Next Article in Journal
Analysis of Anti-Jamming Performance of HF Access Network Based on Asymmetric Frequency Hopping
Previous Article in Journal
An Enhanced ZigBee-Based Indoor Localization Method Using Multi-Stage RSSI Filtering and LQI-Aware MLE
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Communication Scheme for OOK in Asymmetric Noise Systems

School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(9), 2948; https://doi.org/10.3390/s25092948
Submission received: 1 April 2025 / Revised: 29 April 2025 / Accepted: 1 May 2025 / Published: 7 May 2025
(This article belongs to the Section Communications)

Abstract

:
Existing covert communication schemes based on On–Off Keying (OOK) have not considered asymmetric noise environments, which limits their applicability in complex communication scenarios such as terahertz and underwater acoustic covert communications. To address this issue, this paper proposes a phase-based OOK coding scheme. In particular, the transmitter Alice can adjust the initial phase of the transmitted symbol to align the signal with the stronger noise components in asymmetric noise communication scenarios, thereby exploiting the masking effect of noise to achieve covert transmission. To quantify performance, the KL divergence and mutual information of the OOK coding scheme are adopted as measures of covertness and transmission performance, respectively. An optimization problem involving the input signal distribution a n , signal amplitude β , and initial phase angle θ is formulated and solved to obtain the maximum covert transmission rate. Numerical results demonstrate that in asymmetric noise systems, the initial phase angle and the Gaussian noise components on the real and imaginary axes of the complex plane influence both covertness performance and transmission rate. Adjusting the initial phase towards the direction with lower noise components can maximally suppress noise interference, thereby improving the covertness performance.

1. Introduction

The rapid advancement of artificial intelligence (AI) and the Internet of Things (IoT) has led to an increasing demand for efficient and reliable information transmission [1,2,3], which has brought information security issues into focus. Therefore, communication security technologies, such as physical-layer security (PLS) [4,5] and steganography [6,7], have been extensively researched to eliminate the security risks of communication content leakage to eavesdroppers. These technologies can only eliminate the leakage of communication content, but in some fields, such as e-commerce security and unmanned aerospace, their security levels are not high enough to satisfy higher secure communication demands. A new secure communication technology, covert communication, has become one of the critical techniques for security transmission and garnered significant attention across various industries [8,9,10,11,12]. In the covert communication scenario, the transmitter Alice transmits information covertly to the receiver Bob while ensuring that the detector Willie cannot detect their communication behavior [13]. This characteristic is particularly important in scenarios where traditional encryption-based security measures are insufficient.
Therefore, covert communication has attracted significant research interest. Ref. [14] proposed a new method based on bitrate modulation, enabling covert communication among numerous devices over a wide area. Ref. [15] proposes a covert communication method based on Time-Modulated Array (TMA), which outperforms the conventional Phased Array (PA) scheme in terms of both average Covert Age of Information (CAoI) and convergence rate. Ref. [16] investigates a covert communication method based on adaptively selecting between PA and LFDA beamforming schemes, where the transmitter can dynamically choose either PA or LFDA to enhance communication covertness in the presence of spatially random wardens. Meanwhile, covert underwater acoustic communication (CUAC), as an important security method of underwater acoustic communication, has also been extensively explored in recent years [17,18,19]. Ref. [18] proposes an AUV-assisted UACC game (AUACCG) model, which utilizes AUVs to transmit interference signals to weaken the detector’s capability and enhance the security of sensitive data transmission in the Ocean Internet of Things (OIoT). In [19], the authors propose a buoyed-IRS-AUV (BIA) communication method based on intelligent reflecting surfaces (IRSs), which achieves secure and reliable transmission of sensitive data in the Ocean Internet of Things (OIoT) by dynamically adjusting the beam widths and IRS depth. Furthermore, in [20,21,22], covert channels have been proposed to hide communication behavior by using network protocols as carriers, making them elusive. To further enhance security while maintaining transmission performance, covert communication can be integrated with other technologies, such as Binary Phase-Shift Keying (BPSK) [23], Non-Orthogonal Multiple Access (NOMA) [24], and Turbo encoding [25].
In recent years, On–Off Keying (OOK), a modulation technique that employs two symbols { 0 , A } as input alphabets, has gained widespread application in fields such as terahertz communication and underwater acoustic communication due to its simple structure and high power efficiency. Consequently, investigating covert communication for the OOK coding scheme has become a crucial issue in ensuring information security. However, existing research primarily focuses on symmetric Gaussian noise systems where the noise distribution is uniform [26]. Many practical communication systems face asymmetric noise conditions, which pose new challenges to the codebook’s covertness and transmission performance.
This paper investigates the covertness performance of the OOK coding scheme over asymmetric noise channels. The communication system model, as shown in Figure 1, includes the legitimate transmitter Alice, the legitimate receiver Bob, and the detector Willie. KL divergence and mutual information are used as the covertness and transmission performance measures, respectively. We explore the impact of signal amplitude and initial phase angles under different noise-component settings on these metrics of the OOK coding scheme. In addition, we explore the scheme that maximizes the transmission rate under the covertness constraint in asymmetric noise systems.
The remainder of this paper is organized as follows: Section 3 presents the covert communication system model over asymmetric noise channels, the OOK codebook construction, Willie’s detection performance analysis, transmission performance analysis, and details the optimization problem. In Section 4, we analyze Willie’s detection ability and the transmission rate between Alice and Bob, and derive the expressions for the OOK coding scheme’s KL divergence and mutual information. In Section 5, we analyze the relationship between optimal amplitude and phase angle according to the covertness constraint and further formulate the corresponding optimization problem. The numerical results are detailed in Section 6, followed by the conclusion presented in Section 7.

