Next Article in Journal
Advances in Video Emotion Recognition: Challenges and Trends
Previous Article in Journal
TFF-Net: A Feature Fusion Graph Neural Network-Based Vehicle Type Recognition Approach for Low-Light Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Communications via Full-Duplex User Relaying

by
Jong Yeol Ryu
1 and
Jung Hoon Lee
2,*
1
Department of AI Information Engineering, Gyeongsang National University, Jinju 52828, Republic of Korea
2
Department of Electronics Engineering and Applied Communications Research Center, Hankuk University of Foreign Studies (HUFS), Yongin 17035, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(12), 3614; https://doi.org/10.3390/s25123614
Submission received: 10 April 2025 / Revised: 28 May 2025 / Accepted: 5 June 2025 / Published: 9 June 2025
(This article belongs to the Section Internet of Things)

Abstract

In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement. In our system model, Alice (transmitter) sends regular data to Carol (regular user) and occasionally embeds covert data for Bob (covert user). Meanwhile, Willie (warden) monitors for covert transmissions. Carol assists Alice by acting as a full-duplex DF relay, decoding both data types via successive interference cancellation and relaying covert data using phase steering and power allocation to confuse Willie. Our proposed scheme adopts a novel approach in which the covert data received by Willie is perfectly canceled, optimizing Alice’s and Carol’s transmissions to maximize the covert rate while keeping Willie’s detection probability below a given threshold.

1. Introduction

As wireless security becomes increasingly critical, covert communication has emerged as a key technique for securing future wireless systems [1]. While conventional physical-layer security techniques aim to protect messages from eavesdroppers [2], covert communication techniques focus on preventing exposure of the transmission’s presence to wardens. Consequently, covert communications can offer stronger security than conventional physical-layer security techniques. Recently, due to their potential for various applications, such as military communications, covert communication techniques have been intensively investigated [3,4,5,6,7,8,9,10].
The information-theoretic limit of covert communication was studied in [3]. The authors derived the square root law for additive white Gaussian noise (AWGN) channels, showing that the transmitter can covertly transmit O ( n ) bits over n channel uses. Various conditions for achieving a positive covert rate were discussed in [4,5]; it was demonstrated that a positive covert rate can be obtained when the warden has uncertainty about the channel state information [4] or the background noise power [5]. Friendly jammer-assisted covert communication systems were considered in [6,7]. The authors of [6] optimized the covert rate in scenarios where wardens and jammers are randomly distributed across the network. Also, the authors of [7] introduced a threshold-based uncoordinated jammer selection scheme to counteract the warden’s efforts.
To further increase the covert rate, covert communication systems leveraging relay nodes were investigated in [8,9,10]. In these studies, the relay plays a dual role, that is, as a helper, cooperatively forwarding covert data to enhance the quality of the covert signal, and as a friendly jammer. The authors of [8] proposed full-duplex amplify-and-forward (AF) relaying for covert rate maximization. In [8], the relay node acts as a jammer when the transmitter does not send covert data and as an AF relay when covert data is transmitted. The authors optimized the relay power to maximize the covert rate while satisfying covertness constraints. A decode-and-forward (DF) relay-assisted covert communication system was considered in [9]. The authors jointly optimized the beamformers at the transmitter and the relay to exploit the benefits of both the direct and relay links. Recently, covert communication systems coexisting with relays and jammers were introduced in [10]. In [10], relay selection schemes and corresponding cooperative jamming strategies were proposed, and power control was optimized for covert rate maximization. The authors of [11] showed that the covert transmission of O ( n ) bits over n channel uses can be achieved with the help of a relay under channel uncertainty. Also, the authors of [12] optimized covert communications with multiple relays in the presence of an active warden.
In this paper, we propose a novel approach to covert communication using a user relay, where the relay’s role is to entirely cancel the covert signal at the warden through joint power optimization with the transmitter. In previous literature [8,9,10,11,12], the role of the relay in covert communications has been somewhat limited. In most works, the relay either transmits jamming signals to confuse Willie’s detection or functions as a conventional relay by forwarding Bob’s signal to enhance his received signal strength. In contrast, our proposed approach designs the relay to perfectly nullify the covert signals at Willie. This cancellation enables Alice to allocate more power to the covert data, thereby increasing the covert rate while still satisfying the covertness constraint. To the best of our knowledge, this represents a novel approach to utilizing a relay in covert communication, which has not been explored in existing studies. We first formulate a joint optimization problem for the transmitter and the user relay, incorporating constraints on the user relay’s quality of service (QoS), covert signal cancellation at the warden, and the covertness requirement. We then derive closed-form solutions for the optimal power allocation of the transmitter and the user-relaying strategy that maximizes the covert data rate. The numerical results demonstrate that our proposed approach significantly enhances the covert rate compared to other reference schemes.

2. System Model

2.1. System Configuration

Our system model is illustrated in Figure 1. We consider a covert communication system, which comprises Alice (a transmitter), Bob (a covert user), Carol (a regular user, and Willie (a warden). Alice consistently transmits regular data to Carol, while occasionally transmitting covert data to Bob by superimposing it onto the regular data. At the same time, Willie observes the received signal and attempts to identify the covert data transmission between Alice and Bob. In our system model, Carol is a full-duplex DF relay [13,14,15] and assists Alice’s covert data transmission to Bob. During covert data transmission, Carol first decodes her own data and then decodes the superimposed covert data using successive interference cancellation (SIC). Since Carol is a regular user who is always served by Alice, regardless of whether Alice is transmitting covert data, we assume that Carol first decodes her desired signal rather than the covert data. From the perspective of power-domain non-orthogonal multiple access (NOMA), it is natural that the signal with the higher power in the superposed signal is decoded first. In our case, it is more likely that Carol’s received power for regular data is larger than the received power for covert data. Therefore, it makes sense for Carol to decode her desired data first. Then, Carol transmits the covert data to Bob after applying appropriate phase steering and power allocation.
We assume that every node is equipped with a single antenna, and denote by { h a b , h a c , and h a w } the channels from Alice to {Bob, Carol, and Willie}, respectively. Also, we denote by { h c b and h c w } the channels from Carol to {Bob and Willie}, respectively. The self-interference channel of Carol caused by full-duplex relaying is denoted by h c c . Each channel is modeled by a Rayleigh fading channel, such that h i j CN ( 0 , γ i j ) for i , j { a , b , c , w } , where γ i j is the average channel gain of h i j , i.e., γ i j E | h i j | 2 .

2.2. Signal Models

In our system model, Alice may transmit either only the regular message (Carol’s) or both the regular message and the covert message to Bob (Bob’s). These correspond to two hypotheses, H 0 (only the regular message) and H 1 ( H 0 c ) (regular and covert messages). Thus, the transmit signal at Alice can be represented by
H 0 : x = P a x c                                                                  
H 1 : x = ( 1 α ) P a x c + α P a x b ,
where x c C and x b C denote the regular data for Carol and the covert data for Bob, respectively, such that E | x c | 2 = E | x b | 2 = 1 . Also, P a denotes Alice’s transmit power budget, and α [ 0 , 1 ] denotes the power portion for the covert data.
As a result, the received signal at Carol becomes
H 0 : y c = P a h a c x c + n c                                                                                          
H 1 : y c = h a c ( ( 1 α ) P a x c + α P a x b ) + v c + n c ,
where v c denotes the self-interference caused by full-duplex relaying and n c CN ( 0 , σ c 2 ) represents circularly symmetric complex Gaussian noise at Carol. When H 0 holds, Carol’s achievable rate becomes
H 0 : R c = log 2 1 + P a | h a c | 2 σ c 2 .
On the other hand, when H 1 holds, Carol first decodes her desired signal x c while treating x b as interference, resulting in the achievable rate given by
H 1 : R c = log 2 1 + ( 1 α ) P a | h a c | 2 α P a | h a c | 2 + p c | h c c | 2 + σ c 2 ,
where Carol uses a transmit power p c for user relaying, and, thus, the self-interference power is given by p c | h c c | 2 . Note that, since perfect self-interference cancellation is difficult to achieve, the residual self-interference power is modeled by the self-interference channel gain | h c c | 2 , where | h c c | 2 = 0 corresponds to perfect self-interference cancellation [16]. In this case, Carol’s QoS should be guaranteed during the covert data transmission as follows (assuming that P a is large enough so that Carol’s QoS is achieved when H 0 holds).
R c R for H 1 ,
where R denotes the minimum required rate for Carol. Then, by applying SIC, Carol’s achievable rate for covert data becomes
H 1 : R b Carol = log 2 1 + α P a | h a c | 2 p c | h c c | 2 + σ c 2 .
In our scheme, Carol assists with the covert transmission to Bob by acting as a DF user relay; Carol transmits x b to Bob using the transmit power, p c , after applying a phase steering parameter, w c , i.e., p c w c x b . In this case, p c P c and | w c | = 1 must be satisfied, where P c denotes Carol’s maximum transmit power budget.
Therefore, the received signal at Bob becomes as follows:
H 0 : y b = P a h a b x c + n b                                                                                                                        
H 1 : y b = h a b ( ( 1 α ) P a x c + α P a x b ) + p c h c b w c x b + n b = h a b ( 1 α ) P a x c + h ˜ b x b + n b ,
where n b CN ( 0 , σ b 2 ) represents complex Gaussian noise at Bob, and h ˜ b denotes the effective channel at Bob for the covert data given by
h ˜ b α P a h a b + p c h c b w c .
In the DF relaying system, since the data should be decoded by both the relay and the destination, the achievable rate is bounded by the minimum of the achievable rates at these two nodes [17]. Therefore, from (8) and (10), we obtain the achievable rate of Bob as follows:
R b = log 2 1 + min α P a | h a c | 2 p c | h c c | 2 + σ c 2 , | h ˜ b | 2 ( 1 α ) P a | h a b | 2 + σ b 2 .
Also, the received signal at Willie is given by
H 0 : y w = P a h a w x c + n w                                                                                                                        
H 1 : y w = h a w ( ( 1 α ) P a x c + α P a x b ) + p c h c w w c x b + n w = ( 1 α ) P a h a w x c + h ˜ w x b + n w ,
where n w CN ( 0 , σ w 2 ) is the complex Gaussian noise at Willie, and h ˜ w is an effective channel experienced by the covert data x b at Willie, given by
h ˜ w α P a h a w + p c h c w w c .

2.3. Covert Communication Requirement

According to the Neyman–Pearson criterion, Willie decides between the hypotheses based on the received signal power measured by a radiometer (or power detector) as
Y w = y w 2 D 1 D 0 ϕ ,
where D 0 and D 1 denote Willie’s decisions to accept hypotheses H 0 and H 1 , respectively, and ϕ is a decision threshold.
In general, the priori probabilities of H 0 and H 1 are assumed to be equal [9]. In this case, the detection error probability at Willie becomes
ξ Pr D 1 | H 0 + Pr D 0 | H 1 ,
where Pr D 1 | H 0 and Pr D 0 | H 1 correspond to the false alarm and the miss detection probabilities, respectively.
In this paper, we consider that covert communication is achieved when the detection probability of Willie is less than a predefined value ϵ , which we refer to as a covertness requirement. In other words, to achieve covert communication, the detection error probability of Willie should be larger than or equal to 1 ϵ , i.e., ξ 1 ϵ .
Let P 0 and P 1 denote the probability distributions of Willie’s observation (i.e., y w ) under H 0 and H 1 , respectively. Then, by taking the optimal value of ϕ , which minimizes the detection error probability, Willie’s corresponding detection error probability in (16) can be represented by the following [3]:
ξ = 1 V P 0 , P 1 ,
where V P 0 , P 1 denotes the total variation between P 0 and P 1 . However, in general, it is difficult to calculate V P 0 , P 1 analytically. Thus, using Pinsker’s inequality [18], we obtain a lower bound for the detection error probability given by
ξ 1 1 2 D P 0 P 1 ,
In (18), D P 0 P 1 denotes the Kullback–Leibler (KL) divergence from P 0 to P 1 given by
D P 0 P 1 p 0 y w ln p 0 y w p 1 y w d y ,
where p 0 y w and p 1 y w are the probability densities of P 0 and P 1 , respectively.
From (12) and (13), the probability densities p 0 y w and p 1 y w can be obtained as
p 0 y w = 1 π ( P a | h a w | 2 + σ w 2 ) exp y w 2 P a | h a w | 2 + σ w 2      
p 1 y w = 1 π ( ( 1 α ) P a | h a w | 2 + | h ˜ w | 2 + σ w 2 ) × exp y w 2 ( 1 α ) P a | h a w | 2 + | h ˜ w | 2 + σ w 2 .
Substituting (20) and (21) into (19), the KL divergence can be summarized as follows:
D ( P 0 P 1 ) = ln ( 1 α ) P a | h a w | 2 + | h ˜ w | 2 + σ w 2 P a | h a w | 2 + σ w 2 + P a | h a w | 2 + σ w 2 ( 1 α ) P a | h a w | 2 + | h ˜ w | 2 + σ w 2 1 .
Also, from (18), the covertness constraint can be rewritten as
D P 0 P 1 2 ϵ 2 .

3. Problem Formulation and Our Proposed Solution

In this paper, our goal is to maximize Bob’s covert rate while satisfying both the covertness constraint given in (23) and the QoS constraint of Carol given in (7). Thus, we jointly optimize Alice’s transmission strategy (power allocation for covert data) and Carol’s relaying strategy (power allocation and phase steering) by solving the following problem.
( P 1 ) maximize α , p c , w c R b                                     subject to R c R ,
                                                                                                                                        D P 0 P 1 2 ϵ 2 ,                                                                                                                                         0 α 1 , p c P c , | w c | 2 = 1 .
However, problem ( P 1 ) is hard to solve directly due to the complexity of the constraint (25). Thus, in our proposed scheme, Carol constructs the relaying signal such that the covert data is perfectly nullified at Willie’s end, resulting in h ˜ w = 0 in (13).
By adding the covert data cancellation constraint at Willie, we solve the alternative problem as follows:
( P 2 ) maximize α , p c , w c R b subject to R c R , D P 0 P 1 2 ϵ 2 , 0 α 1 , p c P c , | w c | 2 = 1 , h ˜ w = 0 .
To solve problem ( P 2 ) , we first find Carol’s transmit power and phase steering, i.e., p c and w c , from the constraint (26). Let the phase steering of Carol be w c e j θ steer . Then, we can rewrite h ˜ w in (14) as follows:
h ˜ w = α P a | h a w | e j θ a w + p c | h c w | e j ( θ c w θ steer ) ,
where θ a w and θ c w are the phases of the channels h a w and h c w , respectively. To satisfy (26), it should be satisfied in (27) that
α P a | h a w | = p c | h c w | and θ a w = θ c w θ steer + π .
Thus, we obtain Carol’s power allocation p c and phase steering w c e j θ steer to perfectly nullify the covert signal received at Willie as follows:
p c α P a · | h c w | 2 | h a w | 2 θ steer θ c w θ a w + π .
Meanwhile, we can observe from (28) that Carol’s relaying power is coupled with α , which is the power portion for covert data at Alice.
Substituting p c and w c into (11), the covert rate R b becomes
R b = log 2 1 + min α P a | h a c | 2 α P a | h ¯ c | 2 + σ c 2 , α P a | h ¯ b | 2 ( 1 α ) P a | h a b | 2 + σ b 2 ,
where h ¯ c | h c w | · | h c c | | h a w | and h ¯ b h a b + | h a w | 2 | h c w | 2 h c b w c . In this case, based on the fact that E | h ¯ b | 2 E | h a b | 2 , with our proposed user-relaying scheme, we can observe that Bob enjoys a higher channel gain in the average sense.
Now, we determine α , the optimal power portion for Alice’s covert data transmission. Since the covert rate given in (29) is an increasing function of α , the value of α should be chosen as large as possible, but it is restricted by three bounds.
First, in (28), Carol’s transmit power should satisfy p c P c , so we have the first upper bound of α as
α α ¯ 1 P c P a . | h a w | 2 | h c w | 2 .
Second, from h ˜ w = 0 , the KL divergence in (22) is simplified to
D P 0 P 1 = ln ( 1 α ) P a | h a w | 2 + σ w 2 P a | h a w | 2 + σ w 2 + P a | h a w | 2 + σ w 2 ( 1 α ) P a | h a w | 2 + σ w 2 1 .
The partial derivative of KL divergence in (31) with respect to α is satisfied, so that D ( P 0 P 1 ) / α 0 for any α [ 0 , 1 ] . Thus, the KL divergence is a monotonically increasing function of α in the range of 0 α 1 , and has the maximum value at α = 1 . Thus, the constraint D P 0 P 1 2 ϵ 2 yields the second upper bound of α as
α α ¯ 2 ,
where α ¯ 2 = 1 if D P 0 P 1 | α = 1 2 ϵ 2 , and
α ¯ 2 P a | h a w | 2 + σ w 2 P a | h a w | 2 1 exp W 1 e 1 + 2 ϵ 2 + 1 + 2 ϵ 2 ,
otherwise, where W ( x ) is the Lambert W function.
Third, Carol’s QoS constraint R c R yields the third upper bound of α as
α α ¯ 3 P a | h a c | 2 ( 2 R 1 ) σ c 2 P a 2 R | h a c | 2 + ( 2 R 1 ) | h ¯ c | 2 .
As mentioned earlier, the covert rate given in (29) is an increasing function of α , so we should choose the value of α as large as possible. At the same time, the value of α is limited by three upper bounds, that is, (30), (32) and (33). Thus, we obtain the optimal value of α as follows:
α = min α ¯ 1 , α ¯ 2 , α ¯ 3 .
Note that our proposed scheme can be readily extended to the case when there are multiple user relays. When there are K user relays, we can consider the relay selection scheme based on our proposed scheme. Assuming that the user relay k is selected, we solve problem ( P 2 ) and obtain the optimal solution denoted by ( α ( k ) , p c ( k ) , w c ( k ) ) . After solving problem ( P 2 ) for all K user relays, we choose the best user relay that maximizes the covert rate as follows:
k argmax k { 1 , , K } R b ( k ) α ( k ) , p c ( k ) , w c ( k ) ,
where R b ( k ) is the covert rate achieved by using the user relay k.
Note that although our system model may appear simple, the associated optimization problem remains complex. This is because the optimal covert transmission strategies of Alice and Carol must be jointly optimized and are not easily obtainable in closed form. Based on the key ideas presented in this work, we plan to extend the user-relaying concept to more generalized system models as part of our ongoing research.

4. Numerical Results

In this section, we evaluate our proposed user relaying with the phase steering scheme for covert communication. In our simulations, the average channel gain from Alice to Carol is set to γ a c = 1 , and the average channel gains from Carol to Bob and Willie are set to γ c b = γ c w = 1 , unless otherwise specified. The average (direct) channel gains from Alice to Bob and Willie are set to γ a b = γ a w = 0.5 . The average channel gain of the self-interference is set to γ c c = 0.2 (we assume that the self-interference can be effectively reduced using efficient interference cancellation schemes, such as in [16]). All noise powers are set to be equal, with σ b 2 = σ c 2 = σ w 2 = σ 2 . The transmit powers of Alice and Carol are assumed to be equal, so their transmit signal-to-noise ratio (SNR) becomes ρ P a σ 2 = P c σ 2 . Also, we assume that the required rate of Carol is R = 2 [bit/s/Hz]. For reference schemes, we consider (1) direct transmission without relaying and (2) full-duplex AF relaying for covert transmission [8].
In Figure 2, we first compare the covert rates for various schemes with respect to the transmit SNR, i.e., ρ . The covertness requirement is set to ϵ = 0.2 . In Figure 2, we can observe that the covert rate with every scheme increases as the transmit SNR increases, while our proposed scheme outperforms other reference schemes in all SNR regimes. In addition, we can observe that the performance enhancement of the proposed scheme becomes greater as the transmit SNR increases. This is because, as the transmit power of Alice and Carol increases, Carol can efficiently steer the phase and allocate power to completely cancel the covert signal at Willie. This allows Alice to allocate a larger portion of power for covert data transmission while satisfying the covertness requirement.
Next, we show the impact of the average relay channel gain on the performance of various schemes. In Figure 3, the covert rates of various schemes are plotted with respect to the average relay channel gain, i.e., γ c b . In this case, the transmit SNR is set to ρ = 20 dB, while the covertness requirement is set to ϵ = 0.2 . From Figure 3, we can observe that, compared to direct transmission, the covert rate gain achieved through relaying increases with the average relay channel gain for both AF relaying and the proposed scheme. Meanwhile, AF relaying is inefficient when the relay channel strength is very weak (e.g., when γ c b < 0.3 ) compared to direct transmission without relaying. However, since we determine the power portion for the covert rate at Alice (i.e., α ), the phase steering parameter, and the relaying power at Carol are jointly optimized for a given channel configuration, our proposed scheme outperforms direct transmission even when the relay channel is weak.
We observe how the covertness requirement affects the performance of various schemes. In Figure 4, we show the covert rate of the proposed user relaying and the reference schemes with respect to the covertness requirement, i.e., ϵ . In this case, the transmit SNR is set to ρ = 20 dB. For both schemes, we can observe that the covert rates increase as the covertness requirement increases, and our proposed scheme outperforms the AF relaying scheme for any covertness requirement. Since the power portion for the covert data (i.e., α ) is bounded, as in (32), which is an increasing function with ϵ , Alice can allocate more power to the covert data as ϵ increases. Contrary to the covert rate of AF relaying, which slowly increases according to ϵ , for the region of ϵ > 0.14 , the power portion for the covert data is bounded by the QoS constraint of Carol in (33) rather than (32); hence, the covert rate of our proposed scheme is saturated.
We also evaluate the performance improvement of our proposed scheme via relay selection when there are multiple user relays. In Figure 5, we present the covert rates of various schemes with respect to the number of user relays. In this figure, we set the transmit SNR and the covertness requirement as ρ = 20 dB and ϵ = 0.2 , respectively. From Figure 5, we can observe that, unlike direct transmission, both our proposed relaying scheme and the AF relaying scheme achieve a higher covert rate as the number of user relays increases, benefiting from the diversity gain provided by multiple user relays. However, our proposed scheme achieves a significantly greater diversity gain compared to the AF relaying scheme. This is because the performance of our proposed scheme considers not only the channel gains but also the phase differences between the channels of Willie and the user relays.

5. Conclusions

In this paper, we propose a user-relaying scheme for covert communication networks, where a legitimate user, Carol, acts as a relay to assist with covert data transmission. Our proposed scheme leverages phase adjustment and relaying power control to completely eliminate the covert signal at the warden, Willie, thereby enhancing the covertness of the transmission. Furthermore, we derive the optimal power allocation strategy at Alice to maximize the covert data rate while satisfying both the covertness constraint and the QoS requirement at Carol. The numerical results demonstrate that the proposed scheme outperforms existing approaches in terms of the achievable covert data rate, confirming its effectiveness and potential in practical covert communication scenarios.

Author Contributions

Conceptualization, J.Y.R.; methodology, J.Y.R. and J.H.L.; software, J.Y.R. and J.H.L.; validation, J.Y.R. and J.H.L.; formal analysis, J.Y.R. and J.H.L.; investigation, J.Y.R. and J.H.L.; resources, J.Y.R. and J.H.L.; data curation, J.Y.R. and J.H.L.; writing—original draft preparation, J.Y.R.; writing—review and editing, J.Y.R. and J.H.L.; visualization, J.Y.R. and J.H.L.; supervision, J.Y.R. and J.H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Hankuk University of Foreign Studies Research Fund.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yan, S.; Zhou, X.; Hu, J.; Hanly, S.V. Low probability of detection communication: Opportunities and challenges. IEEE Wirel. Commun. 2019, 26, 19–25. [Google Scholar] [CrossRef]
  2. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  3. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  4. Shahzad, K.; Zhou, X.; Yan, S. Covert communication in fading channels under channel uncertainty. In Proceedings of the IEEE 85th Vehicular Technology Conference (VTC), Sydney, Australia, 4–7 June 2017; pp. 1–5. [Google Scholar]
  5. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On covert communication with noise uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  6. Zheng, T.-X.; Wang, H.-M.; Ng, D.W.K.; Yuan, J. Multi-antenna covert communications in random wireless networks. IEEE Trans. Wirel. Commun. 2019, 18, 1974–1987. [Google Scholar] [CrossRef]
  7. Zheng, T.-X.; Yang, Z.; Wang, C.; Li, Z.; Yuan, J.; Guan, X. Wireless covert communications aided by distributed cooperative jamming over slow fading channels. IEEE Trans. Wirel. Commun. 2021, 20, 7026–7039. [Google Scholar] [CrossRef]
  8. Sun, R.; Yang, B.; Ma, S.; Shen, Y.; Jiang, X. Covert rate maximization in wireless full-duplex relaying system with power allocation. IEEE Trans. Commun. 2021, 69, 6198–6212. [Google Scholar] [CrossRef]
  9. Wang, M.; Xu, Z.; Xia, B.; Guo, Y.; Chen, Z. DF relay assisted covert communications: Analysis and optimization. IEEE Trans. Veh. Technol. 2022, 72, 4073–4078. [Google Scholar] [CrossRef]
  10. Gao, C.; Yang, B.; Zheng, D.; Jiang, X.; Taleb, T. Cooperative jamming and relay selection for covert communications in wireless relay systems. IEEE Trans. Commun. 2024, 72, 1020–1032. [Google Scholar] [CrossRef]
  11. Wang, J.; Tang, W.; Zhu, Q.; Li, X.; Rao, H.; Li, S. Covert communication with the help of relay and channel uncertainty. IEEE Commun. Lett. 2019, 8, 317–320. [Google Scholar] [CrossRef]
  12. Zhao, Q.; Chao, C.; Zheng, D.; Li, Y.; Zheng, X. Covert communication in a multirelay-assisted wireless network with a active warden. IEEE Internet Things J. 2024, 11, 16450–16460. [Google Scholar] [CrossRef]
  13. Ryu, J.; Lee, J.; Quek, T. Trust degree based beamforming for MISO cooperative communication system. IEEE Commun. Lett. 2015, 19, 1957–1960. [Google Scholar] [CrossRef]
  14. Yu, B.; Yang, L.; Cheng, X.; Cao, R. Power and location optimization for full-duplex decode-and-forward relaying. IEEE Trans. Commun. 2015, 63, 4743–4753. [Google Scholar] [CrossRef]
  15. Li, C.; Chen, Z.; Wang, Y.; Yao, Y.; Xia, B. Outage analysis of the full-duplex decode-and-forward two-way relay system. IEEE Trans. Veh. Technol. 2017, 66, 4073–4086. [Google Scholar] [CrossRef]
  16. Everett, E.; Sahai, A.; Sabharwal, A. Passive self-interference suppression for full-duplex infrastructure nodes. IEEE Trans. Wirel. Commun. 2014, 13, 680–694. [Google Scholar] [CrossRef]
  17. Xiong, K.; Fan, P.; Xu, Z.; Yang, H.-C.; Letaief, K.B. Optimal cooperative beamforming design for MIMO decode-and-forward relay channels. IEEE Trans. Signal Process. 2014, 62, 1476–1489. [Google Scholar] [CrossRef]
  18. Cover, T.M.; Thomas, J.A. Elements of Information Theory; Wiley: New York, NY, USA, 2006. [Google Scholar]
Figure 1. Covert communication with user relaying.
Figure 1. Covert communication with user relaying.
Sensors 25 03614 g001
Figure 2. Covert rate vs. the transmit SNR (i.e., ρ ).
Figure 2. Covert rate vs. the transmit SNR (i.e., ρ ).
Sensors 25 03614 g002
Figure 3. Covert rate vs. average relay channel gain (i.e., γ c b ).
Figure 3. Covert rate vs. average relay channel gain (i.e., γ c b ).
Sensors 25 03614 g003
Figure 4. Covert rate vs. covertness requirement (i.e., ϵ ).
Figure 4. Covert rate vs. covertness requirement (i.e., ϵ ).
Sensors 25 03614 g004
Figure 5. Covert rate vs. number of relays.
Figure 5. Covert rate vs. number of relays.
Sensors 25 03614 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ryu, J.Y.; Lee, J.H. Covert Communications via Full-Duplex User Relaying. Sensors 2025, 25, 3614. https://doi.org/10.3390/s25123614

AMA Style

Ryu JY, Lee JH. Covert Communications via Full-Duplex User Relaying. Sensors. 2025; 25(12):3614. https://doi.org/10.3390/s25123614

Chicago/Turabian Style

Ryu, Jong Yeol, and Jung Hoon Lee. 2025. "Covert Communications via Full-Duplex User Relaying" Sensors 25, no. 12: 3614. https://doi.org/10.3390/s25123614

APA Style

Ryu, J. Y., & Lee, J. H. (2025). Covert Communications via Full-Duplex User Relaying. Sensors, 25(12), 3614. https://doi.org/10.3390/s25123614

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop