COVERT COMMUNICATION TECHNIQUE FOR INTELLIGENT REFLECTING SURFACE-ASSISTED WIRELESS NETWORKS WITH A FRIENDLY JAMMER
20260039410 ยท 2026-02-05
Assignee
Inventors
Cpc classification
H04K3/43
ELECTRICITY
H04K1/10
ELECTRICITY
H04K3/827
ELECTRICITY
International classification
Abstract
We disclose a novel methodology and wireless network for covert wireless RF communications between an agent device and a client device in the presence of an adversary device which attempts to detect the existence of the transmission of the RF communication between the agent and client. The methodology comprises: providing an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements; providing a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and establishing a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.
Claims
1. A method for covert wireless RF communications between an agent device and a client device in the presence of an adversary device which attempts to detect the existence of the transmission of the RF communication between the agent and client, the method comprising: providing an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements; providing a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and establishing a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.
2. The method of claim 1, wherein establishing the covert communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications comprises: determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client
3. The method of claim 2, wherein said determining comprises: a. determining a transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device taking into account an expected detection error probability (DEP) at an adversary device; b. determining the transmit power P of the agent that satisfies covertness of the transmission for the RF communication for the determined transmission probability and the interval of random jamming power P.sub.J[s]; and c. determining phase calculations of the n-th IRS elements of the IRS .sub.n[s].
4. The method of claim 2, wherein an approximation of achievable rate at the client
5. The method of claim 3, wherein the determining in step a is performed using an extremum-finding algorithm.
6. The method of claim 5, wherein the extremum-finding algorithm is a golden section search scheme.
7. The method of claim 3, wherein the obtaining in step b is performed using a root-finding algorithm.
8. The method of claim 7, wherein the root-finding algorithm is a bisection method.
9. The method of claim 3, wherein the IRS reflection matrix =diag{e.sup.j.sup.
10. The method of claim 9, further comprising: wirelessly transmitting the determined IRS reflection matrix from the agent device to the IRS.
11. The method of 3, further comprising: configuring the IRS for RF communication between the agent device and the client device based on the determined IRS reflection matrix .
12. The method of 2, further comprising: configuring the jamming device to operate with random jamming power.
13. A wireless network comprising: an intelligent reflecting surface (IRS) comprising a 2D array individually-controllable RF reflecting elements to reflect a wireless radio frequency (RF) signals transmitted from an agent device to an client device; a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and a controller configured to establish a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.
14. The wireless network of claim 13, wherein, in establishing the covert communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications, the controller is configured to: determine a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client
15. The wireless network of claim 14, wherein, in establishing the covert communication link between the agent device and the client device by said determining, the controller is configured to: a. determine a transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device taking into account an expected detection error probability (DEP) at an adversary device; b. determine the transmit power P of the agent that satisfies covertness of the transmission for the RF communication for the determined transmission probability and the interval of random jamming power P.sub.J[s]; and c. determine phase calculations of the n-th IRS elements of the IRS .sub.n[s].
16. The wireless network of claim 14, wherein the controller uses an approximation of achievable rate at the client
17. The wireless network of claim 15, wherein the determining in step a is performed using an extremum-finding algorithm.
18. The wireless network of claim 17, wherein the obtaining in step b is performed using a root-finding algorithm.
19. The wireless network of claim 15, wherein the IRS reflection matrix =diag{e.sup.j.sup.
20. The wireless network of claim 13, wherein there IRS comprises at least 20 RF reflecting elements.
21. The wireless network of claim 20, wherein each of the individually controllable RF reflecting elements is configured to provide a phase shift to the reflected signal.
22. The wireless network of claim 13, further comprising at least one agent device and at least one client device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments, including less effective but also less expensive embodiments which for some applications may be preferred when funds are limited. These embodiments are intended to be included within the following description and protected by the accompanying claims.
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
DETAILED DESCRIPTION
[0026] Our novel networks and methodologies disclosed herein utilize an intelligent reflecting surface (IRS) and a friendly jamming (transmission/broadcast) device.
[0027] We believe there are three key challenges in designing friendly jammer-assisted covert communication techniques for wireless networks with an IRS and a jamming device which are as follows: (1) computing the IRS reflection matrix, transmit power at an agent, jamming power at the friendly jamming device which ensure covertness of the communication, (2) identifying an approximation of the analytical expression of the achievable rate at a client as a function the transmission probability at the agent when the transmit power at the agent, IRS matrix at the IRS and jamming power are adjusted to ensure covertness of the communication, (3) obtaining the transmission probability that maximizes the approximated achievable rate at the client. Moreover, in order to mitigate the computational overhead, it is desirable to reduce the computational complexity of identifying the transmission strategy with only negligible performance loss.
[0028] Considering these challenges, our novel methodology enables sending confidential messages to the client with the aid of an IRS in the presence of a jamming (transmission/broadcast) device.
[0029] In order to reduce the probability that the friendly communication signal is detected by an adversary, we design a system that enhances the expected achievable rate at a client while ensuring the covertness of the communication (the expected detection error probability (DEP) at an adversary should be higher than a target DEP). To this end, we seek to determine an optimization of transmission probability at an agent, transmit power at the agent, reflection matrix, and random jamming power. In this way, we hope to enhance the achievable rate at a client, ensure the covertness of the transmission, require only one-dimensional line search methods (low computational complexity), require the statistic information about the channels to the adversary and the channel from the jammer, and do not require any instantaneous information about the channels to the adversary and the channel from the jammer.
[0030]
[0031] In accordance with embodiments, we further provide the network 10 with a jamming device (also referred to as a jammer or jamming agent) 110 that radiates jamming signals with random power to produce uncertainty about the received signal strength at the adversary that can confuse the adversary in detecting the existence of the communication between an agent and a client. We refer to the jamming device 110 as friendly because it is under control/operated by same party (entity) who controls and operates the agent devices 102, client devices 104 and IRS 106.
[0032] The friendly jamming device 110 can be any broadcast transmitter. For instance, at least one of agent devices 102, client devices 104 or auxiliary nodes can be the friendly jamming device 110. The jamming device's 110 role is to broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The jamming device randomly chooses its jamming power from a uniform distribution in [P.sub.lb, P.sub.ub]. So, there are two optimization variables for the jamming power (P.sub.lb and P.sub.ub). We assume that all transmissions (including jamming) use the same frequency. For instance, the jamming device 110 transmits dummy data so it can be any determined complex value for randomly generated complex value, like white noise. The jamming signals become interference at the legitimate receiver, i.e. the client 104. Therefore, those are optimized with the goal of maximizing the expected achievable rate at the legitimate receiver while ensuring a requirement on the covertness.
[0033] A potential adversary 108 may be located in a position to intercept or eavesdrop on RF communications between an agent 102 and the client 104. Potential adversaries 108 often utilize passive receiving devices and conceal their presence. They could be individuals with suitable RF devices or passive RF detectors sensors (also known as RF sniffers or bugs). Thus, their presence may not be known or otherwise detected by the agent 102 or client 104.
[0034] The agent device 102, client device 104 and jamming device 110 are equipped with at least one antenna and other hardware for receiving/transmitting RF communications.
[0035] The agent device 102 and the client device 104 are geometrically separated from one another in two-dimensional (2D) space, as shown, or it could be three-dimensional (3D) space. The agent communicates with the client. Our methodology presumes that the agent device 102 transmits a RF communication which the client device 104 receives. We call this an uncontrolled signal. In addition, the agent device 102 transmits a RF communication to the IRS 106 reflects and augments that RF communication which the client device 104 also receives. The former is uncontrolled while the latter is controlled by the IRS 106. We control the friendly jamming device 110 too.
[0036] The role of the agent and client devices may continually reverse, in that, the client becomes an agent and transmits communications, and the agent becomes a client and receives the communication. The methodology described herein may repeat for the new agent and new client again and again as needed. This allows for truly two-wave and/or duplex communications among the devices.
[0037] In embodiments, the agent device 102, client device 104 and jamming device 110 may be an autonomous vehicle, a mobile command station or an individual carrying a transceiver. The agent device 102 and client device 104 may be fixed or mounted on a ground-based, air-borne sea-borne, or space-based platform. So may be the jamming device 110. The agent device 102 and client device 104 (and optionally the jamming device 110) may be equipped with cameras and microphones for providing image/video data and sound/voice data. Additionally, they may be equipped with various sensor(s) for providing other information. Some non-limiting examples of sensors may include: additional or multispectral imaging (UV/visible/IR); antennas (RF; radio); ranging (radar; LIDAR); location/position sensors (GPS, altitude/depth, etc.), motion sensors (speed/velocity, bearing/trajectory, acceleration, etc.); weather sensors (temperature, pressure, wind speed, ambient lighting, etc.); and field sensors (electric, magnetic, vibrations, radiation, biological, etc.). Of course, other sensors and sensor information may also be provided for as may be desirable.
[0038] We illustrate the various RF signal channels involved: h.sub.I, h.sub.Adv, h.sub.C, g.sub.C, g.sub.Adv, r.sub.C r.sub.I and r.sub.Adv. They include direct and reflected transmissions channels. More particularly, the direct ones include: (i) the transmission channel from the agent device 102 to the client device 104, h.sub.c; (ii) the transmission channel from the agent device 102 to the adversary device 108, h.sub.Adv; and (iii) the transmission channel from the agent device 102 to the IRS 106, h.sub.I. And the reflected ones include: (iv) the transmission channel from IRS 106 to the client device 104, g.sub.C; and (v) the transmission channel from the IRS 106 to the adversary device 108, g.sub.Adv. From the jamming device 110, the pertinent channels of interest include: i) the channel to the client device 102, r.sub.C; (ii) the channel to the adversary device 108, r.sub.Adv; and (iii) the channel to the IRS 106, r.sub.I. Note: we use solid lines to represent direct transmission and dotted lines to represent reflections from the IRS. The reflected signals (g.sub.C and g.sub.Adv) are augmented by the IRS 106 as later explained with respect to
[0039] In actuality, the agent device 102 and the jamming device 110 each transmit one RF signal which radiates in multiple directions. Of particular interest, from the agent device 102, are signal in the directions to the client device 104, the IRS 106, and the adversary device 108. We refer to them as channels: h.sub.C, h.sub.I, and h.sub.Adv, respectively. There is one channel impinging on the IRS 106, h.sub.I.
[0040] The IRS 106 reflects and augments the signal from the agent device 102 and the signal from the jamming device 110, as discussed herein. It too radiates in multiple directions. Of particular interest are the augmented reflected signal in the directions to the client device 104 and the adversary device 108. We refer to them as channels: g.sub.C and g.sub.Adv, respectively.
[0041] In keeping with the goals of our novel methodology, we seek coherent combining of channels h.sub.C, g.sub.C and r.sub.C at the client device 104. And we seek to ensure confusion with channels h.sub.Adv, g.sub.Adv and r.sub.Adv at the adversary device 108.
[0042] Intelligent reflecting surfaces (IRS) for wireless RF communications are generally known and discussed in the open literature. See, for example, Wankai Tang et al., Wireless Communications With Reconfigurable Intelligent Surface: Path Loss Modeling and Experimental Measurement, IEEE Transactions on Wireless communications, 20(1), January 2021, pp. 421-439; and Qingqing Wu and Rui Zhang Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network, IEEE Communications Magazine, 58(1), January 2020, pp. 106-112, herein incorporated by reference in their entirety.
[0043]
[0044] According to our embodiment, the IRS 106 may be fixed (static) or could be movable. The novel methodology assumes that channels are known; so, when the channels vary, we have to update solutions using the changed channels either way. For static IRSs, they may be mounted on a building, cell phone tower or other tall structure. And, for moving IRSs, they may be mounted on various platforms, including, for instance, space-based (e.g., satellites, rocket ships, space stations, etc.), air-based vehicles (e.g., aircraft, helicopter, blimp, UAV, etc.), ground-based (e.g., cars, trucks, military vehicles, and mobile command center, etc.), and sea-based (ships, submarines, etc.) as some non-limiting examples.
[0045]
[0046] Each reflecting element can be individually controlled with its own biasing voltage signal from the IRS controller. The reflecting element receives an incoming RF signal x.sub.n and outputs a reflected augments signal y.sub.n=e.sup.j.sup.
[0047] To control the reflection amplitude, a variable resistor load can be applied in the element design. By changing the values of resistors in each of the reelecting elements, different portions of the incident signal's energy are dissipated, thus achieving controllable reflection amplitude between 0 and 1 (0 to 100%). The amplitude and phase shift at each element of the IRS may be independently controllable. In our methodology, we only focus on phase shift though.
[0048] We further illustrate in
[0049] The transmission probability between the agent device and the client device represents the statistical likelihood, under the circumstances, that a RF transmission sent from the agent device is received by the client device. The value is unitless and varies from 0 to 1 (0 to 100%). We intentionally vary to achieve the aforementioned goals.
[0050] The transmit power P at the agent device is the transmission power of the agent device. It is controlled by the trans-receiver of the agent device. It may be given in terms of power, such as in units of Watt(s) or decibels per milliwatt (dBm). We optimize P to achieve the aforementioned goals. The maximum transmission power P.sub.max is an inherent property of the transmitted of the agent and is an upper bound of the optimized transmit power.
[0051] The expected achievable data rate at client device
[0052] The reflection matrix represents configuration information for the intelligent reflecting surface's elements. It may be a 2-D array of data that includes the phase augmentation information for the RF reflecting elements of the IRS. The IRS reflects N incoming signals. The received signal via IRS at the client is defined as
We used matrix just to simply express
The IRS's controller adjust the N elements based on the matrix data . These values may be reported as .sub.n, for instance, as phase shifts for the n-th incoming signal; the values will range from 0 to 2 radians (0 to 360).
[0053] The following detailed description of the invention uses various notations and equations to describe the operation of the invention. Table 1 below lists a definition for each of the notations used below. The latter portion of parameters are tunable parameters.
TABLE-US-00001 TABLE 1 LIST OF NOTATIONS Notation Definition L number of channels uses in a communication slot I channel index in a slot S slot index N the number of elements at IRS a~CN(0, I.sub.N) means a (N by 1 vector) is a complex gaussian random variable with variance where I.sub.N is the identical matrix with size N by N x.sub.A[s, l] the transmit data at the agent in the l-th channel use in slot s x.sub.J[s, l] the transmit data at the friendly jammer in the l-th channel use in slot s
[0054] The quasi-static Rayleigh fading channels are considered. A communication slot consists of a block of L channel uses, and all channels remain constant in a slot and change to independent channels for the next slot. In order to confuse the adversary, the agent decides whether to transmit a signal with power P.sub.A or not in every slot. More specifically, for a given slot, the agent transmits a signal with transmission probability . In slot s, the IRS identifies its reflection coefficient matrix [s] based on the channels in slot s where [s]=diag{e.sup.j.sup. and .sub.n[s][0,2) is the phase shift of the n-th IRS element.
[0055] In addition, with the goal of obfuscating the adversary in detecting the communication, in slot s, the jammer broadcasts a jamming signal with random power P.sub.J[s] where the jamming power follows a uniform distribution in [P.sub.lb, P.sub.ub].
[0056] Here, the transmission probability at the agent A, transmit power at the agent P.sub.A, and the jamming power P.sub.J [s], between Pub and Pub, do not change from one slot to another, but the IRS reflection matrix [s] and jamming power P.sub.J[s] may and thus can be different for different slots.
[0057] We define x.sub.A[s,l]CN(0,1) and x.sub.J[s,l]CN(0,1) as the transmit signals from the agent and jammer in the l-th channel use in slot s where CN(a, b) means the complex Gaussian random variable with mean a and variance b. Then, the received signals at the client and adversary are respectively expressed as:
represent the channels from the agent to client and the agent to adversary, respectively. Also,
stand for the channels from the agent to the IRS, from the IRS to client, and from the IRS to adversary, respectively, where I.sub.N denotes NN identity matrix. Here,
are the channels from the jammer to the agent, adversary and IRS, respectively. Here
mean the large-scale path losses of the corresponding channels. In addition,
are the complex additive Gaussian noise at the client and adversary, respectively.
[0058] The adversary has knowledge of the transmit power at the agent P.sub.A, transmission probability at the agent , the jamming power P.sub.J[s] between P.sub.lb and P.sub.ub, the effective channel gains to the adversary
This case presents the worst-case scenario from covertness perspective.
[0059] The agent and IRS have knowledge of their channels to the client (h.sub.C[s], g.sub.C[s] and h.sub.I[s]) and the statistics of the channels
However, the agent and IRS only know the statistics of the effective channels to the adversary and do not have information about the instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) in every slot. Furthermore, the agent and IRS only have knowledge of the statistics of the channels from the jammer to the client
and do not know the instantaneous channels from the jammer to the client (r.sub.C[s] and r.sub.I[s]) in every slot.
[0060] In order to detect the existence of the transmission, the adversary attempts to distinguish the following two hypotheses:
where [s] designates the null hypothesis in which there is no transmission and
[s] signifies the alternative hypothesis in which there is a transmission in slot s.
[0061] In slot s, based on the observations y.sub.Adv[s, 1], . . . , y.sub.Adv[s, L], the adversary makes a binary decision whether the agent's transmission happened or not. The adversary employs a radiometer for the binary decision and conducts a threshold test as follows:
where [s] is the detection threshold in slot s, and [s] and
[s] respectively denote the decisions in favor of
[s] and
[s].
[0062] Then, for slot s, the detection error probability (DEP) at the adversary P.sub.E[s] is given by:
where [s]=Pr(
[s]|
[s]) and
[s]=Pr(
[s]|
[s]) are respectively the missed detection probability and the false alarm probability.
[0063] In every slot s, the adversary computed the optimal detection threshold [s] that minimizes the DEP P.sub.E[s] and makes a binary decision following the threshold test. The expected DEP over slots is defined by as
[0064] Since the probability that the agent transmits data to the client is , the expected achievable rate at the client
where the expectation is taken over slots. The goal of this invention is to maximize
[0065] Here, we provide a new covert communication technique that jointly optimizes the transmit power at the agent P.sub.A, the transmission probability at the agent , the IRS reflection matrices {[s]}, the random jamming power P.sub.j[s] for the covert rate maximization problem. The covert rate maximization problem is formulated as:
where P.sub.A,max and P.sub.J,max are the maximum available transmit powers at the agent and jammer, respectively. Here, [0, min(, 1)) since the maximum achievable
[0066] Note that the instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) and the instantaneous channels from the jammer (r.sub.C[s] and r.sub.I[s]) are not available at the agent and IRS. Hence, to enhance the achievable rate at the client based on only the available channel information, [s]=diag{e.sup.j.sup.
Then, the reflection coefficient .sub.n[s] is obtained as:
where arg() is the angle of complex scalar , and g.sub.C,n[s] and h.sub.I,n[s] indicate the n-th elements of g.sub.C[s] and h.sub.I[s], respectively.
[0067] When the number of channel uses in a slot is large enough, by the Strong Law of Large Numbers,
when and
when . As the jamming power P.sub.J[s] follows a uniform distribution in [P.sub.lb, P.sub.ub], when the adversary computes the detection threshold [s] that minimizes P.sub.E[s], the DEP P.sub.E[s] is expressed as
[0068] Note that since the IRS reflection coefficients are calculated only based on the channels to the client, the IRS reflection matrix [s] is independent of the channels to the adversary. Therefore the effective channels to the adversary .sub.A[s] and .sub.J[s] follow exponential distributions with parameter
respectively. Then, the expected DEP over slots
is given by.
[0069] Here, the expected DEP
[0070] As increases with P.sub.lb, the expected DEP
[0071] Since the expected DEP
becomes
Here, as P.sub.E is an increasing function of () when is given, () that fulfills
[0072] With this P.sub.ub(), the covertness constraint is satisfied, and so the maximum allowable transmit power P.sub.A() should be used to maximize the expected rate
[0073] With the optimized P.sub.lb, P.sub.ub(), and P.sub.A(), the covertness constraint is satisfied for every transmission probability at the agent .
[0074] Due to the fact that there are no closed-form solutions for P.sub.ub() and P.sub.A(), it is intractable to derive an exact expression of the expected rate at the client
[0075] Then, the approximation of the expected rate {tilde over (R)}.sub.C is given by:
[0076] Having presented the various equations above, we present a novel methodology to optimize the transmission probability, transmit power at the agent and the reflection matrix of the IRS with the goal of maximizing the achievable rate at a client while ensuring a covertness constraint.
[0077]
[0078] In step 310, we provide an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements. An exemplary IRS 106 is shown in
[0079] Next, in step 320, we provide a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device. This adds the jamming device 110 to the network. Again, the jamming device's 110 role is to broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The jamming randomly chooses its jamming power from a uniform distribution in [P.sub.lb, P.sub.ub].
[0080] And, in step 330, we establish a covert RF communication link between the agent device and the client device by determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client
[0081] We can use method 300 for wireless network embodiments where a transmitter (e.g., agent, cellular base station, user equipment) sends a data to its receiver with the aid of an IRS to increase the coverage region and maximize the achievable rate at the client. In specific embodiments, it is suitable for any IRS-assisted networks where there exist security threats, low computational complexity is desirable, and only the statistic of the channel to a potential adversary is available.
[0082] Step 330 establishes a covert communication link between the agent device 102 and the client device 104 using the IRS 106. It adaptively reconfigures the wireless network environments via controlled reflections. Again, our method presumes transmissions from the agent device 102 to the client device 104 using the IRS 106. But the roles of the agent and the client can repeatedly change again and again as needed. This step may preferably include establishing a covert RF communication link between the agent device and the client device using the IRS may determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client
[0083] In step 332, we determine the transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device .
[0084] Here, we note that
where is an increasing function of () from the fact that is a decreasing function of
When 0.5, () satisfying the condition
decays with as gets larger with () and
becomes smaller with . In this sense, if 0.5, to maximize
grows with . From these observations, we can infer that
[0085] The approximated expected achievable rate maximizing transmission probability can be found by solving the following:
[0086] The arguments of the maxima function (commonly abbreviated as argmax) returns the maximum value for the target function. Thus, Eq. (17) determines the maximum value of {tilde over (R)}.sub.C which is used for .
[0087] Since {tilde over (R)}.sub.C is a unimodal function of , the solution of the problem can be found by exploiting one-dimensional search strategies such am extremum finding technique, like the golden section search method. To solve for this, in various embodiments, we can plot the covert rate (in units of bps/Hz) as a function of transmission probability to determine the value of for which the covert rate function is maximum. An exemplary plot for the scenario depicted in
[0088] Extremum finding techniques (such as the golden section search method) are well-known techniques for analyzing functions. (For more information, see E. K. P. Chong and S. H. Zak, Introduction to Optimization, 4th ed. Hoboken, NY, USA: Wiley, 2013). This can be achieved by suitable data analysis software. For that exemplary scenario plot of
[0089] Next, in step 334, we determine a transmit power P of the agent that satisfies a covertness constraint for the RF communication for the determined transmission probability A obtained in step 310 and the jamming power P.sub.J[s] for jamming device 110. It can broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The range of random jamming power is between a lower bound P.sub.lb to an upper bound P.sub.ub. So, there are two optimization variables for the jamming power (P.sub.lb and P.sub.ub).
[0090] As increases with P.sub.lb, the expected DEP
[0091] Since the expected DEP
becomes
Here, as
[0092] Then, the optimal P.sub.ub() for a given is expressed as: P.sub.ub()=()P.sub.A(). [Eq. (13)]. With this P.sub.ub(), the covertness constraint is satisfied, and so the maximum allowable transmit power P.sub.A() should be used to maximize the expected rate
[0093] To solve for this, in various embodiments, we can plot the actual scaled agent transmit power as a function of P.sub.A. An exemplary plot for the scenario depicted in
should remain constant. In this sense, even if we want to increase P.sub.A() further, the actual transmit power at the agent cannot be increased. Therefore, as shown in the plot, P.sub.A() remains the same (about 12 dBm) after P.sub.ub() reaches at P.sub.J,max.
[0094] Lastly, in step 336, we determine the IRS reflection matrix by determining phase calculations of the n-th IRS elements of the IRS .sub.n[s]. This provides configuration data for the reflecting elements of the IRS 106. The instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) and the instantaneous channels from the jammer (r.sub.C[s] and r.sub.I[s]) are not available at the agent and IRS. Hence, to enhance the achievable rate at the client based on only the available channel information, [s]=diag{e.sup.j.sup.
Then, the reflection coefficient .sub.n[s] is obtained by: .sub.n[s]=arg (h.sub.C[s])arg(g.sub.C,n[s])arg(h.sub.l,n[s]), n, where arg() is the angle of complex scalar , and g.sub.C,n[s] and h.sub.I,n[s] indicate the n-th elements of g.sub.C[s] and h.sub.I[s], respectively. [Eq. (8)]. The IRS reflection matrix is computed in every communication slot s.
[0095] Method 300 may be embodied as software, hardware or some combination thereof. To that ends, computer-executable instructions (code) for implementation may be provided for. One skilled in the art can create suitable instructions (code) for executing the above-mentioned processing and mathematical calculations. In some embodiments, method 300 may be executed by the agent device 102 in cooperation with the IRS 106 and the jamming device 110.
[0096]
[0097] In one embodiment, the transmitter 404 is a conventional RF transmitter that is controlled by the controller 408 such that the transmitter shall transmit a data carrying communication signal. The transmitter 404 can have the phase of the transmitted signal adjusted by the controller 408. The receiver 406 may be a conventional RF receiver that is controlled by the controller 408. When operating as a client, the receiver 406 receives communications signals from the agent. When the transceiver 400 is a portion of a client, the receiver 406 receives the signals from the agent.
[0098] The optional sensors 410 may include one or more of cameras, microphones, multispectral imaging (UV/visible/IR) sensors; antennas (RF; radio); ranging (radar; LIDAR) sensors; location/position sensors (GPS, altitude/depth, etc.), motion sensors (speed/velocity, bearing/trajectory, acceleration, etc.); weather sensors (temperature, pressure, wind speed, ambient lighting, etc.); field sensors (electric, magnetic, vibrations, radiation, biological, etc.) and the like. The signals to/from these sensors 410 are processed by the controller 408 and may be used locally or transmitted to the client from an agent or to an agent from a client.
[0099] In one embodiment, the controller 408 comprises at least one processor 412, memory 424 and various support sub-systems and circuits such as, but not limited to, an RF input/output (I/O) interface 414, a clock 418, a phase control adjustor 420, a sensor(s) I/O interface 422, and a communications module 430. The RF input/output (I/O) interface 414 communicates with the RF hardware (e.g., receiver 406 and transmitter 404) so as to control the transmission/receptions of radio signals for Wireless communications. It includes frequency synchronization configured to carry out the novel concert communications methodology including handling the transmission in a manner to support the processing discussed above. The sensor(s) I/O interface 422 communicates with any sensor(s) which the agent or client may be equipped. The clock 418 is used for timing and establishing time slots. In one embodiment, the clock of each agent may be calibrated ahead of time such. The clock may also be synchronized to an external source such a satellite navigation system (e.g., a Global Positioning System (GPS)). In other embodiments, the agent could interface with the client (or another entity) for clock calibration. The communications module 430 generate signals for communications, including a RF communications signal generator 432 as generally known in the art. The module 430 may be capable of handling analog and/or digital signals, the later including packetized data. If desired, the signal generator 432 may provide encryption for provided confidential signals as known in the art.
[0100] In an embodiment, the controller 408 includes a processor 412 coupled to a memory 424. The processor 412 may be one or more of, or combinations thereof, microprocessors, microcontrollers, application specific integrated circuits (ASICs), and/or the like. The memory 424 may be any form of read only memory, random access memory or combinations thereof. For instance, the memory 424 can be a non-transitory computer readable media that stores secure communications software 426 and data 436 such that the processor 412 may execute the software 426 to implement the method 300 of
[0101] Now, we investigate the impact of the number of IRS elements N on the expected DEP
and, by differentiating with respect to N, we have
[0102] Note that
[0103] As a special case, when the channel gains of the direct links
are the same, the DEP
Also, if the gains of the channels to the IRS
are the same, the DEP
[0104] With respect to
[0105] In
the location of agent=[40 m,0 m]; the location of client=[40 m, 10 m]; the location of adversary=[80 m, 0 m]; the location of IRS=[40 m, 0 m]; the location of jammer=[60 m, 5 m]; and the target DEP =0.3. Again, as previously discussed, the plot has two curves: one is the exact covert rate
[0106] In
the location of agent=[0 m, 0 m]; the location of client=[40 m, 10 m]; the location of adversary=[80 m, 0 m]; the location of IRS=[40 m, 0 m]; the location of jammer=[40 m, 5 m]; and the target DEP =0.3. The nature of the plot is discussed above. In sum, the plots show P.sub.A() remains the same (about 12 dBm) after P.sub.ub() reaches at P.sub.J,max.
[0107]
G.sub.t=G.sub.r=0 dBi, and only the link between the agent 102 and the IRS 106 and the link between the IRS 106 and the client 104 are LOS.
[0108]
[0109] In
[0110]
[0111] In sum, we have shown the joint optimization of the transmit power at the agent, jamming power, IRS reflection matrix, and transmission probability for IRS-aided covert communication with a friendly jammer. We disclose a novel wireless system and methodology that experiences near optimal performance with only one-dimensional search methods. Also, we have analytically explored the influence of the number of IRS elements on the DEP at the adversary, and identified the case where increasing the IRS element number is beneficial to improve the DEP.
[0112] The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the present disclosure and its practical applications, and to describe the actual partial implementation in the laboratory of the system which was assembled using a combination of existing equipment and equipment that could be readily obtained by the inventors, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as may be suited to the particular use contemplated.
[0113] While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.