2. Related Works

We first review the theoretical foundations of covert communication and analyze its performance limits in symmetric Gaussian noise systems. We then summarize the relevant research progress. Finally, we summarize current studies on covert communication in asymmetric noise systems. Our analysis indicates that existing work has largely overlooked the applicability of OOK-based covert communication in asymmetric noise systems, highlighting a significant gap and potential for further investigation.
In existing covert communication research, the limits of achievable performance have been extensively explored in symmetric Gaussian noise channels. In [27], the authors proposed the square root law (SRL), which is the theoretical limit of covert communication over Additive White Gaussian Noise (AWGN) channels. Specifically, O ( n ) bits can be transmitted from Alice to Bob covertly over n channels, and as n increases to infinity, the transmission rate approaches zero. Additionally, the square-root law applies to binary symmetric channels [28], discrete memoryless channels [29,30,31], multiple-input and multiple-output (MIMO) channels [32,33], multi-user channels [34,35,36], and adversarial channels [37].
Numerous works in covert communication theory focus on improving communication security while maintaining transmission performance. In [24], the authors investigate the performance of covert communication within relay-assisted Non-Orthogonal Multiple Access (NOMA) networks, where the relay acts as a detector, and the transmitter mixes the hidden message with another user’s public message for transmission. In [38], covert-capacity lower bounds and theoretical guarantees for secrecy and reliability are provided for Binary Phase-Shift Keying (BPSK) and root-raised cosine (RRC) pulses in Pulse Amplitude Modulation (PAM). In [39], multiple random-access covert communication protocols over AWGN channels with BPSK modulation achieve low-power random-access covert communication and point-to-point communication.
In most of the aforementioned literature, the research has been conducted in symmetric noise systems. In [26], an OOK coding scheme suitable for complex Gaussian channels is proposed for covert communication. KL divergence and mutual information are calculated to quantify phase-shift gains. However, noise sources include thermal noise, quantization noise, imperfect filters, and environmental wireless signals. In practical applications, due to the constant changes in temperature and environmental noise, noise asymmetry is inevitable. In [40,41], covert communication under noise uncertainty is discussed, and new evaluation methods are proposed to differentiate between bounded and unbounded noise models based on the range of uncertainty. Each model is evaluated to determine the corresponding communication rate under a given covertness requirement. In addition, we notice that the authors in [42] investigated wireless covert communication by employing the BPSK codebook in noise-asymmetric scenarios. The existing research has not fully explored OOK. The simple structure and high power efficiency of OOK have not been fully utilized. Inspired by [26,40,42], this paper studies OOK-based covert communication in asymmetric noise systems, analyzing the impact of signal amplitude and initial phase angles with different noise components on the KL divergence and mutual information of the codebook. It also presents the maximum covert transmission rate achievable under the covertness constraint. Compared to [42], our main contributions are summarized below.
(1)
This work investigates the covertness performance of an OOK coding scheme in asymmetric Gaussian noise environments, where the “on” and “off” symbols exhibit asymmetry both in geometric structure and probability distribution. This inherent asymmetry distinguishes OOK codebooks fundamentally from centrally symmetric ones such as BPSK and QAM. As a result, conventional analytical methods that rely on uniformly distributed symbols and symmetric constellations are inadequate for accurately analyzing the covertness and transmission performance of an OOK coding scheme in asymmetric Gaussian noise environments. To address this issue, our work overcomes this limitation by providing a more generalized theoretical framework for analyzing OOK-based covert communication in asymmetric noise systems.
(2)
Existing studies have demonstrated that the initial phase angle imposed by the transmitter on the transmitted symbols has a negligible effect on the covertness performance of the codebook in asymmetric noise systems. However, our study reveals that in asymmetric noise systems, the phase angle plays a crucial role in covert communication. Specifically, under covertness constraint, the optimal phase angle that maximizes the transmission rate is not fixed but is influenced by the asymmetry of the noise components, tending to align with the direction of the weaker noise component.
In a nutshell, existing covert communication theories and implementations mainly focus on symmetric noise systems, with limited attention given to asymmetric scenarios. While optimization of initial phase angles and signal amplitudes has demonstrated effectiveness in symmetric channels, the intrinsic asymmetry of OOK codebooks poses a significant challenge [43]. To bridge this gap, our work proposes an OOK-based covert communication scheme specifically designed to achieve covert transmission.

3. System Model

3.1. Communication Scenario

As shown in Figure 1, we consider a complex-valued AWGN channel covert communication model. This communication model includes the legitimate sender Alice, the legitimate receiver Bob and the detector Willie. Alice needs to covertly send information X n composed of n symbols x = { x i } i = 1 n to Bob through the asymmetric noise channel while minimizing the possibility of detection by Willie. Meanwhile, Willie tries to detect whether communication behavior is happening between Alice and Bob. When Alice is communicating, every channel uses i where i { 1 , 2 , n } , and the signals received by Bob and Willie can be respectively expressed as:
Y B , i = h b x i + n B , i ,
Y W , i = h w x i + n W , i ,
where h b represents the Alice–Bob channel coefficient, h w represents the Alice–Willie channel coefficient. n B , i and n W , i are independent and identically distributed (i.i.d.) complex-valued Gaussian white noise for the Alice–Bob channel and the Alice–Willie channel, respectively, with zero mean and variances of 2 σ b 2 and 2 σ w 2 , respectively. The noise satisfies n B , i CN 0 , 2 σ b 2 , n W , i CN 0 , 2 σ w 2 . Willie determines whether communication behavior is occurring between Alice and Bob by performing a binary hypothesis test on the received channel output signal Y W = { Y W , i } i = 1 n .

3.2. Codebook Construction

We consider that Alice encodes the message M into a codeword of length n, denoted as x n = [ x 1 , x 2 , , x n ] , and sends it to Bob. Note that each codeword x i can be uniquely characterized by its amplitude x i and initial phase θ x i . Therefore, in this paper, we can interchangeably use the notation ( x i , θ x i ) to represent x i . To simplify the subsequent discussion, we represent ( x i , θ x i ) as x i . Next, we will discuss the construction of the OOK codebook with an initial angle in detail.
In the OOK codebook, we use { 0 , β } as the input alphabet, where each symbol x i can be sent either ( 0 , 0 ) or ( β , θ ) . We denote the input distribution on { ( 0 , 0 ) , ( β , θ ) } as P O O K ( x i ) . According to the distribution P O O K n x n = i = 1 n P O O K ( x i ) , the codeword x n is independently and randomly generated and satisfied:
P OOK x i = ( β , θ ) = 1 P OOK x i = ( 0 , 0 ) = a n .
The structure of the OOK codebook is shown in Figure 2. To intuitively display the structure of the codebook, all non-zero symbols are transmitted with an initial phase angle π / 4 . When Alice uses the OOK codebook to send messages to Bob, Willie determines whether the communication behavior is happening through a binary hypothesis test.

3.3. Hypothesis Test

To determine whether communication is happening between Alice and Bob, Willie conducts signal detection based on the received n output signal Y W = { Y W , i } i = 1 n and treats it as a binary hypothesis testing problem. The null hypothesis H 0 indicates that no communication behavior has occurred between Alice and Bob, and the channel contains only Gaussian noise. The alternative hypothesis H 1 indicates that communication behavior has occurred, and the channel output signal includes both channel noise and the transmitted signal Y W , i = x i + n W , i . To detect communication behaviors, Willie attempts to distinguish between the null hypothesis and the alternative hypothesis, which can be described as follows:
H 0 : Y W , i = n W , i ,
H 1 : Y W , i = x i + n W , i .
We define Q 0 n and Q 1 n as the probability distributions of the channel output signals received by Willie under the null hypothesis H 0 and the alternative hypothesis H 1 , respectively. In addition, we define D 0 as the binary decision when Willie supports H 0 , and D 1 as the binary decision when Willie supports H 0 . In hypothesis testing, we generally use the total error probability ξ = P F A + P M D as the measure of Willie’s detection performance. P F A = P ( D 1 | H 0 ) is the Type I error probability (false alarm probability), which means the probability that Willie chooses D 1 when no communication behaviors take place. P M D = P ( D 0 | H 1 ) is the Type II error probability (missed detection probability), which means the probability that Willie chooses D 0 when communication behaviors take place. To ensure achievable results, Alice must guarantee that Willie cannot reliably distinguish whether communication behaviors are taking place, which requires the total error probability to satisfy P F A + P M D = 1 when making decisions based on the channel output signal. We assume that Willie can obtain the minimum total error probability ξ * with equal prior probability by employing the optimal detection strategy. ξ * can be expressed as:
ξ * = 1 V Q 1 n Q 0 n .
Considering the Pinsker’s inequality, the total error probability associated with Willie’s optimal detection strategy is formulated as ξ * 1 1 2 D Q 1 n Q 0 n . D Q 1 n Q 0 n is the KL divergence between the distributions Q 0 n and Q 1 n . To achieve effective covert communication, we must ensure that D Q 1 n Q 0 n is sufficiently small to satisfy:
D Q 1 n Q 0 n ϵ ,
where ϵ > 0 is sufficiently small. Therefore, we choose KL divergence as the covertness performance measure. Under the null hypothesis H 0 , the signal received by Willie is Y W , i = n W , i and the probability distribution of Y W is defined as Q 0 n x n , y n and its expression can be expressed as:
H 0 : Q 0 n x n , y n = i = 1 n 1 2 π σ w , x σ n , y exp x i 2 2 σ w , x 2 y i 2 2 σ w , y 2 ,
where σ w , x 2 and σ w , y 2 represent the variance components of the complex Gaussian noise received by Willie on the real and imaginary axes of the complex plane, satisfying σ w , x 2 + σ w , y 2 = σ w 2 . On the other hand, Alice generates codewords ( 0 , 0 ) or ( β , θ ) with the probabilities described in (3). The probability distribution of Y W under the alternative hypothesis H 1 can be expressed as:
H 1 : Q 1 n x n , y n = i = 1 n 1 2 π σ w , x σ w , y [ a n exp ( x i β cos θ ) 2 2 σ w , x 2 ( y i β sin θ ) 2 2 σ w , y 2 + ( 1 a n ) exp x i 2 2 σ w , x 2 y i 2 2 σ w , y 2 ] .
To simplify the representation, we use D 0 to denote the KL divergence between distributions Q 0 n and Q 1 n , i.e., D o D Q 1 n Q 0 n .

3.4. Performance Analysis of the Covert Transmission

In covert communication studies, the transmission rate is commonly measured by the mutual information between Alice and Bob, as it reflects the covert throughput under covertness constraints. Accordingly, we adopt mutual information as the metric for covert transmission rate in this work. The mutual information is defined as I o ( x n ; Y B ) when using the OOK coding scheme. Let Q b , 0 and Q b , β represent the probability distributions of Y B , i when the channel input is ( 0 , 0 ) and ( β , θ ) , respectively; the expressions are given as:
Q b , 0 = 1 2 π σ b , x σ b , y exp x 2 2 σ b , x 2 y 2 2 σ b , y 2 ,
Q b , β = 1 2 π σ w , x σ w , y exp ( x β cos θ ) 2 2 σ b , x 2 ( y β sin θ ) 2 2 σ b , y 2 .
The corresponding output distribution of the Alice–Bob channel is denoted as Q b , 1 , and it is defined as:
Q b , 1 a n Q b , β + ( 1 a n ) Q b , 0 .
In [43], the expression of mutual information for the OOK coding scheme is as follows:
I o x n ; Y B = n · a n D ( Q b , β Q b , 0 ) D ( Q b , 1 Q b , 0 )
= n · a n D ( Q b , β Q b , 1 ) + ( 1 a n ) D ( Q b , 0 Q b , 1 )

3.5. Problem Formulation

In this work, we consider the covertness constraint described in Section 3.3. We assume that Willie adopts the optimal detection strategy. We aim to maximize the mutual information in (14) by optimizing the non-zero signal input distribution, signal amplitude, and initial phase angle while satisfying the covertness constraint. The covert communication problem in noise-asymmetric systems can be formulated as:
P 1 : max a n , β , θ I x n ; Y B
s . t . D Q 0 n Q 1 n ϵ ,
β > 0 ,
0 θ < 2 π .

4. Performance Analysis of the Covert Transmission

4.1. Analysis of Covertness Performance

As described in the previous section, KL divergence is frequently employed in covert communication as a metric to assess the covertness performance of codebooks. For two probability distributions, Q 0 and Q 1 , the KL divergence is defined as follows:
D ( Q 1 Q 0 ) = Q 1 ( x , y ) log Q 1 ( x , y ) Q 0 ( x , y ) d x d y .
Since the channel is memoryless, we have D ( Q 1 n Q 0 n ) = n D ( Q 1 Q 0 ) by the chain rule. Combining the probability distribution Q 0 n and Q 1 n described in (8) and (9), the detailed derivation of KL divergence between two single-letter distributions Q 1 and Q 0 can be expressed as:
D ( Q 1 Q 0 )
= Q 1 ( x , y ) log Q 1 ( x , y ) Q 0 ( x , y ) d x d y = Q 1 ( x , y ) log [ a n exp ( 2 x β cos θ + β 2 cos 2 θ σ w , y 2 2 σ w , x 2 σ w , y 2
2 y β sin θ + β 2 sin 2 θ σ w , x 2 2 σ w , x 2 σ w , y 2 ) + 1 a n ] d x d y = Q 1 ( x , y ) [ a n β ( y sin θ σ w , x 2 + x cos θ σ w , y 2 ) σ w , x 2 σ w , y 2 β 2 ( a n σ w , x 2 sin 2 θ + σ w , y 2 cos 2 θ 2 σ w , x 2 σ w , y 2 ( 2 y sin θ σ w , x 2 + 2 x cos θ σ w , y 2 ) 2 8 σ w , x 4 σ w , y 4
+ a n 2 ( 2 y sin θ σ w , x 2 + 2 x cos θ σ w , y 2 ) 2 8 σ w , x 4 σ w , y 4 ) + O ( β 3 ) ] d x d y
= Q 1 ( x , y ) β · μ 1 β 2 · μ 2 + O ( β 3 ) d x d y ,
For clarity of presentation, we define:
μ 1 = a n y sin θ σ w , x 2 + x cos θ σ w , y 2 σ w , x 2 σ w , y 2 ,
μ 2 = a n σ w , x 2 sin 2 θ + σ w , y 2 cos 2 θ 2 σ w , x 2 σ w , y 2 2 y sin θ σ w , x 2 + 2 x cos θ σ w , y 2 2 8 σ w , x 4 σ w , y 4 + a n 2 2 y sin θ σ w , x 2 + 2 x cos θ σ w , y 2 2 8 σ w , x 4 σ w , y 4 .
In classical covert communication scenarios, the signal amplitude needs to be small enough to achieve covert transmission. Here, we perform a Taylor series expansion on log ( · ) in (22) to obtain the approximate expression concerning β . To derive the first-order approximation which includes the variables x, y and their powers, we use the central moments to simplify. Considering a Gaussian probability distribution D N ( μ , σ 2 ) with mean μ and variance σ 2 , the first- and second-order central moments of x and y are shown as follows:
D · x d x d y = μ ,
D · x 2 d x d y = μ 2 + σ 2 .
According to the distribution Q 1 ( x , y ) , we summarize the central moments of x and y, as well as their second powers, as follows:
x = a n · β cos θ + ( 1 a n ) · 0 = a n β cos θ ,
y = a n · β sin θ + ( 1 a n ) · 0 = a n β sin θ ,
x 2 = a n · β 2 cos 2 θ + σ w , x 2 + ( 1 a n ) · σ w , x 2 = a n β 2 cos 2 θ + σ w , x 2 ,
y 2 = a n · β 2 sin 2 θ + σ w , y 2 + ( 1 a n ) · σ w , y 2 = a n β 2 sin 2 θ + σ w , y 2 .
The first term of (24) can be obtained as follows:
Q 1 ( x , y ) β μ 1 d x d y = a n 2 β 2 sin 2 θ σ w , x 2 + cos 2 θ σ w , y 2 σ w , x 2 σ w , y 2 + O β 3 .
Similar to the above process, the second term can be obtained
Q 1 ( x , y ) β 2 μ 2 d x d y = a n β 2 σ w , x 2 sin 2 θ + σ w , y 2 cos 2 θ 2 σ w , x 2 σ w , y 2 + a n 2 a n β 2 y 2 sin 2 θ σ w , x 4 + x 2 cos 2 θ σ w , y 4 2 σ w , x 4 σ w , y 4
+ a n 2 a n β 2 2 sin θ cos θ σ w , x 2 σ w , y 2 x y 2 σ w , x 4 σ w , y 4 = a n 2 a n β 2 ( σ w , y 2 + a n β 2 sin 2 θ ) sin 2 θ σ w , x 4 + ( σ w , x 2 + a n β 2 cos 2 θ ) cos 2 θ σ w , y 4 2 σ w , x 4 σ w , y 4
+ a n 2 a n β 2 2 a n 2 β 2 sin 2 θ cos 2 θ σ w 2 2 σ w , x 4 σ w , y 4 + a n β 2 σ w , x 2 sin 2 θ + σ w , y 2 cos 2 θ 2 σ w , x 2 σ w , y 2
= a n β 2 σ w , x 2 sin 2 θ + σ w , y 2 cos 2 θ 2 σ w , x 2 σ w , y 2 + a n 2 a n β 2 sin 2 θ σ w , x 2 + cos 2 θ σ w , y 2 2 σ w , x 2 σ w , y 2 + O β 4
= a n 2 β 2 ( sin 2 θ σ w , x 2 + cos 2 θ σ w , y 2 ) 2 σ w , x 2 σ w , y 2 + O β 4 .
Combining (33), (38), and the chain rule, the KL divergence between Q 1 n and Q 2 n can be expressed as:
D ( Q 1 n Q 0 n ) = a n 2 n β 2 ( sin 2 θ σ w , x 2 + cos 2 θ σ w , y 2 ) 2 σ w , x 2 σ w , y 2
= a n 2 n β 2 2 sin 2 θ σ w , y 2 + cos 2 θ σ w , x 2 + O β 4 .

4.2. Analysis of Transmission Performance

The expression of mutual information between x n and Y B is as shown in (14). The calculation process for the first term of the mutual information expression is as follows:
a n D ( Q b , β Q b , 1 ) = a n 2 π σ b , x σ b , y exp ( x β cos θ ) 2 2 σ b , x 2 ( y β sin θ ) 2 2 σ b , y 2 × log a n + ( 1 a n ) exp 2 x β cos θ β 2 cos 2 θ 2 σ b , x 2 2 y β sin θ β 2 sin 2 θ 2 σ b , y 2 d x d y .
We perform Taylor series expansion of the log(·) term in (41) and use central moments for simplification. The approximation of a n D ( Q b , β Q b , 1 ) is as follows:
a n D ( Q b , β Q b , 1 ) a n [ ( a n 1 ) β 2 cos 2 θ 2 σ b , x 2 + ( a n 1 ) β 2 sin 2 θ 2 σ b , y 2 + ( a n a n 2 ) β 2 cos 2 θ 2 σ b , x 2 + a n a n 2 β 2 sin 2 θ 2 σ b , y 2 + O β 4 ]
a n ( a n 1 ) 2 β 2 cos 2 θ 2 σ b , x 2 + ( a n 1 ) 2 β 2 sin 2 θ 2 σ b , y 2 + O β 4 .
Similarly, the calculation of the second term of the mutual information expression is as follows:
( 1 a n ) D ( Q b , 0 Q b , 1 ) = ( a n 1 ) 1 2 π σ b , x σ b , y exp x 2 2 σ b , x 2 y 2 2 σ b , y 2 × log 1 a n + a n exp 2 x β cos θ β 2 cos 2 θ 2 σ b , x 2 + 2 y β sin θ β 2 sin 2 θ 2 σ b , y 2
( 1 a n ) a n 2 β 2 cos 2 θ 2 σ b , x 2 + a n 2 β 2 sin 2 θ 2 σ b , y 2 .
Combining Equations (14), (43), and (45) and the chain rule, the mutual information of the OOK coding scheme can be expressed as:
I o x n ; Y B ( a n a n 2 ) n β 2 cos 2 θ 2 σ b , x 2 + ( a n a n 2 ) n β 2 sin 2 θ 2 σ b , y 2 + O β 4
( a n a n 2 ) β 2 n 2 cos 2 θ σ b , x 2 + sin 2 θ σ b , y 2 + O β 4 .

5. Design of Amplitude Gain and Phase Angle

According to the mathematical description of the covertness constraint of problem P1, combined with the KL divergence expression in Section 4.1, we can rewrite the covertness constraint as:
a n 2 n β 2 2 sin 2 θ σ w , y 2 + cos 2 θ σ w , x 2 ϵ .
The expression of mutual information is derived in Section 4.2. The mutual information within the optimization problem is given by:
I x n ; Y B = ( a n a n 2 ) β 2 n 2 cos 2 θ σ b , x 2 + sin 2 θ σ b , y 2 .
To simplify the subsequent derivation process, we construct the following definitions:
M ( θ ) = cos 2 θ σ b , x 2 + sin 2 θ σ b , y 2 ,
K ( θ ) = sin 2 θ σ w , y 2 + cos 2 θ σ w , x 2 .
Based on the above definitions and derivations, problem P1 can be further reformulated as problem P2
P 2 : max a n , β , θ ( a n a n 2 ) β 2 n 2 M ( θ )
s . t . a n 2 n β 2 2 K ( θ ) ϵ ,
0 < β ,
0 θ < 2 π .
Considering the covertness constraint, we assume that the detector employs an optimal detection strategy. Under this circumstance, the transmitted signal’s maximum amplitude is given by:
β = 2 ϵ a n 2 n K ( θ ) .
By substituting the maximum amplitude into the mutual information expression of problem P2, problem P2 can be rewritten in the following form:
P 3 : max a n , θ ϵ ( a n a n 2 ) M ( θ ) a n 2 K ( θ )
s . t . 0 θ < 2 π .
In the optimization process, for the phase-angle range θ from 0 to 2 π , there exists an optimal phase angle θ that can maximize mutual information while satisfying the covertness constraint.

6. Numerical Results

To evaluate the influence of asymmetric noise systems on the covertness performance of the OOK coding scheme, this section presents detailed simulation analyses to examine the impact of signal amplitude and initial phase angle on both KL divergence and mutual information with diverse noise configurations. Furthermore, we provide simulation results for the maximum covert transmission rate achievable under the covertness constraint in problem P3. Without loss of generality, we set standardized simulation parameters as follows: the channel uses n = 10,000, and the Gaussian noise power satisfies σ w , x 2 + σ w , y 2 = 1 , σ b , x 2 + σ b , y 2 = 1 .
In Figure 3, we plot the KL divergence of the OOK coding scheme D ( Q 1 n Q 0 n ) versus the initial phase angle θ with five different parameter configurations, where the noise components on the x-axis are 0.3, 0.4, 0.5, 0.55, and 0.65, while the corresponding noise components on the y-axis are 0.7, 0.6, 0.5, 0.45, and 0.35. Meanwhile, the channel input distribution parameter a n is set to 0.5, the channel uses n = 10,000, and the signal amplitude β is set to 0.001. We can intuitively observe that when the channel noise is symmetric, i.e., σ w , x 2 = σ w , y 2 , the KL divergence remains constant, indicating that the choice of phase angle does not affect the covertness performance of the codebook in the symmetric noise channel. However, when the channel noise is asymmetric, the KL divergence exhibits sinusoidal variations as θ changes. It is worth noting that in [26], the phase angle has a minimal impact on covertness performance due to the uniform distribution of noise masking any phase-induced differences in a symmetric noise channel. In contrast, in an asymmetric noise channel, there exists an optimal initial phase angle that can achieve better performance. Figure 3 further reveals the relationship between the optimal phase angle and the channel noise components. Specifically, the optimal phase angle is related to the noise components on the x-axis and y-axis. When σ w , x 2 > σ w , y 2 , the optimal angles are 0 or π , i.e., the signal distributed along the x-axis. When σ w , x 2 < σ w , y 2 , the optimal angles are π 2 or 3 π 2 , i.e., the signal distributed along the y-axis. From a physical perspective, transmitting along the axis with higher noise power allows the noise to better obscure the communication signal, thereby improving covertness performance.
In Figure 4, we plot the mutual information of the OOK coding scheme versus the initial phase angle θ with three different channel noise-component configurations, where noise components on the x-axis are 0.35, 0.55, and 0.75, while the corresponding noise components on the y-axis are 0.65, 0.45, and 0.25. It is intuitively clear from the figure that the mutual information of the codebook exhibits a sinusoidal fluctuation pattern with variations in θ . This trend shows a significant similarity to the KL divergence versus phase angle, as shown in Figure 3, indicating that the initial phase angle influences not only the KL divergence but also the mutual information of the codebook. The selection of the optimal phase angle is determined by the σ b , x 2 and σ b , y 2 .
Figure 5 depicts the KL divergence of the OOK coding scheme versus signal amplitudes β with four phase-angle configurations. To examine the impact of the initial phase angle θ on covertness performance, θ is set to 0, π 4 , π 2 and 3 π 4 , respectively. It can be observed from the figure that as the signal amplitude increases, the KL divergence also rises, which means an increase in signal amplitude results in poorer performance. Furthermore, the value of the initial phase angle significantly affects the KL divergence. When θ = 0 , the KL divergence reaches its maximum. As θ increases to π 2 , the KL divergence decreases and attains its minimum. Beyond π 2 , as θ continues to increase toward 3 π 4 and further to π , the KL divergence rises again. This trend is consistent with the observations in Figure 3, further validating that the optimal initial phase angle exhibits a strong correlation with the channel noise component on the x-axis and y-axis. In particular, when the noise component on the x-axis is smaller, the optimal angles are π 2 or 3 π 2 . In this case, as θ increases from 0 to π 2 or from π to 3 π 2 , the noise-masking effect on the signal improves and the KL divergence gradually reaches its minimum. Conversely, when the noise component on the x-axis is larger, the optimal angles are 0 or π . As θ increases from 0 to π 2 or from π to 3 π 2 , the noise-masking effect on the signal weakens, causing the KL divergence to reach its maximum. Additionally, Figure 5 reveals the impact of channel input distribution a n on the KL divergence. The figure presents the KL divergence corresponding to different a n under the same θ . As a n decreases, the KL divergence also decreases, indicating that a sparser codeword distribution can effectively improve covertness performance.
In Figure 6, we plot the mutual information of the OOK coding scheme versus signal amplitudes β with four phase configurations, where the phase angle θ is set to 0, π 4 , π 2 and 3 π 4 , respectively. The remaining parameter settings are consistent with those in Figure 5. The figure shows that as the signal amplitude increases, the mutual information also rises, following a trend similar to that of KL divergence versus β . However, the effect of the θ on mutual information differs from its influence on KL divergence. Specifically, when the noise component on the x-axis is larger, the optimal angles are chosen from π 2 or 3 π 2 . As θ increases from 0 to π 2 or from π to 3 π 2 , the interference caused by noise in information transmission is reduced, and mutual information gradually reaches its maximum. Conversely, when the noise component on the x-axis is larger, the trend is reversed.
Figure 7 shows the mutual information versus the initial phase angle θ achieved by the OOK coding scheme under covertness constraint. We consider three different communication scenarios: in Scenario 1, σ b , x 2 > σ b , y 2 , σ w , x 2 > σ w , y 2 ; in Scenario 2, σ b , x 2 < σ b , y 2 , σ w , x 2 < σ w , y 2 ; in Scenario 3, σ b , x 2 < σ b , y 2 , σ w , x 2 > σ w , y 2 . Each scenario represents different channel noise distributions. We can observe that the transmission rate trend is directly influenced by the distribution of the noise components on the Alice-Bob channel. Similar to the trend shown in Figure 6, the direction with larger channel noise components has a more significant inhibitory effect on signal transmission. When θ is closer to the direction with larger noise components, the noise interference on the signal increases, leading to a decrease in mutual information and thus reducing the transmission rate. In addition, the figure reveals that the value of transmission rate is jointly determined by the noise distribution on Alice-Bob and Willie-Willie channels in asymmetric noise systems.
In Figure 8, we plot I ( x n ; Y B ) of the OOK coding scheme versus the covertness parameters ϵ for five different scenarios and provide approximation results. In Scenario 1, σ b , x 2 = 0.3 , σ b , y 2 = 0.7 , σ w , x 2 = 0.4 , σ w , y 2 = 0.6 ; in Scenario 2, σ b , x 2 = 0.3 , σ b , y 2 = 0.7 , σ w , x 2 = 0.6 , σ w , y 2 = 0.4 ; in Scenario 3, σ b , x 2 = 0.7 , σ b , y 2 = 0.3 , σ w , x 2 = 0.4 , σ w , y 2 = 0.6 ; in Scenario 4, σ b , x 2 = 0.7 , σ b , y 2 = 0.3 , σ w , x 2 = 0.6 , σ w , y 2 = 0.4 ; in Scenario 5, σ b , x 2 = σ b , y 2 = σ w , x 2 = σ w , y 2 = 0.5 . The initial phase is set to 0. When the direction of the lower noise-power component in the Alice–Bob channel aligns with the initial phase of the transmitted codeword, the signal undergoes less attenuation along that direction, enhancing the achievable mutual information. Consequently, as observed in Figure 8, the transmission rate in Scenario 1 and Scenario 2 is significantly higher than that in the case of symmetric distributed noise power, as represented by Scenario 5. Furthermore, if the initial phase were instead set to π / 2 under the same channel conditions, the signal energy would primarily align with the direction of higher noise power, resulting in stronger interference and a notable reduction in the maximum achievable covert transmission rate. Moreover, our approximation closely aligns with the outcomes derived from exact numerical results, thereby validating our theory.

7. Conclusions

This paper investigates the covertness performance of OOK coding scheme in asymmetric noise systems and proposes a covert communication coding scheme based on the initial phase angle. The proposed scheme improves covertness by aligning the optimal phase shifts of transmitted symbols with the direction of minimum noise power, effectively utilizing channel noise to mask transmissions and minimize their detectability. We derive the closed-form expressions of OOK coding scheme’s KL divergence and mutual information in asymmetric noise systems, where KL divergence serves as the covertness measure and mutual information as the transmission performance measure. We formulate an optimization problem that maximizes the transmission rate under covertness constraints and solves it. Moreover, we propose an optimal covert transmission strategy that aligns the transmitted codewords’ initial phase angle with the direction of lower noise components, effectively mitigating noise-induced interference. Numerical results demonstrate that in asymmetric noise systems, the initial phase angle significantly influences both KL divergence and the transmission rate. Furthermore, the optimal initial phase angle is significantly influenced by the noise-component magnitude, and it is effective in reducing noise interference by adjusting it toward the direction with lower noise components.

Author Contributions

Conceptualization, W.X. and R.Z.; methodology, W.X. and X.J.; software, X.J. and R.Z.; validation, W.X. and R.Z.; formal analysis, X.J. and R.Z.; investigation, W.X. and R.Z.; resources, X.J. and R.Z.; data curation, W.X. and R.Z.; writing—original draft preparation, W.X. and R.Z.; writing—review and editing, W.X. and X.J.; visualization, X.J. and R.Z.; supervision, W.X. and X.J.; project administration, R.Z. and X.J.; funding acquisition, R.Z. and X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the Postgraduate Research and Practice Innovation Program of Jiangsu Province grant number SJCX24_0447, in part by the National Natural Science Foundation of China grant number 62301266 and 62171119, in part by the Key Research and Development Plan of Jiangsu Province grant number BE2021013-3, and in part by Jiangsu Province Natural Science Foundation grant number BK20230415.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
BPSKBinary Phase-Shift Keying
PLSPhysical-Layer Security
NOMANon-Orthogonal Multiple Access
AWGNAdditive White Gaussian Noise
KLKullback–Leibler divergence
IoTInternet of Things
RRCroot-raised cosine

References

  1. Lu, Y.; Xu, L.D. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2019, 6, 2103–2115. [Google Scholar] [CrossRef]
  2. Liu, Y.; Wang, X.; Boudreau, G.; Sediq, A.B.; Abou-Zeid, H. A Multi-Dimensional Intelligent Multiple Access Technique for 5G Beyond and 6G Wireless Networks. IEEE Trans. Wirel. Commun. 2021, 20, 1308–1320. [Google Scholar] [CrossRef]
  3. Heng, Y.; Andrews, J.G.; Mo, J.; Va, V.; Ali, A.; Ng, B.L.; Zhang, J.C. Six Key Challenges for Beam Management in 5.5G and 6G Systems. IEEE Commun. Mag. 2021, 59, 74–79. [Google Scholar] [CrossRef]
  4. Wang, T.; Yang, H.; Li, Q. Physical Layer Security for Full Duplex Relay System. In Proceedings of the 2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Beijing, China, 14–16 June 2023; pp. 1–3. [Google Scholar] [CrossRef]
  5. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  6. Zhou, Z.; Mu, Y.; Wu, Q.M.J. Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 2019, 23, 4927–4938. [Google Scholar] [CrossRef]
  7. Ker, A.D. A Capacity Result for Batch Steganography. IEEE Signal Process. Lett. 2007, 14, 525–528. [Google Scholar] [CrossRef]
  8. Wang, C.; Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Niyato, D. Covert Communication Assisted by UAV-IRS. IEEE Trans. Commun. 2023, 71, 357–369. [Google Scholar] [CrossRef]
  9. Iqbal, A.; Tham, M.L.; Wong, Y.J.; Al-Habashna, A.; Wainer, G.; Zhu, Y.X.; Dagiuklas, T. Empowering Non-Terrestrial Networks With Artificial Intelligence: A Survey. IEEE Access 2023, 11, 100986–101006. [Google Scholar] [CrossRef]
  10. Liu, Z.; Liu, J.; Zeng, Y.; Ma, J. Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band. IEEE Internet Things J. 2020, 7, 3378–3388. [Google Scholar] [CrossRef]
  11. Gao, C.; Yang, B.; Jiang, X.; Inamura, H.; Fukushi, M. Covert Communication in Relay-Assisted IoT Systems. IEEE Internet Things J. 2021, 8, 6313–6323. [Google Scholar] [CrossRef]
  12. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1173–1198. [Google Scholar] [CrossRef]
  13. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef]
  14. Soderi, S.; Nicola, R.D. CONNECTION: Covert Channel Network Attack through Bit-rate Modulation. In Emerging Information Security and Applications; Springer: Singapore, 2024; pp. 164–183. [Google Scholar] [CrossRef]
  15. Ma, Y.; Ma, R.; Lin, Z.; Zhang, R.; Cai, Y.; Wu, W.; Wang, J. Improving Age of Information for Covert Communication With Time-Modulated Arrays. IEEE Internet Things J. 2025, 12, 1718–1731. [Google Scholar] [CrossRef]
  16. Ma, R.; Yang, W.; Guan, X.; Lu, X.; Song, Y.; Chen, D. Covert mmWave Communications with Finite Blocklength Against Spatially Random Wardens. IEEE Internet Things J. 2024, 11, 3402–3416. [Google Scholar] [CrossRef]
  17. Liu, S.; Khan, M.A.; Bilal, M.; Zuberi, H.H. Low Probability Detection Constrained Underwater Acoustic Communication: A Comprehensive Review. IEEE Commun. Mag. 2025, 63, 21–30. [Google Scholar] [CrossRef]
  18. Ma, X.; Wang, B.; Tian, W.; Ding, X.; Han, Z. Strategic Game Model for AUV-Assisted Underwater Acoustic Covert Communication in Ocean Internet of Things. IEEE Internet Things J. 2024, 11, 22508–22520. [Google Scholar] [CrossRef]
  19. Ghazy, A.S.; Kaddoum, G.; Satinder, S. IRS-Aided Secure Reliable Underwater Acoustic Communications. IEEE Trans. Veh. Technol. 2024, 73, 16861–16875. [Google Scholar] [CrossRef]
  20. Zhang, L.; Huang, T.; Rasheed, W.; Hu, X.; Zhao, C. An Enlarging-the-Capacity Packet Sorting Covert Channel. IEEE Access 2019, 7, 145634–145640. [Google Scholar] [CrossRef]
  21. Taheri, S.; Mahdavi, M.; Moghim, N. A dynamic timing-storage covert channel in vehicular ad hoc networks. Telecommun. Syst. 2018, 69, 415–429. [Google Scholar] [CrossRef]
  22. Zander, S.; Armitage, G.; Branch, P. A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 2007, 9, 44–57. [Google Scholar] [CrossRef]
  23. Cui, J.; Yan, S.; Hu, J.; Li, N.; Chen, R.; Li, J. How Does Repetition Coding Enable Reliable and Covert Communications? IEEE Wirel. Commun. Lett. 2021, 10, 639–643. [Google Scholar] [CrossRef]
  24. Topal, O.A.; Kurt, G.K. Covert Communication in Cooperative NOMA Networks. In Proceedings of the 2020 28th Signal Processing and Communications Applications Conference (SIU), Gaziantep, Turkey, 5–7 October 2020; pp. 1–4. [Google Scholar] [CrossRef]
  25. Ahmadzadeh, S.A.; Agnew, G. Turbo covert channel: An iterative framework for covert communication over data networks. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2031–2039. [Google Scholar] [CrossRef]
  26. Ji, X.; Zhu, R.; Zhang, Q.; Li, C.; Cao, D. Enhancing Covert Communication in OOK Schemes by Phase Deflection. IEEE Trans. Inf. Forensics Secur. 2024, 19, 9775–9788. [Google Scholar] [CrossRef]
  27. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  28. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable deniable communication: Hiding messages in noise. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2945–2949. [Google Scholar] [CrossRef]
  29. Tahmasbi, M.; Bloch, M.R. First- and Second-Order Asymptotics in Covert Communication. IEEE Trans. Inf. Theory 2019, 65, 2190–2212. [Google Scholar] [CrossRef]
  30. Bloch, M.R. Covert Communication Over Noisy Channels: A Resolvability Perspective. IEEE Trans. Inf. Theory 2016, 62, 2334–2354. [Google Scholar] [CrossRef]
  31. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental Limits of Communication With Low Probability of Detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef]
  32. Abdelaziz, A.; Koksal, C.E. Fundamental limits of covert communication over MIMO AWGN channel. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; pp. 1–9. [Google Scholar] [CrossRef]
  33. Bendary, A.; Abdelaziz, A.; Koksal, C.E. Achieving Positive Covert Capacity Over MIMO AWGN Channels. IEEE J. Sel. Areas Inf. Theory 2021, 2, 149–162. [Google Scholar] [CrossRef]
  34. Arumugam, K.S.K.; Bloch, M.R. Covert Communication Over a K -User Multiple-Access Channel. IEEE Trans. Inf. Theory 2019, 65, 7020–7044. [Google Scholar] [CrossRef]
  35. Kumar Arumugam, K.S.; Bloch, M.R. Embedding Covert Information in Broadcast Communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef]
  36. Tan, V.Y.F.; Lee, S.H. Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1377–1389. [Google Scholar] [CrossRef]
  37. Zhang, Q.; Bakshi, M.; Jaggi, S. Covert Communication Over Adversarially Jammed Channels. IEEE Trans. Inf. Theory 2021, 67, 6096–6121. [Google Scholar] [CrossRef]
  38. Zhang, Q.E.; Bloch, M.R.; Bakshi, M.; Jaggi, S. Undetectable Radios: Covert Communication under Spectral Mask Constraints. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 992–996. [Google Scholar] [CrossRef]
  39. Hayashi, M.; Vázquez-Castro, Á. Covert Communication With Gaussian Noise: From Random Access Channel to Point-to-Point Channel. IEEE Trans. Commun. 2024, 72, 1516–1531. [Google Scholar] [CrossRef]
  40. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication With Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  41. Zeng, Y.; Liang, Y.C.; Hoang, A.T.; Peh, E.C.Y. Reliability of Spectrum Sensing Under Noise and Interference Uncertainty. In Proceedings of the 2009 IEEE International Conference on Communications Workshops, Dresden, Germany, 14–18 June 2009; pp. 1–5. [Google Scholar] [CrossRef]
  42. Qiao, S.; Zhu, R.; Ji, X.; Zhao, J.; Ding, H. Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems. Sensors 2024, 24, 796. [Google Scholar] [CrossRef]
  43. Kadampot, I.A.; Tahmasbi, M.; Bloch, M.R. Codes for Covert Communication over Additive White Gaussian Noise Channels. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 977–981. [Google Scholar] [CrossRef]
Figure 1. The complex−valued AWGN channel covert communication model.
Figure 1. The complex−valued AWGN channel covert communication model.
Sensors 25 02948 g001
Figure 2. The structure of the OOK codebook.
Figure 2. The structure of the OOK codebook.
Sensors 25 02948 g002
Figure 3. KL divergence versus θ achieved by different channel noise−component configurations.
Figure 3. KL divergence versus θ achieved by different channel noise−component configurations.
Sensors 25 02948 g003
Figure 4. Mutual information versus θ achieved by different channel noise−component configurations.
Figure 4. Mutual information versus θ achieved by different channel noise−component configurations.
Sensors 25 02948 g004
Figure 5. KL divergence versus the signal amplitude β with σ w , x 2 = 0.3 and σ w , y 2 = 0.7 .
Figure 5. KL divergence versus the signal amplitude β with σ w , x 2 = 0.3 and σ w , y 2 = 0.7 .
Sensors 25 02948 g005
Figure 6. Mutual information versus signal amplitudes with σ w , x 2 = 0.7 and σ w , y 2 = 0.3 .
Figure 6. Mutual information versus signal amplitudes with σ w , x 2 = 0.7 and σ w , y 2 = 0.3 .
Sensors 25 02948 g006
Figure 7. Mutual information versus initial phase angle θ achieved by the OOK coding scheme.
Figure 7. Mutual information versus initial phase angle θ achieved by the OOK coding scheme.
Sensors 25 02948 g007
Figure 8. Mutual information versus ϵ achieved by the OOK coding scheme.
Figure 8. Mutual information versus ϵ achieved by the OOK coding scheme.
Sensors 25 02948 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, W.; Ji, X.; Zhu, R. Covert Communication Scheme for OOK in Asymmetric Noise Systems. Sensors 2025, 25, 2948. https://doi.org/10.3390/s25092948

AMA Style

Xu W, Ji X, Zhu R. Covert Communication Scheme for OOK in Asymmetric Noise Systems. Sensors. 2025; 25(9):2948. https://doi.org/10.3390/s25092948

Chicago/Turabian Style

Xu, Weicheng, Xiaopeng Ji, and Ruizhi Zhu. 2025. "Covert Communication Scheme for OOK in Asymmetric Noise Systems" Sensors 25, no. 9: 2948. https://doi.org/10.3390/s25092948

APA Style

Xu, W., Ji, X., & Zhu, R. (2025). Covert Communication Scheme for OOK in Asymmetric Noise Systems. Sensors, 25(9), 2948. https://doi.org/10.3390/s25092948

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop