Abstract

This paper investigates the joint secrecy and covert communication in a two-hop relaying system consisting of a transmitter Alice, a receiver Bob, an eavesdropper Eve and a Relay. Eve always overhears the secret message from Alice. Meanwhile, Alice transmits covert message on top of secret message without being detected by Relay. First, we propose a covert transmission scheme that Alice will transmit covert message only when the signal-to-interference-plus-noise-ratio (SINR) of the secret message is greater than a threshold. Then, we provide the closed-form expressions of covert performance, i.e., the optimal detection threshold of Relay and the corresponding minimal detection error probability as well as the average minimum detection error probability. Finally, extensive numerical results are presented to illustrate the impacts of the system parameters on covert performances. Remarkably, the corresponding theoretical results well match with the simulation ones indicating that our theoretical analysis can accurately model the covert performance of the considered system.

Keywords:
Covert Computer science Relay Secrecy Transmitter Alice and Bob Joint (building) Computer network Alice (programming language) Computer security Power (physics) Engineering

Metrics

2
Cited By
0.33
FWCI (Field Weighted Citation Impact)
20
Refs
0.57
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Buffer-Aided Relaying for Two-Hop Secure Communication

Jing HuangA. Lee Swindlehurst

Journal:   IEEE Transactions on Wireless Communications Year: 2014 Vol: 14 (1)Pages: 152-164
JOURNAL ARTICLE

Adaptive Resource Allocation for Secure Two-Hop Relaying Communication

Khoa T. PhanYi HongEmanuele Viterbo

Journal:   IEEE Transactions on Wireless Communications Year: 2018 Vol: 17 (12)Pages: 8457-8472
© 2026 ScienceGate Book Chapters — All rights reserved.