Next Article in Journal
Model-Based Hybrid Control of Pure Pursuit and Stanley Methods for Vehicle Path Tracking
Previous Article in Journal
Intelligent Dental Handpiece: Real-Time Motion Analysis for Skill Development
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Scheme for Covert Communication with a Reconfigurable Intelligent Surface in Cognitive Radio Networks

College of Information Engineering, Taizhou University, Taizhou 225300, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(20), 6490; https://doi.org/10.3390/s25206490
Submission received: 7 September 2025 / Revised: 15 October 2025 / Accepted: 16 October 2025 / Published: 21 October 2025
(This article belongs to the Section Communications)

Abstract

This paper proposes a scheme for enhancing covert communication in cognitive radio networks (CRNs) using a reconfigurable intelligent surface (RIS), which ensures that transmissions by secondary users (SUs) remains statistically undetectable by adversaries (e.g., wardens like Willie). However, there exist stringent challenges in CRNs due to the dual constraints of avoiding detection and preventing harmful interference to primary users (PUs). Leveraging the RIS’s ability to dynamically reconfigure the wireless propagation environment, our scheme jointly optimizes the SU’s transmit power, communication block length, and RIS’s passive beamforming (phase shifts) to maximize the effective covert throughput (ECT) under rigorous covertness constraints quantified by detection error probability or relative entropy while strictly adhering to PU interference limits. Crucially, the RIS configuration is explicitly designed to simultaneously enhance signal quality at the legitimate SU receiver and degrade signal quality at the warden, thereby relaxing the inherent trade-off between covertness and throughput imposed by the fundamental square root law. Furthermore, we analyze the impact of unequal transmit prior probabilities (UTPPs), demonstrating their superiority over equal priors (ETPPs) in flexibly balancing throughput and covertness, and extend the framework to practical scenarios with Poisson packet arrivals typical of IoT networks. Extensive results confirm that RIS assistance significantly boosts ECT compared to non-RIS baselines and establishes the RIS as a key enabler for secure and spectrally efficient next-generation cognitive networks.

1. Introduction

Cognitive radio networks (CRNs) are a fundamental component of modern dynamic spectrum access, designed to alleviate the significant challenge of spectrum scarcity by allowing opportunistic secondary users (SUs) to coexist with authorized primary users (PUs) without causing harmful interference [1,2,3]. To improve spectrum efficiency while protecting communications, effective spectrum sensing and advanced resource allocation strategies are highly dependent on these technologies. However, the inherent openness of the wireless medium introduces significant security risks that go far beyond simple interference [4,5,6].
In the design of wireless communication security frameworks, traditional encryption methods ensure the confidentiality of transmitted data. However, current wireless communication frameworks face a new challenge, which is the detection of wireless communication links by unauthorized entities (referred to as “monitors,” such as Willie). Such detection can compromise the communication process through methods such as interference, location tracking, and traffic analysis. This challenge has spawned a key research area, namely covert communications, also known as low-probability-of-detection (LPD) communications [7,8]. The core goal of covert communications is to ensure that legitimate wireless signals are statistically indistinguishable from background noise within a predefined confidence interval, thereby concealing the wireless communication link [9,10,11].
Implementing covert communications in CRNs is particularly complex. This is due to the following two key constraints: 1. SUs need to remain undetectable to the warden and 2. harmful interference to PUs need to remain below a power temperature threshold. Bash et al. have proposed that these fundamental covert communication constraints lead to an unavoidable square root law: the number of covert transmission bits that can be reliably transmitted is proportional to the square root of the channel utilization (block length), which leads to a decrease in throughput [12]. Furthermore, due to the dynamic and often unpredictable PU activity in CRNs, fluctuating wireless channel conditions, and the complex multi-antenna configurations that the warden may employ, the inherent trade-off between covertness and throughput is further exacerbated by these factors, which significantly increase the difficulty of designing practical and efficient covert communication schemes [13].
A reconfigurable intelligent surface (RIS) is a new technology for dynamic wireless transmission environments, promising improvements in spectral efficiency and physical layer security for next-generation communication networks [14,15,16]. RISs consist of low-cost passive reflective elements. The element independently applies a controllable phase shift (and, in some cases, adjustable amplitude attenuation) to the incident electromagnetic wave. By intelligently configuring these phase-shift parameters, RISs dynamically adjust wireless channel characteristics and focus signal energy toward the intended receiver. Furthermore, RISs can generate signal nulls against potential eavesdroppers and surveillance equipment without establishing dedicated communication links or consuming additional energy [17].
This capability makes RISs exceptionally attractive for addressing the stringent challenges of covert communication in CRNs. While preliminary studies have explored RIS for enhancing physical layer security (PLS) or improving CRN throughput, its application specifically for enabling covert communication within the unique constraints of a CRN remains nascent and demands significant innovation [18]. Crucially, existing studies often overlook the intricate interplay between RIS-assisted channel manipulation, the fundamental square root law of covert communication, the strict PU interference constraints, and the resource allocation requirements (power, block length) inherent in CRNs. Furthermore, leveraging the RIS effectively requires solving complex joint optimization problems involving RIS phase shifts, SU transmission power, block length, and potentially sensing parameters, all under the dual uncertainties of PU activity and Willie’s detection capabilities. This paper, therefore, proposes a novel and comprehensive scheme for RIS-assisted covert communication in CRNs [19].
In our scheme, the SU not only improves the signal quality of the receiver (Bob) but more importantly, it degrades the signal quality of the passive guardian (Willie); the PU ensures its protection. The RIS configuration is carefully designed. Strict covert constraints (quantified by relative entropy or detection error probability) are imposed, the PU is below the interference temperature limit, and the SU problem is rigorously formulated to maximize the practical covert rate.
This is the optimal SU transmit power, communication block length, and RIS. An advanced optimization framework is required to jointly determine the passive beamforming vectors. We examine these complex negotiation mechanisms in detail, the RIS mitigates inherent covert and throughput constraints by actively reshaping signal transmissions, and the PU demonstrates how it dynamically adapts to channel activity and state while achieving significantly higher covert rates compared to unassisted scenarios.
The main contributions of this paper can be summarized as follows:
  • We propose a strategy for covert communication based on RIS assistance. By dynamically configuring the RIS phase-shift parameters, this strategy enhances the signal quality of the target receiver (PR) while also reducing the signal detection probability of the monitoring party (Willie). This strategy achieves two goals: first, it controls harmful interference to the primary user below a threshold; second, it optimizes covert communication performance through channel shaping.
  • We propose and solve an integrated optimization problem to maximize the ECT by jointly controlling the SU transmit power, communication block length, and RIS phase-shift parameters. This problem considers relative entropy and detection error probability to construct covert constraints and introduces an interference threshold for the PU. Furthermore, solving this optimization problem allows for a systematic analysis of the coupling mechanisms between these parameters.
  • We extend the analysis to unequal transmit prior probabilities (UTPPs) and Poisson packet-generation scenarios, showing that UTPP outperforms equal counterparts (ETPP) by flexibly balancing transmission probabilities and covertness. Numerical results validate that RIS deployment, combined with optimized power/block length allocation under UTPP, significantly enhances ECT, particularly in dynamic environments with varying PU activity and channel conditions, establishing RIS as a key enabler for secure CRN covert communication.
Notations: P p represents the transmission power of the primary transmitter (PT), constrained by P max ; L denotes the block length (number of channel uses per transmission) with an upper bound of L max ; ρ 0 and ρ 1 are the prior probabilities of PT being silent and transmitting, respectively, satisfying ρ 0 + ρ 1 = 1 ; λ a is the rate parameter of the Poisson process modeling packet arrivals at PT; T stands for the transmission delay, defined as T = L / B , where B denotes bandwidth; ε indicates the covertness tolerance threshold controlling detection risk; ϑ aggregates path loss and fading effects between PT, RIS, and Willie; η represents effective covert throughput, calculated as η = ρ 1 L R ( 1 δ ) with R as the coding rate and δ as the error probability; Θ denotes the RIS phase-shift matrix optimized for signal alignment; and σ w 2 is the AWGN variance at Willie’s receiver.

2. Related Works

As a key technology for solving the security issues of CRNs, covert communications have received attention in recent years [20,21,22]. Although traditional encryption methods can ensure the security of transmitted messages, they cannot hide the very existence of wireless communication links [23]. This limitation highlights the importance of covert communications. Kang et al. have performed theoretical research that analyzed the inherent constraints of covert communications and have proposed the square root law, which is a theoretical foundation for covert communications [22].
RIS is a technology that promises to revolutionize wireless communications [24,25,26]. By manipulating the phase-shift characteristics of passive reflectors, the wireless transmission environment can be precisely controlled, offering a novel approach to overcoming the physical limitations of traditional communication links. Existing research often fails to fully consider the complex relationship between the channel utilization mechanisms introduced by RIS, the limitations of the square root law inherent in covert communications, and the interference avoidance requirements of PUs. This situation, involving RIS and CRNs, highlights the need for a detailed study of the intersection of covert communications [27].
In recent years, the optimization of covert communication parameters (transmission power, block length, transmission amplification probability, etc.) has been the focus of research [28,29,30]. Its central objective is to find a balance between communication throughput and concealment. Previous studies have mainly used the ETPP framework. However, this framework lacks adaptability to a dynamic environment to simplify the analysis process. Therefore, researchers began to examine the UTPP framework. As a result, UTPP was shown to effectively balance channel uncertainty and the detection capability of monitoring terminals by adjusting the transmission probability distribution, as well as to optimize the communication throughput and concealment exchange [31,32].
Finally, in the field of the Internet of Things (IoT), some research has incorporated the generalized Poisson distribution of packet arrivals into analytical models, aiming to leverage this model to reflect the characteristics of real-world traffic. However, these studies have not considered integration with RIS techniques. Existing optimization frameworks treat resource allocation (power, block length) and channel manipulation (such as RIS-based control) as independent modules, ignoring their synergistic effect on covert communication performance [33].

3. System Model

Consider a finite-block length covert cognitive radio network enhanced by a RIS as depicted in Figure 1, where a single-antenna primary transmitter (PT) communicates with a single-antenna primary receiver (PR) in the presence of a single-antenna warden Willie. Urban propagation environments introduce severe signal fading, causing substantial attenuation and consequent degradation of the received signal-to-noise ratio (SNR). To mitigate this issue, we deploy an RIS-SU to boost the SNR at the legitimate receiver while maintaining communication covertness. The baseband channel between PT and PR ( h p , p C ) combines large-scale path loss ( m p , p R ) and small-scale fading ( g p , p C ) , expressed mathematically as
h p , p = m p , p g p , p .
The RIS dynamically reconfigures wireless channels via the two following mechanisms: 1. Legitimate Signal Enhancement: By aligning phases of PT-RIS-PR reflected signals, it constructs constructive interference at PR, boosting the SNR by 10–15 dB in simulations. 2. Warden Signal Degradation: Simultaneously, random phase offsets are introduced at Willie’s receiver via independent phase shifts, increasing detection error probability by disrupting signal coherence.
Channel uncertainties in RIS-assisted covert communication arise from the following four main sources: (1) Shadowing: Random path loss variations due to obstacles; (2) Rayleigh Fading: Rapid amplitude/phase fluctuations in multipath environments; (3) RIS Phase Errors: Deviations in phase-shift adjustments from ideal values; (4) CSI Imperfection: Noisy estimates of PT-RIS–warden channel links. These uncertainties degrade the legitimate SNR by 3–5 dB and increase detection error variability, addressed here via worst-case performance analysis and robust phase-shift optimization.
Large-scale path loss ( m p , p ) is characterized by the equation
m p , p = β 0 d p , p α 1 ,
where ( β 0 ) denotes the path-loss constant at the reference distance, ( α 1 2 ) represents the path loss exponent, and ( d p , p ) stands for the separation distance between PT and PR. In terms of small-scale fading, a Rayleigh fading model ( g p , p CN ( 0 , β p , p ) ) is adopted.
The RIS is able to capture signals sent by the PT. Each element of the RIS adjusts the phase shift of incoming signals via a controller. Then these signals are reflected toward the PR. Channel characteristics for the PT-to-RIS and RIS-to-PR paths can be formulated as
h I = β 0 d P , I α 2 / 2 g I ,
h P , I = β 0 d P , I α 2 / 2 g P ,
where ( h I CN ( 0 , I M ) ) and ( g B CN ( 0 , I M ) ) are Rayleigh fading channel vectors. The parameter ( α 2 ) is the path loss exponent for RIS–ground communications, while ( d P , I ) and ( d P , I ) correspond to the distances between PT-RIS and RIS-PR, respectively. The PT transmits a Gaussian signal denoted by ( x [ i ] ) (where i 1 , 2 , , L ) with ( E ( | x [ i ] | 2 ) = 1 ) . The variable ( L ) signifies the block length, which is bounded by ( L L max ) (the maximum allowable block length). The received signal at PR can be expressed as
y P [ i ] = P p h p , p + g P H Θ h I x [ i ] + n P [ i ] , i 1 , 2 , , L ,
where Θ = diag { ψ 1 e j θ 1 , ψ 2 e j θ 2 , , ψ M e j θ M } denotes the RIS phase-shift matrix. In this matrix, ( θ n ) denotes the phase shift and ( ψ n ) represents the amplitude of the n-th element (with ( ψ 1 = = ψ M = 1 ) assumed to maximize the SNR). The term ( P p ) refers to the PT’s transmission power, and ( n P [ i ] CN ( 0 , σ b 2 ) ) is the additive white Gaussian noise (AWGN) at PR with noise power ( σ b 2 ) .
Accounting for finite block length, the maximum channel coding rate from the PT to PR is expressed as
R = log 2 1 + γ b V L Q 1 ( δ ) ,
where ( γ b = P p | h p , p + g P H Θ h I | 2 σ b 2 ) represents the SNR received at PR, ( δ 0 ) denotes the decoding error probability, ( V = γ b ( γ b + 2 ) ( γ b + 1 ) 2 ) stands for channel dispersion, and ( Q 1 ( · ) ) is the Q-function inverse. Effective throughput is defined by the equation
η = ρ 1 L R ( 1 δ ) ,
where ρ 1 and ρ 0 are the prior probabilities of transmission or silence, respectively, ρ 1 + ρ 0 = 1 . Throughput under covertness constraints is referred to as effective covert throughput (ECT).

4. Detection Performance for Willie

In this section, Willie covert communication detection mechanisms are examined using channel modeling, two-valued hypothesis checking, detection threshold optimization, and error probability analysis. In particular, PT-Willie channel and RIS-Willie channel modeling are used, and the optimal threshold to minimize detection errors using relativistic checking is obtained. The results show that UTPP has a lower detection error probability than ETPP. This presents a major challenge for covert communication and highlights the need to simultaneously optimize transmission parameters.

4.1. Signal Transmission to Willie

Willie aims to detect the PT’s transmission by analyzing the received signal power, employing an optimal detector to minimize errors. The channel between the PT and Willie is modeled similarly to the PT-PR link, incorporating both large-scale path loss and small-scale fading.
h p , w = m p , w g p , w ,
where m p , w = β 0 d p , w α 1 represents large-scale path loss (with ( d p , w ) as the PT-Willie distance, typically larger than ( d p , p )), and ( g p , w CN ( 0 , β p , w ) ) denotes Rayleigh fading. The RIS-Willie channel is defined by the vector ( h I , W = β 0 d I , W α 2 / 2 g W ), where d I , W denotes the RIS-Willie distance and g W CN ( 0 , I M ) represents the fading vector. When PT is transmitting, the received signal at Willie is
y W [ i ] = P p h p , w + g W H Θ h I x [ i ] + n W [ i ] ,
where ( n W [ i ] CN ( 0 , σ w 2 ) ) is additive white Gaussian noise (AWGN) at Willie.

4.2. Detection Threshold Derivation

Willie performs binary hypothesis testing to determine the PT’s state: ( H 0 ): The PT is silent (only noise received). ( H 1 ): The PT is transmitting (signal + noise received). The decision statistic ( T L ) is defined as the average received power over (L) channel uses. Willie compares ( T L ) to a threshold ( Γ L ): if ( T L > Γ L ), ( H 1 ) is declared (transmission detected); otherwise, ( H 0 ) is assumed (no transmission).
Two types of errors occur as follows: False Alarm (FA): ( Pr ( D 1 | H 0 ) ), where ( D 1 ) indicates a “transmit” decision under ( H 0 ). Missed Detection (MD): ( Pr ( D 0 | H 1 ) ), where ( D 0 ) indicates a “silent” decision under ( H 1 ). The total detection error probability (DEP) is
P DEP = ρ 0 · Pr ( T L > Γ L | H 0 ) + ρ 1 · Pr ( T L < Γ L | H 1 ) .
The fixed threshold analysis here serves as a baseline; the optimal threshold derivation, accounting for dynamic channel conditions and prior probabilities, is presented in Section 4.3.

4.3. Optimal Threshold Derivation

To minimize ( P DEP ), Willie optimizes ( Γ L ). Under ( H 0 ), the received signal is pure noise, so ( T L ) follows a chi-squared distribution ( χ 2 ( 2 L , σ w 2 / L ) ). Under ( H 1 ), the signal includes both the PT’s transmission and noise, leading to ( T L χ 2 ( 2 L , ( κ + σ w 2 ) / L ) ), where ( κ = P p | h p , w + g W H Θ h I | 2 ).
Using likelihood ratio testing, the optimal threshold ( Γ L * ) is derived to balance FA and MD probabilities. It is shown that ( Γ L * ) depends on ( P p ), prior probabilities ( ρ 0 / ρ 1 ), and channel parameters. For example, when ( ρ 1 ρ 0 ) (UTPP), ( Γ L * ) shifts to favor the more probable hypothesis, reducing ( P DEP ) compared to ETPP.
With increasing P p , the minimum P DEP is reduced because stronger signals enhance the distinguishability between H 0 and H 1 . UTPP outperforms ETPP in minimizing P DEP , thereby intensifying challenges to the PT’s covertness. Such findings underscore the necessity of jointly optimizing transmission parameters to counteract Willie’s detection capabilities.

5. Maximizing ECT in Conventional Scenarios

In this section, we examine strategies to maximize the ECT of RIS support systems in ETPP/UTPP mode. We construct a general optimization framework for phase-shift parameters, extend the model to Poisson distribution packet-generation scenarios, and analyze the power and block length trade-offs. According to the analysis of the results, by dynamically adjusting the transmission probability distribution, UTPP is possible to achieve a flexible balance between the communication rate and covert requirements. It is found that with ETPP, it is possible to achieve better performance.

5.1. ECT Maximization

When Willie employs the optimal detection threshold ( Γ * ) under equal transmit prior probabilities ( ρ 0 = ρ 1 = 0.5 ), the minimum DEP is denoted as ( ξ 1 * ). The PT’s objective is to disrupt Willie’s detection accuracy by elevating ( ξ 1 * ) to satisfy the covertness constraint:
2 ξ 1 * 1 2 ε ,
where ( ε ) represents the covertness tolerance. Leveraging the total variation (TV) distance between probability distributions ( P 1 ) (PT transmitting) and ( P 0 ) (PT silent), the constraint translates to ( TV ( P 1 , P 0 ) 2 ε ). Using Pinsker’s inequality, this is further relaxed to a relative entropy constraint ( D ( P 1 | P 0 ) 2 ε ), where ( D ( P 1 | P 0 ) ) quantifies the divergence between ( P 1 ) and ( P 0 ). The optimization framework for maximizing ECT under equal prior probabilities (ETPP) is formulated as
max P p , L , Θ η
s . t . L P p ϑ 4 σ w 2 ε ,
0 < P p P max ,
0 < L L max ,
where ( η = ρ 1 L R ( 1 δ ) ) denotes the effective throughput, (R) is the coding rate, and ( ϑ ) aggregates channel fading and path loss parameters. The RIS phase-shift matrix ( Θ ) is optimized to maximize PR’s received SNR by aligning phases of direct and reflected signals, expressed as ( θ n = arg ( h p , p ) arg ( g B , n ) arg ( h I , n ) ).
The covertness constraint creates a trade-off between (L) (block length) and ( P p ) (transmit power), requiring ( L P p = 4 σ w 2 ε ϑ 2 ). ECT is maximized by using the maximum allowable block length ( L * = L max ), with ( P p ) adjusted to satisfy the covertness constraint: ( P p * = min 4 σ w 2 ε L max ϑ , P max ).
For UTPP, the covertness constraint is redefined to account for asymmetric transmission probabilities ρ 1 and ρ 0 = 1 ρ 1 . The constraint becomes [ max ( ρ 0 , ρ 1 ) · D ( P 1 | P 0 ) 2 ε min ( ρ 0 , ρ 1 ) ] . This introduces flexibility in balancing transmission opportunities and covertness. The optimization problem under UTPP extends P1 by including ρ 1 as a variable:
P 2 : max P p , L , ρ 1 , Θ η
s . t . max ( ρ 0 , ρ 1 ) L P p ϑ 2 σ w 2 2 ε min ( ρ 0 , ρ 1 ) ,
0 < P p P max ,
0 < L L max ,
ρ min ρ 1 ρ max .
The solution to P2 involves classifying cases based on ( ρ 1 ρ 0 ) or ( ρ 1 > ρ 0 ).
Case 1 ( ρ 1 ρ 0 ): The optimal ( ρ 1 ) converges to 0.5 when ( ρ min A 1 + A 0.5 ) (where (A) is a channel-dependent constant), with ( P p * ) constrained by ( P max ). Case 2 ( ρ 1 > ρ 0 ): ( ρ 1 ) is optimized to balance throughput and covertness, with ( P p * ) adjusted based on whether ( ρ 1 ) is bounded by ( ρ max ) or channel conditions. Numerical results confirm that UTPP outperforms ETPP by enabling a more flexible trade-off between ECT and covertness, particularly when ( ρ 1 ) is adjusted to exploit channel uncertainty at Willie.
The optimal block length is consistently ( L max ) in both ETPP and UTPP scenarios, as increasing channel use maximizes throughput, while ( P p ) is constrained to maintain covertness. UTPP introduces an additional degree of freedom (prior probability adjustment), leading to higher ECT compared to ETPP under the same covertness constraints. RIS phase optimization plays a dual role, which involves enhancing PR’s SNR and introducing randomness at Willie, thereby reinforcing covertness.

5.2. Maximizing ECT in Packet-Generation Scenarios

In IoT networks, status update mechanisms are prevalent, where devices periodically transmit data packets upon sensing new information. The PT operates under a Poisson packet arrival process with rate ( λ a ), meaning the probability of transmitting a packet in a time slot is ( ρ 1 = 1 e λ a T ), and the silence probability is ( ρ 0 = e λ a T ). Here, ( T = L / B ) denotes the transmission delay, with (B) as the bandwidth and (L) as the block length. The objective is to maximize ECT by co-optimizing transmit power ( P p ), block length (L), and RIS phase shifts ( Θ ). The optimization framework accounts for the coupling between ( ρ 1 ) and (L) due to the Poisson arrival model, leading to the following problem:
max P p , L , Θ η
s . t . max ( ρ 0 , ρ 1 ) L P p ϑ 4 σ w 2 ε min ( ρ 0 , ρ 1 ) ,
0 < P p P max ,
0 < L L max .
For ETPP (( ρ 0 = ρ 1 = 0.5 ) ), the Poisson arrival model imposes ( λ a T = ln 2 ); hence, ( L = B ln 2 / λ a ). Substituting into the covertness constraint, the optimal transmit power is derived as
P p * = min 4 σ w 2 ε L ϑ , P max .
ECT is maximized by prioritizing the highest possible ( P p ) under the covertness constraint, with (L) fixed by the ETPP condition. UTPP introduces two scenarios based on the relationship between ( ρ 0 ) and ( ρ 1 ):
( ρ 0 ρ 1 ) (Low Packet Arrival Rate)
Here, ( λ a T ln 2 ), limiting ( L B ln 2 / λ a ). The covertness constraint becomes
( e λ a L / B 1 ) L P p ϑ 4 σ w 2 ε .
The optimal block length ( L * ) and power ( P p * ) satisfy
L * = min L max , B ln 2 λ a ,
P p * = min ( 4 σ w 2 ε ( e λ a L / B 1 ) L ϑ , P max ) .
( ρ 0 < ρ 1 ) (High Packet Arrival Rate)
For ( λ a T > ln 2 ), (L) exceeds ( B ln 2 / λ a ). The covertness constraint is adjusted to
( e λ a L / B 1 ) L P p ϑ 4 σ w 2 ε .
The optimal solution involves balancing (L) and ( P p ) to maximize ( η ), with ( L * ) determined by solving the first-order condition of the ECT function. Low-Latency Advantage: UTPP allows for shorter block lengths compared to ETPP, better satisfying IoT latency requirements. Saturation Behavior: ECT saturates with ( L max ) due to covertness constraints, while ( P p * ) is bounded by ( P max ). Poisson Rate Impact: Higher ( λ a ) reduces the saturation block length ( L * ), as frequent packet arrivals increase detection risk at Willie. This framework demonstrates that UTPP outperforms ETPP in dynamic packet-generation scenarios by flexibly adjusting transmission probabilities and block lengths to balance throughput and covertness.

6. Simulation Results

In this section, we demonstrate the effectiveness of the support-based covert communication strategy through simulation results. Specifically, we focus on key performance indicators including DEP, relative entropy, and ECT and systematically evaluate how core parameters—transmission power, block length, UTPP, and Poisson packet arrival rate—influence system performance. The results show that introducing RIS significantly improves ECT performance compared to non-RIS baselines, while UTPP outperforms ETPP by flexibly balancing transmission rate and covertness. Furthermore, this analysis reveals the following three critical findings: (1) an inverse relationship between the optimal transmission power and block length; (2) ECT saturation under maximum power and block length constraints; and (3) a decrease in the optimal block length for high Poisson arrival rates. These practical observations provide valuable insights for parameter optimization in RIS-assisted covert communication systems.
Figure 2 illustrates the relationship between the detection threshold, false detection probability, and transmission power for the primary channel’s transmitter and detector. As shown, false detection probability decreases gradually with increasing PT, which means that a higher transmit power enhances signal strength, facilitating hidden target detection and reducing false detection. Concurrently, the false detection rate exhibits a non-monotonic trend with rising detection thresholds: it first decreases, then increases. A too low threshold triggers alarms from background noise alone, causing higher false detection probability, while an excessively high threshold weakens the detector’s ability to identify strong targets, also increasing false detection. Thus, selecting an appropriate detection threshold can optimize this balance, minimizing the false detection probability.
In Figure 3, the simulation results show how the transmission probability varies with maximum transmit power (PT) for different covert communication protocols. As can be seen, the transmission probability initially decreases with increasing transmit power, then stabilizes at higher transmit power levels. This trend is due to the fact that a higher PT increases the risk of detection, necessitating a reduction in the transmission probability to maintain covertness. However, when the PT exceeds a certain threshold, the detection risk peaks within the given covert constraint, and the transmission probability remains constant.
In addition, the three curves in the figure correspond to different covert constraint levels. It can be seen that stricter constraints (indicating a more conservative transmission strategy) lead to lower overall transmission probability and the need to further restrict transmission frequency in the high-power range.
In Figure 4, we present curves for three different block lengths, illustrating the relationship between the primary transmitter’s (PT) transmit power and relative entropy. It is readily apparent that the relative entropy at Willie increases monotonically with increasing PT transmit power. This occurs because higher transmit power enhances the adversary’s (Willie’s) signal observation capability.
Furthermore, the relative entropy exhibits a strong dependence on block length. This indicates that, at any fixed transmit power level, relative entropy increases with increasing block length. This phenomenon can be explained by the fact that longer observation intervals enhance Willie’s statistical recognition and detection performance.
In Figure 5, we present simulation results showing the correlation between the maximum block length constraint and the ECT, as well as the impact of varying covert constraint stringency. It is clear that the ECT increases monotonically with the maximum block length, as longer blocks enhance the statistical distinguishability of the primary transmitter (PT)’s transmitted signal. This improvement in distinguishability increases the probability of Willie detection while also increasing the ECT under the covert constraint. In addition, Figure 5 shows a curve labeled “Random RIS Phase Shifts” to serve as a baseline for validating the proposed optimization strategy. This baseline corresponds to scenarios where RIS phase shifts are randomly generated, simulating unoptimized passive beamforming. By comparing with the proposed scheme, the figure shows the performance gains from active RIS phase alignment, which jointly maximizes the legitimate receiver’s SNR while degrading signal quality at the warden.
Furthermore, the figure shows a strong correlation between the ECT and the level of covert constraint: as the constraint is tightened, the ECT systematically decreases for all block lengths. This decrease can be explained by the fact that stricter covert requirements limit the PT’s ability to efficiently transmit data without detection, thereby offsetting the throughput gains from increased block length. Thus, the curves in the figure are ordered by constraint stringency: within the range of block lengths examined, the strictest constraints correspond to the curves with the lowest ECT, while the loosest constraints correspond to the curves with the highest ECT.
In Figure 6, we show the optimal transmit power and the corresponding optimal block length for different Poisson arrival rates. It is easy to see that the optimal block length decreases monotonically with increasing transmit power. This trend occurs because higher transmit power improves information transmission efficiency, thereby reducing transmission time.
Furthermore, it is not difficult to see that the optimal block length is closely related to the Poisson arrival rate: at a fixed transmit power, the optimal block length systematically decreases with increasing arrival rate. This is because as the arrival rate increases, the probability of successfully initiating a transmission within a given interval also increases, thereby reducing the reliance on long blocks for reliable communication.
In Figure 7, we experimentally demonstrate the relationship between the ECT of the PT and its maximum transmit power. It can be seen that the ECT increases monotonically with transmit power until it reaches a saturation threshold. Beyond this threshold, further increases in power do not improve performance. This saturation phenomenon occurs because, while a stronger signal initially improves throughput, fundamental system-specific constraints ultimately limit further gains.
Furthermore, it is readily apparent that the transmission probability is positively correlated with transmit power within the evaluated PT power range. This trend suggests that a higher transmission probability increases the adversary’s probability of detection. Notably, when the RIS is not deployed, the ECT is lowest at all power levels, demonstrating the critical role of the RIS in improving the system’s ECT.

7. Conclusions

We propose a comprehensive framework for robust covert communication in CRNs by strategically deploying RISs. To address the core challenge of statistically hiding SU transmissions from enemy guards while strictly minimizing harmful interference to PUs, we propose a novel approach to optimize passive beamforming parameters by jointly optimizing SU transmit power, communication block length, and RISs. The RIS is a legitimate SU. It aims to achieve two goals, namely improving signal reception quality at the receiver while degrading it at the guards and alleviating the square root law trade-off between covertness and throughput.
In summary, this paper proposes an RIS-based framework to enhance the security and spectral efficiency of next-generation dynamic spectrum sharing systems, laying the foundation for high-performance covert communications in CRNs. In the future, we will explore the design of wireless communication security system frameworks for scenarios with multiple monitors, imperfect channel state information, and practical hardware limitations.

Author Contributions

Conceptualization, J.Q. and Y.X.; methodology, J.Q.; software, P.Z.; validation, Y.X. and P.Z.; formal analysis, J.Q. and Y.X.; investigation, J.Q.; resources, J.Q.; data curation, P.Z.; writing—original draft preparation, Y.X.; writing—review and editing, J.Q.; visualization, J.Q.; supervision, J.Q.; project administration, J.Q.; funding acquisition, J.Q. and Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This study is supported in part by the major project of the “2025 Higher Education Science Research Plan Project” funded by China Association of Higher Education: 25ZJ0102, the Jiangsu Province’s “Qinglan Project” (2025): The Program for Middle-aged and Young Academic Leaders and the Natural Science Foundation of the Jiangsu Higher Education Institutions of China: 23KJB510033.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, X.; Xu, B.; Wang, X.; Zheng, K.; Chi, K.; Tian, X. Impacts of sensing energy and data availability on throughput of energy harvesting cognitive radio networks. IEEE Trans. Veh. Technol. 2022, 72, 747–759. [Google Scholar] [CrossRef]
  2. Wen, Y.; Liu, L.; Li, J.; Li, Y.; Wang, K.; Yu, S.; Guizani, M. Covert Communications Aided by Cooperative Jamming in Overlay Cognitive Radio Networks. IEEE Trans. Mob. Comput. 2024, 23, 12878–12891. [Google Scholar] [CrossRef]
  3. Yazdani, H.; Vosoughi, A.; Gong, X. Achievable rates of opportunistic cognitive radio systems using reconfigurable antennas with imperfect sensing and channel estimation. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 802–817. [Google Scholar] [CrossRef]
  4. Wen, Y.; Liu, L.; Li, J.; Hou, X.; Zhang, N.; Dong, M.; Atiquzzaman, M.; Wang, K.; Huo, Y. A Covert Jamming Scheme Against an Intelligent Eavesdropper in Cooperative Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2023, 72, 13243–13254. [Google Scholar] [CrossRef]
  5. Nasser, A.; Al Haj Hassan, H.; Abou Chaaya, J.; Mansour, A.; Yao, K.C. Spectrum sensing for cognitive radio: Recent advances and future challenge. Sensors 2021, 21, 2408. [Google Scholar] [CrossRef]
  6. Wu, X.; Ma, J.; Xing, Z.; Gu, C.; Xue, X.; Zeng, X. Secure and energy efficient transmission for IRS-assisted cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 2021, 8, 170–185. [Google Scholar] [CrossRef]
  7. Zhang, R.; Chen, X.; Liu, M.; Zhao, N.; Wang, X.; Nallanathan, A. UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading. IEEE Trans. Veh. Technol. 2022, 71, 7936–7941. [Google Scholar] [CrossRef]
  8. Chen, X.; Zhang, N.; Tang, J.; Liu, M.; Zhao, N.; Niyato, D. UAV-aided covert communication with a multi-antenna jammer. IEEE Trans. Veh. Technol. 2021, 70, 11619–11631. [Google Scholar] [CrossRef]
  9. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization. IEEE Trans. Wirel. Commun. 2021, 21, 1735–1750. [Google Scholar] [CrossRef]
  10. Zheng, T.X.; Yang, Z.; Wang, C.; Li, Z.; Yuan, J.; Guan, X. Wireless covert communications aided by distributed cooperative jamming over slow fading channels. IEEE Trans. Wirel. Commun. 2021, 20, 7026–7039. [Google Scholar] [CrossRef]
  11. Tao, L.; Yang, W.; Lu, X.; Wang, M.; Song, Y. Achieving Covert Communication in Uplink NOMA Systems via Energy Harvesting Jammer. IEEE Commun. Lett. 2021, 25, 3785–3789. [Google Scholar] [CrossRef]
  12. Bash, B.A. and Goeckel, D. and Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  13. Wen, Y.; Wang, F.; Wang, H.M.; Li, J.; Qian, J.; Wang, K.; Wang, H. Joint Trajectory and Power Design with Cooperative Jamming UAV Assistance Based on Reinforcement Learning. IEEE Trans. Wirel. Commun. 2025. [Google Scholar] [CrossRef]
  14. An, K.; Sun, Y.; Lin, Z.; Zhu, Y.; Ni, W.; Al-Dhahir, N.; Wong, K.K.; Niyato, D. Exploiting Multi-Layer Refracting RIS-Assisted Receiver for HAP-SWIPT Networks. IEEE Trans. Wirel. Commun. 2024, 23, 12638–12657. [Google Scholar] [CrossRef]
  15. Liu, J.; Yang, G.; Liang, Y.C.; Yuen, C. Max-Min Fairness in RIS-assisted Anti-Jamming Communications: Optimization versus Deep Reinforcement Learning Approaches. IEEE Trans. Commun. 2024, 72, 4476–4492. [Google Scholar] [CrossRef]
  16. Liu, T.; Zhou, H.; Long, R.; Liang, Y.C. Improving Physical Layer Security with RIS-Assisted Symbiotic Radio. In Proceedings of the ICC 2024—IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; pp. 593–598. [Google Scholar]
  17. Wen, Y.; Huo, Y.; Li, J.; Qian, J.; Wang, K. Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. IEEE Trans. Inf. Forensics Secur. 2025, 20, 1278–1289. [Google Scholar] [CrossRef]
  18. Zhou, C.; Xu, Y.; Li, D.; Huang, C.; Yuen, C.; Zhou, J.; Yang, G. Energy-Efficient Maximization for RIS-Aided MISO Symbiotic Radio Systems. IEEE Trans. Veh. Technol. 2023, 72, 13689–13694. [Google Scholar] [CrossRef]
  19. Peng, Z.; Weng, R.; Pan, C.; Zhou, G.; Di Renzo, M.; Swindlehurst, A.L. Robust transmission design for RIS-assisted secure multiuser communication systems in the presence of hardware impairments. IEEE Trans. Wirel. Commun. 2023, 22, 7506–7521. [Google Scholar] [CrossRef]
  20. Cheng, Z.; Si, J.; Li, Z.; Guan, L.; Zhao, Y.; Wang, D.; Cheng, J.; Al-Dhahir, N. Covert surveillance via proactive eavesdropping under channel uncertainty. IEEE Trans. Commun. 2021, 69, 4024–4037. [Google Scholar] [CrossRef]
  21. Shmuel, O.; Cohen, A.; Gurewitz, O. Multi-antenna jamming in covert communication. IEEE Trans. Commun. 2021, 69, 4644–4658. [Google Scholar] [CrossRef]
  22. Kang, X.; Lei, H.; Yang, L.; Pan, G.; Tsiftsis, T.A.; Liu, H. Active-RIS-aided covert communications in NOMA systems with cooperative jamming. IEEE Trans. Veh. Technol. 2023, 73, 7436–7440. [Google Scholar] [CrossRef]
  23. Wen, Y.; Huo, Y.; Ma, L.; Jing, T.; Gao, Q. A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2019, 68, 3500–3512. [Google Scholar] [CrossRef]
  24. Cao, Y.; Xu, S.; Liu, J.; Kato, N. IRS backscatter enhancing against jamming and eavesdropping attacks. IEEE Internet Things J. 2023, 10, 10740–10751. [Google Scholar] [CrossRef]
  25. Liao, C.; Xu, K.; Xia, X.; Hu, G.; Li, C.; Wang, Y.; Xie, W.; Yang, X.; Shi, Y.; Wan, L. IRS-assisted anti-jamming transmission for an integrated satellite-UAV-terrestrial network with imperfect CSI: A game-based perspective. IEEE Internet Things J. 2023, 10, 20484–20497. [Google Scholar] [CrossRef]
  26. Pan, C.; Zhou, G.; Zhi, K.; Hong, S.; Wu, T.; Pan, Y.; Ren, H.; Di Renzo, M.; Swindlehurst, A.L.; Zhang, R.; et al. An overview of signal processing techniques for RIS/IRS-aided wireless systems. IEEE J. Sel. Top. Signal Process. 2022, 16, 883–917. [Google Scholar] [CrossRef]
  27. Wen, Y.; Huo, Y.; Jing, T.; Gao, Q. A Reputation framework with Multiple-threshold Energy Detection in Wireless Cooperative Systems. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  28. Liu, Y.; Su, Z.; Zhang, C.; Chen, H.H. Minimization of Secrecy Outage Probability in Reconfigurable Intelligent Surface-Assisted MIMOME System. IEEE Trans. Wirel. Commun. 2023, 22, 1374–1387. [Google Scholar] [CrossRef]
  29. Chu, Z.; Hao, W.; Xiao, P.; Khalily, M.; Tafazolli, R. Resource allocations for symbiotic radio with finite blocklength backscatter link. IEEE Internet Things J. 2020, 7, 8192–8207. [Google Scholar] [CrossRef]
  30. Besser, K.L.; Jorswieck, E.A. Bounds on the Secrecy Outage Probability for Dependent Fading Channels. IEEE Trans. Commun. 2021, 69, 443–456. [Google Scholar] [CrossRef]
  31. Wen, Y.; Jing, T.; Gao, Q. Trustworthy Jammer Selection with Truth-Telling for Wireless Cooperative Systems. Wirel. Commun. Mob. Comput. 2021, 2021, 6626355. [Google Scholar] [CrossRef]
  32. Yan, S.; Zhou, X.; Hu, J.; Hanly, S.V. Low probability of detection communication: Opportunities and challenges. IEEE Wirel. Commun. 2019, 26, 19–25. [Google Scholar] [CrossRef]
  33. Wen, Y.; Jing, T.; Huo, Y.; Li, Z.; Gao, Q. Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks. In Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 5–8 March 2018; pp. 795–799. [Google Scholar]
Figure 1. System model for RIS-assisted finite-block length covert cognitive radio network.
Figure 1. System model for RIS-assisted finite-block length covert cognitive radio network.
Sensors 25 06490 g001
Figure 2. DEP versus P P achieved by different Γ .
Figure 2. DEP versus P P achieved by different Γ .
Sensors 25 06490 g002
Figure 3. Transmission probability ρ 1 * versus P max achieved by different ϵ .
Figure 3. Transmission probability ρ 1 * versus P max achieved by different ϵ .
Sensors 25 06490 g003
Figure 4. Relative entropy versus P P with different L.
Figure 4. Relative entropy versus P P with different L.
Sensors 25 06490 g004
Figure 5. η * versus L m a x achieved by different ϵ .
Figure 5. η * versus L m a x achieved by different ϵ .
Sensors 25 06490 g005
Figure 6. L m a x versus P m a x achieved by different λ a .
Figure 6. L m a x versus P m a x achieved by different λ a .
Sensors 25 06490 g006
Figure 7. η * versus P max achieved by different λ a .
Figure 7. η * versus P max achieved by different λ a .
Sensors 25 06490 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, Y.; Qian, J.; Zhu, P. A Scheme for Covert Communication with a Reconfigurable Intelligent Surface in Cognitive Radio Networks. Sensors 2025, 25, 6490. https://doi.org/10.3390/s25206490

AMA Style

Xu Y, Qian J, Zhu P. A Scheme for Covert Communication with a Reconfigurable Intelligent Surface in Cognitive Radio Networks. Sensors. 2025; 25(20):6490. https://doi.org/10.3390/s25206490

Chicago/Turabian Style

Xu, Yan, Jin Qian, and Pengcheng Zhu. 2025. "A Scheme for Covert Communication with a Reconfigurable Intelligent Surface in Cognitive Radio Networks" Sensors 25, no. 20: 6490. https://doi.org/10.3390/s25206490

APA Style

Xu, Y., Qian, J., & Zhu, P. (2025). A Scheme for Covert Communication with a Reconfigurable Intelligent Surface in Cognitive Radio Networks. Sensors, 25(20), 6490. https://doi.org/10.3390/s25206490

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop