Journal on Communications ›› 2022, Vol. 43 ›› Issue (8): 203-218.doi: 10.11959/j.issn.1000-436x.2022153

• Comprehensive Reviews • Previous Articles     Next Articles

Survey of capacity limits and implementation techniques in wireless covert communication

Weiyu CHEN1, Junshan LUO1, Fanggang WANG2, Haiyang DING3, Shilian WANG1, Guojiang XIA4   

  1. 1 College of Electronic Science and Technology, National University of Defense Technology, Changsha 410073, China
    2 State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing 100044, China
    3 College of Information and Communication, National University of Defense Technology, Wuhan 430019, China
    4 Beijing Institute of Astronautical Systems Engineering, Beijing 100076, China
  • Revised:2022-06-13 Online:2022-08-25 Published:2022-08-01
  • Supported by:
    The National Natural Science Foundation of China(61871387);The National Natural Science Foundation of China(61871471);The National Natural Science Foundation of China(62171445);The Fundamental Research Funds for the Central Universities(2020JBM081);The NUDT Research Fund(ZK20-40);The State Key Laboratory of Rail Traffic Control and Safety(RCS2022ZT011);Youth Innovation Team of Shaanxi Universities

Abstract:

The differences and connections between wireless covert communication (WCC) and related concepts were clarified.The WCC research based on hypothesis testing theory and information theory was focused.The basic research model and the categories of specific models were introduced.The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques.The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate.The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios.Finally, potential research directions were discussed.

Key words: wireless covert communication, low probability of detection communication, physical-layer security, information security

CLC Number: 

No Suggested Reading articles found!