24], the optimal solutions for (P2) are obtained as which yields We refer readers to [24] for detail.

AF Relay
In our previous work [24], we discovered that the optimal power allocation and the resultant covert rates for our considered CF and AF relay systems coincide with each other, i.e., for (P3).It is easily seen that the CF public rate r P,CF in (8) and covert rate r C,CF in (9) are equivalent to (11) and ( 12), respectively, when the CF relay employs an adequate quantization strategy with the optimal quantization noise Q R in (28), i.e., Q R = σ2 D .The resulting optimal covert rate for the AF relay is accordingly given by r C,AF = r C,CF .
We refer readers to [24] for detail.

Performance Comparison with Relay Processing Delay
We now examine the optimal covert rates of different types of relays by taking the processing delay into account.Since Section 4.3 and [24] revealed that the optimal power distributions and covert rates are equivalent for AF and CF relays, here, we concentrate on the comparison between DF and AF assuming that the delay difference the AF and CF is negligible.
The authors in [25] developed the relationship between the codeword lengths of DF relay L DF and AF relay L AF that yield the same processing delay by in the moderate to high transmit power regime for a delay factor δ ≥ 0. We note that δ = 0 indicates an equal processing delay while high δ means a larger difference in processing time between DF and AF.Utilizing (33), the public and covert rates between DF and AF are related by We can thus conduct a delay-aware comparison if rP of (P1) is first replaced by rP (2(1 + δ))/(2 + δ), and the obtained r P,DF and r C,DF are scaled by (2 + δ)/(2(1 + δ)) subsequently.
For DF relay, this maintains the minimum required quality of service for public messages in ( 24) but leads to modification on the covert rate in (27) as r P,DF,delay = rP , (35) respectively.
Let us investigate the asymptotic behaviors of the covert rates with the DF relay in (36) and the AF relay in (32).

High Source Transmit Power
where we used the fact that ᾱ → 1 for high P S from (23).Comparing (37) and (38), we can thus expect that r C,DF,delay < r C,AF for high P S .

High Relay Transmit Power
We further examine the asymptotic performance for different limits of rP .First, for low rP → 0, We are able to infer that since ᾱ → 1 for typically high DEP threshold ε. "DF" above the inequalities in (43) indicates that r C,DF,delay > r C,AF , and "AF" under them means that r C,DF,delay < r C,AF .Due to δ ≥ 0, we can anticipate that r C,DF,delay > r C,AF .On the other hand, for high rP , from which we can draw Since δ ≥ 0, it is predicted that r C,DF,delay < r C,AF .We now proceed with our discussion on high relay transmit power by studying the impact of other parameters.

High Relay Transmit Power with Low Processing Delay
With low δ → 0, (39) and (40) reduce to r C,DF,delay log 2 (1 + γ SR,min ) − rP , (47) We have two different cases according to the relative value of rP .When rP is set low, (47) and ( 48) can be approximated as and we predict that r C,DF,delay > r C,AF .In contrast, if rP is set high, we have It is anticipated that r C,DF,delay = r C,AF in this case.

High Relay Transmit Power with High Processing Delay
With high δ → ∞, We once again encounter different cases depending on rP .When rP is low, (53) and (54) become close to For a typically high DEP threshold that results in ᾱ → 1.We can thus expect that r C,DF,delay > r C,AF .Next, if rP is set high, we have In this case, it is anticipated that r C,DF,delay < r C,AF .

High Relay Transmit Power with Low DEP Threshold
For low ε → 0, (23) shows that Then, based on the noise uncertainty bound ζ, we draw two different results.First, for low ζ → 0 dB or 1, we have ᾱ → 1, and (39) and ( 40) are approximated by and r C,DF,delay > r C,AF is predicted.On the other hand, with high ζ → ∞, we have ᾱ → 0, and, as a result, and we can anticipate that r C,DF,delay < r C,AF .

High Relay Transmit Power with High DEP Threshold
For high ε → 0.5, (23) reveals that ᾱ 1.Then, It is clear that r C,DF,delay > r C,AF for this case.

Low Relay Transmit Power
For high P R → 0, In addition, for moderate to high P S with γ SR,min 1, and ( 67) is approximately expressed as Thus, r C,DF,delay < r C,AF is expected.

Numerical Results
We assess and compare the covert communication performance in the considered relay systems through numerical simulations.The nodes are placed in a straight line as shown in Figure 2, and the channel coefficient h XY between node X and Y for X, Y ∈ {S, R, D} is set to be a function of X-Y distance d XY .[32].Concretely, we let h XY = √ L XY ĥXY , where L XY L 0 (d XY /d 0 ) −β means the path loss and the small-scale channel variable ĥXY follows CN(0, 1) from Figures 3-8 and other distributions in Figure 9, which are be described in detail.L 0 specifies the path loss at a reference distance d 0 = 1 m, β denotes the path loss exponent.
We consider  Figure 3 shows the average covert rate r C for a different source transmit power P S .We first observe that the covert rate of every scheme first increases until a certain P S value and then decreases afterwards.We note that α is lower bounded by ᾱ, and it is preferred to have as low α as possible for a high covert rate.When P S is low, (23) shows that ᾱ becomes small.Since r C in ( 6), ( 9) and ( 12) are proportional to P S , a steady increase in P S has a favorable effect on the improvement of covert rates without excessively increasing ᾱ.On the other hand, if P S increases beyond a certain value, ᾱ increases as much as power allocated to the covert message becomes small.This happens since the uncertainty of the noise σ 2 R at the receiver becomes relatively negligible when P S is large, i.e., σ 2 R → 0 in (14).Therefore, even a minimal variation in P S makes the detector decide on the existence of covert transmission.
We can also verify that as P S increases, CF and AF outperform DF, as discussed in Section 5.1.Moreover, as the DF processing delay compared to CF or AF decreases, leading to small δ, the figure shows that DF gradually outperforms the others, which corresponds to the conclusion made in Section 5.2.1.
Figure 4 illustrates the average covert rate in the practical range of P R .We notice that DF outperforms CF or AF for high P R since CF or AF compresses or amplifies the noise as well as the actual signal, respectively, which may deteriorate the quality of the received signal at the destination node.In a low P R region, however, CF or AF demonstrates a higher covert rate, which is in accordance with our asymptotic result in Section 5.3.We also mark that for a short DF processing delay, DF outperforms CF or AF when rP is low, but for δ >= 5.0, CF or AF exhibits a higher covert rate when rP is high with moderate P R = 23 dBm.This corresponds to our analyses in the beginning of Sections 5.2 and 5.2.2.It is worth noting that, however, the performance of DF, CF and AF tends to converge when rP is high with a low DF processing delay δ = 0, which is discussed in Section 5.2.1.Figure 9 provides the average covert rates r C in terms of the public rate threshold rP under different channel models: Nakagami-m, Weibull and gamma fading [33].Particularly, we may express the small-scale channel gain | ĥXY | in a non-linear form as where H 1 and H 2 are independent and identically distributed Gaussian random variables following N(0, rk /(2m)) with r E[| ĥXY | k ] 1/k being a k-root mean value [34].It can be shown that | ĥXY | follows Rayleigh fading, as used in the previous figures, by setting k = 2 and m = 1, Nakagami-m fading by k = 2, Weibull fading by m = 1, and gamma fading by k = 1.To ensure the average small-scale channel gain to be normalized by E[| ĥXY | k ] 1/k = 1, we here specify r = 1 for all channel models.Similar to Figure 5, the covert rates of all relay schemes decline since rP has a negative effect on the optimal values in (27), ( 30) and (32) regardless of channel models.Another common observation for δ ≥ 5.0 in Figure 9 is that DF outperforms CF or AF when rP is low, but CF or AF outperforms DF when rP is high with moderate P R = 23 dBm.This also corresponds to the analyses in the beginning of Sections 5.2 and 5.2.2.
In addition, we can notice that the covert rates are improved for all relay types in the low rP regime but decline in the high rP regime when the distribution parameters m or k increase.The reason for such a phenomenon lies in the fact that m or k is inversely proportional to the spread in | ĥXY | in each channel model.This means that when m or k is lower, there is a relatively higher possibility that | ĥXY | is sufficiently strong to support a high rP .In contrast, for a higher m or k, more stable covert and public rates are achievable with reduced randomness in | ĥXY |, but only until a certain rP .To summarize, it becomes easier to meet high rP when m or k is lower, while higher and more stable rates can be achieved when m or k is higher for Nakagami-m, Weibull and gamma fading.

Conclusions
In this paper, we conducted an extensive performance comparison on covert communications among DF, CF and AF relay systems by taking the decoding processing delay into consideration.To this end, we first provided closed-form power distribution solutions between public and covert messages and the corresponding optimal covert rates for each relay protocol, extending our previous results in [24].Then, we developed delay-aware expressions of the achievable covert rate for each type of relays by adopting the delay relationship in [25].For high source transmit power or low relay transmit power, our analysis showed that CF or AF tends to outperform DF.For high relay transmit power, various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power.Numerical results verify our investigation on the performance comparison in various channel models.The results of this paper can provide a useful guideline in an environment where multiple relays with different forwarding protocols exist or where a single relay is capable of selecting either DF, CF or AF.We suggest such covert communications scenarios as interesting future works.

4. 1 .
DF Relay (P1) reveals that the minimum quality of service for public messages rP should satisfy rP ≤ min(r S | σ 2 R =ζ σ2 R the following system set-ups unless otherwise stated: the bandwidth W = 20 MHz, R-S distance d RS = 100 m, R-D distance d RD = 100 m, source transmit power P S = 23 dBm, CF relay transmit power P R = 23 dBm, mean noise power at the CF relay σ2 R = −160 dBm/Hz, noise uncertainty bound ζ = 5 dB, noise power at the destination node σ 2 D = −160 dBm/Hz, minimum DEP threshold ε = 0.45, pathloss exponent β = 3.5, quality of service for public message rP,D = 1.5 bps/Hz, and processing delay factor δ = 5.0.

Figure 5 .
Figure 5. Average covert rate versus minimum quality of service for public messages with δ = 5.0.

Figure 6 .
Figure 6.Average covert rate versus processing delay factor.

Figure 6
Figure 6 depicts the average covert rate r C as a function of the processing delay factor δ. The figure shows a straightforward result.Specifically, for an intermediate minimum

Figure 7
Figure 7 compares the average covert rate r C in terms of noise uncertainty bound ζ.The covert rates exhibit unimodality.If ζ is low and there is less variance in σ 2 R , ᾱ approaches one, which results in low covertness.A gradual increase in ζ thus improves covertness by confusing the detector.However, a steady increase in ζ beyond a certain ζ begins to have an adverse impact on the covert rates since the worst-case covert rate has an inverse relationship with ζ in (P1), (P2) and (P3).The figure also verifies that DF tends to outperform CF or AF with low DF processing delay, and the opposite is observed for high processing delay.