COVERT COMMUNICATION TECHNIQUE FOR INTELLIGENT REFLECTING SURFACE-ASSISTED WIRELESS NETWORKS WITH A FRIENDLY JAMMER

20260039410 ยท 2026-02-05

Assignee

Inventors

Cpc classification

International classification

Abstract

We disclose a novel methodology and wireless network for covert wireless RF communications between an agent device and a client device in the presence of an adversary device which attempts to detect the existence of the transmission of the RF communication between the agent and client. The methodology comprises: providing an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements; providing a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and establishing a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.

Claims

1. A method for covert wireless RF communications between an agent device and a client device in the presence of an adversary device which attempts to detect the existence of the transmission of the RF communication between the agent and client, the method comprising: providing an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements; providing a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and establishing a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.

2. The method of claim 1, wherein establishing the covert communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications comprises: determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client R.sub.C while ensuring covertness of the transmission.

3. The method of claim 2, wherein said determining comprises: a. determining a transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device taking into account an expected detection error probability (DEP) at an adversary device; b. determining the transmit power P of the agent that satisfies covertness of the transmission for the RF communication for the determined transmission probability and the interval of random jamming power P.sub.J[s]; and c. determining phase calculations of the n-th IRS elements of the IRS .sub.n[s].

4. The method of claim 2, wherein an approximation of achievable rate at the client R.sub.C is used for the actual achievable data rate at the client R.sub.C.

5. The method of claim 3, wherein the determining in step a is performed using an extremum-finding algorithm.

6. The method of claim 5, wherein the extremum-finding algorithm is a golden section search scheme.

7. The method of claim 3, wherein the obtaining in step b is performed using a root-finding algorithm.

8. The method of claim 7, wherein the root-finding algorithm is a bisection method.

9. The method of claim 3, wherein the IRS reflection matrix =diag{e.sup.j.sup.1, e.sup.j.sup.2, . . . , e.sup.j.sup.N} and the determining in step c is computed according to the following equation: n = arg ( h C ) - arg ( g C , n ) - arg ( h I , n ) , n , where arg() is the angle of complex scalar , and g.sub.C,n and h.sub.I,n indicate the n-th elements of g.sub.C and h.sub.I of the IRS, respectively.

10. The method of claim 9, further comprising: wirelessly transmitting the determined IRS reflection matrix from the agent device to the IRS.

11. The method of 3, further comprising: configuring the IRS for RF communication between the agent device and the client device based on the determined IRS reflection matrix .

12. The method of 2, further comprising: configuring the jamming device to operate with random jamming power.

13. A wireless network comprising: an intelligent reflecting surface (IRS) comprising a 2D array individually-controllable RF reflecting elements to reflect a wireless radio frequency (RF) signals transmitted from an agent device to an client device; a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device; and a controller configured to establish a covert RF communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications.

14. The wireless network of claim 13, wherein, in establishing the covert communication link between the agent device and the client device using the IRS that optimizes the transmission probability, transmit power at an agent, and the reflection matrix of an IRS for covert RF communications, the controller is configured to: determine a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client R.sub.C while ensuring covertness of the transmission.

15. The wireless network of claim 14, wherein, in establishing the covert communication link between the agent device and the client device by said determining, the controller is configured to: a. determine a transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device taking into account an expected detection error probability (DEP) at an adversary device; b. determine the transmit power P of the agent that satisfies covertness of the transmission for the RF communication for the determined transmission probability and the interval of random jamming power P.sub.J[s]; and c. determine phase calculations of the n-th IRS elements of the IRS .sub.n[s].

16. The wireless network of claim 14, wherein the controller uses an approximation of achievable rate at the client R.sub.C for the actual achievable data rate at the client R.sub.C.

17. The wireless network of claim 15, wherein the determining in step a is performed using an extremum-finding algorithm.

18. The wireless network of claim 17, wherein the obtaining in step b is performed using a root-finding algorithm.

19. The wireless network of claim 15, wherein the IRS reflection matrix =diag{e.sup.j.sup.1, e.sup.j.sup.2, . . . , e.sup.j.sup.N} and the determining in step c is computed according to the following equation: n = arg ( h C ) - arg ( g C , n ) - arg ( h I , n ) , n , where arg() is the angle of complex scalar , and g.sub.C,n and h.sub.I,n indicate the n-th elements of g.sub.C and h.sub.I of the IRS, respectively.

20. The wireless network of claim 13, wherein there IRS comprises at least 20 RF reflecting elements.

21. The wireless network of claim 20, wherein each of the individually controllable RF reflecting elements is configured to provide a phase shift to the reflected signal.

22. The wireless network of claim 13, further comprising at least one agent device and at least one client device.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0019] So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments, including less effective but also less expensive embodiments which for some applications may be preferred when funds are limited. These embodiments are intended to be included within the following description and protected by the accompanying claims.

[0020] FIG. 1 is a schematic illustration of a network scenario and depict key variables involved in the novel methodologies used in embodiments of the present invention.

[0021] FIGS. 2A and 2B show the architecture of a conventional intelligent reflecting surface.

[0022] FIG. 3 and FIG. 3A are flow charts depicting the novel methodology according to one embodiment of the invention.

[0023] FIG. 4 depicts a simplified high-level block diagram of an exemplary transceiver for an agent device in accordance with an embodiment.

[0024] FIG. 5 is a schematic illustration of an exemplary network scenario in accordance with an embodiment. FIGS. 5A-5C are plots showing some numerical simulation results for said exemplary network scenario.

[0025] FIGS. 6-8 are additional plots of the covert data rate based on the exemplary network scenario in FIG. 5.

DETAILED DESCRIPTION

[0026] Our novel networks and methodologies disclosed herein utilize an intelligent reflecting surface (IRS) and a friendly jamming (transmission/broadcast) device.

[0027] We believe there are three key challenges in designing friendly jammer-assisted covert communication techniques for wireless networks with an IRS and a jamming device which are as follows: (1) computing the IRS reflection matrix, transmit power at an agent, jamming power at the friendly jamming device which ensure covertness of the communication, (2) identifying an approximation of the analytical expression of the achievable rate at a client as a function the transmission probability at the agent when the transmit power at the agent, IRS matrix at the IRS and jamming power are adjusted to ensure covertness of the communication, (3) obtaining the transmission probability that maximizes the approximated achievable rate at the client. Moreover, in order to mitigate the computational overhead, it is desirable to reduce the computational complexity of identifying the transmission strategy with only negligible performance loss.

[0028] Considering these challenges, our novel methodology enables sending confidential messages to the client with the aid of an IRS in the presence of a jamming (transmission/broadcast) device.

[0029] In order to reduce the probability that the friendly communication signal is detected by an adversary, we design a system that enhances the expected achievable rate at a client while ensuring the covertness of the communication (the expected detection error probability (DEP) at an adversary should be higher than a target DEP). To this end, we seek to determine an optimization of transmission probability at an agent, transmit power at the agent, reflection matrix, and random jamming power. In this way, we hope to enhance the achievable rate at a client, ensure the covertness of the transmission, require only one-dimensional line search methods (low computational complexity), require the statistic information about the channels to the adversary and the channel from the jammer, and do not require any instantaneous information about the channels to the adversary and the channel from the jammer.

[0030] FIG. 1 is a schematic illustration depicting an exemplary wireless communications network 10 in accordance with embodiments of the present invention. The wireless network 10 is formed of an agent device 102, a client device 104, and an intelligent reflecting surface (IRS) 106. The client may be an individual (e.g., a soldier, warfighter, commercial user) equipped with or otherwise using a radio. While one client device is depicted in the figure, there could be others. Although, our methodology 300 (FIGS. 3 and 3A) is specifically designed to RF transmission from one agent to one client.

[0031] In accordance with embodiments, we further provide the network 10 with a jamming device (also referred to as a jammer or jamming agent) 110 that radiates jamming signals with random power to produce uncertainty about the received signal strength at the adversary that can confuse the adversary in detecting the existence of the communication between an agent and a client. We refer to the jamming device 110 as friendly because it is under control/operated by same party (entity) who controls and operates the agent devices 102, client devices 104 and IRS 106.

[0032] The friendly jamming device 110 can be any broadcast transmitter. For instance, at least one of agent devices 102, client devices 104 or auxiliary nodes can be the friendly jamming device 110. The jamming device's 110 role is to broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The jamming device randomly chooses its jamming power from a uniform distribution in [P.sub.lb, P.sub.ub]. So, there are two optimization variables for the jamming power (P.sub.lb and P.sub.ub). We assume that all transmissions (including jamming) use the same frequency. For instance, the jamming device 110 transmits dummy data so it can be any determined complex value for randomly generated complex value, like white noise. The jamming signals become interference at the legitimate receiver, i.e. the client 104. Therefore, those are optimized with the goal of maximizing the expected achievable rate at the legitimate receiver while ensuring a requirement on the covertness.

[0033] A potential adversary 108 may be located in a position to intercept or eavesdrop on RF communications between an agent 102 and the client 104. Potential adversaries 108 often utilize passive receiving devices and conceal their presence. They could be individuals with suitable RF devices or passive RF detectors sensors (also known as RF sniffers or bugs). Thus, their presence may not be known or otherwise detected by the agent 102 or client 104.

[0034] The agent device 102, client device 104 and jamming device 110 are equipped with at least one antenna and other hardware for receiving/transmitting RF communications. FIG. 4 shows further details of the agent device 102 (and which can also be used for the client device 104 and the jamming device 110). The adversary device 108 is assumed to have an antenna and processing means for RF communications, but the particulars are generally unknown to those in the network 10.

[0035] The agent device 102 and the client device 104 are geometrically separated from one another in two-dimensional (2D) space, as shown, or it could be three-dimensional (3D) space. The agent communicates with the client. Our methodology presumes that the agent device 102 transmits a RF communication which the client device 104 receives. We call this an uncontrolled signal. In addition, the agent device 102 transmits a RF communication to the IRS 106 reflects and augments that RF communication which the client device 104 also receives. The former is uncontrolled while the latter is controlled by the IRS 106. We control the friendly jamming device 110 too.

[0036] The role of the agent and client devices may continually reverse, in that, the client becomes an agent and transmits communications, and the agent becomes a client and receives the communication. The methodology described herein may repeat for the new agent and new client again and again as needed. This allows for truly two-wave and/or duplex communications among the devices.

[0037] In embodiments, the agent device 102, client device 104 and jamming device 110 may be an autonomous vehicle, a mobile command station or an individual carrying a transceiver. The agent device 102 and client device 104 may be fixed or mounted on a ground-based, air-borne sea-borne, or space-based platform. So may be the jamming device 110. The agent device 102 and client device 104 (and optionally the jamming device 110) may be equipped with cameras and microphones for providing image/video data and sound/voice data. Additionally, they may be equipped with various sensor(s) for providing other information. Some non-limiting examples of sensors may include: additional or multispectral imaging (UV/visible/IR); antennas (RF; radio); ranging (radar; LIDAR); location/position sensors (GPS, altitude/depth, etc.), motion sensors (speed/velocity, bearing/trajectory, acceleration, etc.); weather sensors (temperature, pressure, wind speed, ambient lighting, etc.); and field sensors (electric, magnetic, vibrations, radiation, biological, etc.). Of course, other sensors and sensor information may also be provided for as may be desirable.

[0038] We illustrate the various RF signal channels involved: h.sub.I, h.sub.Adv, h.sub.C, g.sub.C, g.sub.Adv, r.sub.C r.sub.I and r.sub.Adv. They include direct and reflected transmissions channels. More particularly, the direct ones include: (i) the transmission channel from the agent device 102 to the client device 104, h.sub.c; (ii) the transmission channel from the agent device 102 to the adversary device 108, h.sub.Adv; and (iii) the transmission channel from the agent device 102 to the IRS 106, h.sub.I. And the reflected ones include: (iv) the transmission channel from IRS 106 to the client device 104, g.sub.C; and (v) the transmission channel from the IRS 106 to the adversary device 108, g.sub.Adv. From the jamming device 110, the pertinent channels of interest include: i) the channel to the client device 102, r.sub.C; (ii) the channel to the adversary device 108, r.sub.Adv; and (iii) the channel to the IRS 106, r.sub.I. Note: we use solid lines to represent direct transmission and dotted lines to represent reflections from the IRS. The reflected signals (g.sub.C and g.sub.Adv) are augmented by the IRS 106 as later explained with respect to FIGS. 2A and 2B.

[0039] In actuality, the agent device 102 and the jamming device 110 each transmit one RF signal which radiates in multiple directions. Of particular interest, from the agent device 102, are signal in the directions to the client device 104, the IRS 106, and the adversary device 108. We refer to them as channels: h.sub.C, h.sub.I, and h.sub.Adv, respectively. There is one channel impinging on the IRS 106, h.sub.I.

[0040] The IRS 106 reflects and augments the signal from the agent device 102 and the signal from the jamming device 110, as discussed herein. It too radiates in multiple directions. Of particular interest are the augmented reflected signal in the directions to the client device 104 and the adversary device 108. We refer to them as channels: g.sub.C and g.sub.Adv, respectively.

[0041] In keeping with the goals of our novel methodology, we seek coherent combining of channels h.sub.C, g.sub.C and r.sub.C at the client device 104. And we seek to ensure confusion with channels h.sub.Adv, g.sub.Adv and r.sub.Adv at the adversary device 108.

[0042] Intelligent reflecting surfaces (IRS) for wireless RF communications are generally known and discussed in the open literature. See, for example, Wankai Tang et al., Wireless Communications With Reconfigurable Intelligent Surface: Path Loss Modeling and Experimental Measurement, IEEE Transactions on Wireless communications, 20(1), January 2021, pp. 421-439; and Qingqing Wu and Rui Zhang Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network, IEEE Communications Magazine, 58(1), January 2020, pp. 106-112, herein incorporated by reference in their entirety.

[0043] FIGS. 2A and 2B show the architecture of a conventional IRS adapted from the Wu et al. (2021) paper. We can use the same IRS components for the IRS 106 in various embodiments of the present invention. Thus, we will only briefly describe here as one can turn to the aforementioned references for further details. As shown in FIG. 2A, the IRS 106 is generally composed of a printed circuit board 106a, conductive metal backplane 106b, and an outer reflecting surface 106c having plurality of reflecting elements which are controlled by an IRS controller 106d. The reflecting elements of the surface 106c are arranged in a 2D array represented by the number of rows and columns of elements, X and Y, respectively. Thus, the number of reflecting elements N of IRS 106 is simply equal to XY. In Table II of the Tang paper, they considered different number of rows and columns of elements for their IRS. For adequate control of the communications using the IRS, we believe there should be at least 20 RF reflecting elements. We considered our numerical simulations for an IRS with 50 RF reflecting elements. The number of reflecting elements may be 100 or more in other embodiments. Even larger numbers of reflecting elements, for instance, up to and exceeding 1000, may be used in still further embodiments.

[0044] According to our embodiment, the IRS 106 may be fixed (static) or could be movable. The novel methodology assumes that channels are known; so, when the channels vary, we have to update solutions using the changed channels either way. For static IRSs, they may be mounted on a building, cell phone tower or other tall structure. And, for moving IRSs, they may be mounted on various platforms, including, for instance, space-based (e.g., satellites, rocket ships, space stations, etc.), air-based vehicles (e.g., aircraft, helicopter, blimp, UAV, etc.), ground-based (e.g., cars, trucks, military vehicles, and mobile command center, etc.), and sea-based (ships, submarines, etc.) as some non-limiting examples.

[0045] FIG. 2B illustrates an example of an individual reflecting element's structure for the IRS 106. It is composed of a PIN diode is embedded in each reflecting element n. By judiciously controlling the biasing DC voltage, the PIN diode can be switched On and Off thereby generating a phase-shift difference. Although, we note other types and designs of IRS may certainly be used.

[0046] Each reflecting element can be individually controlled with its own biasing voltage signal from the IRS controller. The reflecting element receives an incoming RF signal x.sub.n and outputs a reflected augments signal y.sub.n=e.sup.j.sup.nx.sub.n, n=1, . . . , N, where N=XY, and .sub.n is the phase shift. The phase shift may range from 0 to 2 radians.

[0047] To control the reflection amplitude, a variable resistor load can be applied in the element design. By changing the values of resistors in each of the reelecting elements, different portions of the incident signal's energy are dissipated, thus achieving controllable reflection amplitude between 0 and 1 (0 to 100%). The amplitude and phase shift at each element of the IRS may be independently controllable. In our methodology, we only focus on phase shift though.

[0048] We further illustrate in FIG. 1 the key variables involved in the novel methodologies used in embodiments of the present invention. They include: (a) a transmission probability between the agent device and the client device; (b) a transmit power P at an agent; (c) an expected achievable data rate at client receiver R.sub.C; (d) an expected detection error probability (DEP) of the adversary device, and (e) an IRS reflection matrix . We will briefly discuss each of these variables.

[0049] The transmission probability between the agent device and the client device represents the statistical likelihood, under the circumstances, that a RF transmission sent from the agent device is received by the client device. The value is unitless and varies from 0 to 1 (0 to 100%). We intentionally vary to achieve the aforementioned goals.

[0050] The transmit power P at the agent device is the transmission power of the agent device. It is controlled by the trans-receiver of the agent device. It may be given in terms of power, such as in units of Watt(s) or decibels per milliwatt (dBm). We optimize P to achieve the aforementioned goals. The maximum transmission power P.sub.max is an inherent property of the transmitted of the agent and is an upper bound of the optimized transmit power.

[0051] The expected achievable data rate at client device R.sub.C represents the statistical data rate which under the circumstances would be expected at the client device receiver. We also refer to it herein as the covert data rate. It is a function of the transmission probability between the agent device and the client device, and the powers of the both the signal directly transmitted by the agent device to the client and the signal from the client that is reflected and augmented by the IRS. This value may be given as a bandwidth, such as in units of bits-per-second (bps) per Hz or bps/Hz. We seek to optimize R.sub.C. However, because we are unable to derive an exact expression of the expected rate at the client R.sub.C, we use an approximation thereof, {tilde over (R)}.sub.C.

[0052] The reflection matrix represents configuration information for the intelligent reflecting surface's elements. It may be a 2-D array of data that includes the phase augmentation information for the RF reflecting elements of the IRS. The IRS reflects N incoming signals. The received signal via IRS at the client is defined as

[00001] .Math. n = 1 N g C , n e j n h I , n .

We used matrix just to simply express

[00002] .Math. n = 1 N g C , n e j n h I , n as g c T h I .

The IRS's controller adjust the N elements based on the matrix data . These values may be reported as .sub.n, for instance, as phase shifts for the n-th incoming signal; the values will range from 0 to 2 radians (0 to 360).

[0053] The following detailed description of the invention uses various notations and equations to describe the operation of the invention. Table 1 below lists a definition for each of the notations used below. The latter portion of parameters are tunable parameters.

TABLE-US-00001 TABLE 1 LIST OF NOTATIONS Notation Definition L number of channels uses in a communication slot I channel index in a slot S slot index N the number of elements at IRS a~CN(0, I.sub.N) means a (N by 1 vector) is a complex gaussian random variable with variance where I.sub.N is the identical matrix with size N by N x.sub.A[s, l] the transmit data at the agent in the l-th channel use in slot s x.sub.J[s, l] the transmit data at the friendly jammer in the l-th channel use in slot s [00003] h C [ s ] ~ CN ( 0 , h C 2 ) channel between the agent and client in slot s [00004] h Adv [ s ] ~ CN ( 0 , h Adv 2 ) channel between the agent and adversary in slot s [00005] h I [ s ] ~ N 1 ~ CN ( 0 , h I 2 I N ) channel between the agent and IRS in slot s [00006] g C [ s ] ~ N 1 ~ CN ( 0 , g C 2 I N ) channel between the IRS and client in slot s [00007] g Adv [ s ] N 1 ~ CN ( 0 , g Adv 2 I N ) channel between the IRS and adversary in slot s [00008] r C [ s ] ~ CN ( 0 , r C 2 ) channel between the jammer and client in slot s [00009] r Adv [ s ] ~ CN ( 0 , r Adv 2 ) channel between the jammer and adversary in slot s [00010] r I [ s ] N 1 ~ CN ( 0 , r I 2 I N ) channel between the jammer and IRS in slot s [00011] n C [ s , l ] ~ CN ( 0 , C 2 ) noise at the client [00012] n Adv [ s , l ] ~ CN ( 0 , Adv 2 ) noise at the adversary y.sub.C[s, l] the received signal at the client in the l-th channel use in slot s y.sub.Adv[s, l] the received signal at the adversary in the l-th channel use in slot s [00013] C 2 variance of the noise at the client [00014] Adv 2 variance of the noise at the adversary [00015] h C 2 , h Adv 2 , h I 2 , g C 2 , g Adv 2 , r C 2 , r Adv 2 , and r I 2 large scale path loss of the corresponding channels P.sub.E[s] DEP in slot s P.sub.E expected DEP where the expectation is over slots. R.sub.C expected achievable rate at the client where the expectation is over slots {tilde over (R)}.sub.C approximation of achievable rate at the client where the expectation is over slots target DEP P.sub.A,max maximum available transmit power at the agent P.sub.J,max maximum available transmit power at the jammer G Gain Tunable parameters P.sub.A transmit power at agent (optimization variable) transmission probability at agent (optimization variable) P.sub.J[s] random power of a jamming signal in slot s P.sub.lb lower bound of the random jamming power (optimization variable) P.sub.ub upper bound of the random jamming power (optimization variable) IRS matrix which is computed every slot (optimization variable) .sub.n the phase shift of the n-th IRS element [s] detection threshold at the adversary in slot s (optimized at the adversary)

[0054] The quasi-static Rayleigh fading channels are considered. A communication slot consists of a block of L channel uses, and all channels remain constant in a slot and change to independent channels for the next slot. In order to confuse the adversary, the agent decides whether to transmit a signal with power P.sub.A or not in every slot. More specifically, for a given slot, the agent transmits a signal with transmission probability . In slot s, the IRS identifies its reflection coefficient matrix [s] based on the channels in slot s where [s]=diag{e.sup.j.sup.1.sup.[s], e.sup.j.sup.2.sup.[s], . . . , e.sup.j.sup.N.sup.[s]}custom-character and .sub.n[s][0,2) is the phase shift of the n-th IRS element.

[0055] In addition, with the goal of obfuscating the adversary in detecting the communication, in slot s, the jammer broadcasts a jamming signal with random power P.sub.J[s] where the jamming power follows a uniform distribution in [P.sub.lb, P.sub.ub].

[0056] Here, the transmission probability at the agent A, transmit power at the agent P.sub.A, and the jamming power P.sub.J [s], between Pub and Pub, do not change from one slot to another, but the IRS reflection matrix [s] and jamming power P.sub.J[s] may and thus can be different for different slots.

[0057] We define x.sub.A[s,l]CN(0,1) and x.sub.J[s,l]CN(0,1) as the transmit signals from the agent and jammer in the l-th channel use in slot s where CN(a, b) means the complex Gaussian random variable with mean a and variance b. Then, the received signals at the client and adversary are respectively expressed as:

[00016] y c [ s , l ] = P A ( h c [ s ] + g c T [ s ] [ s ] h I [ s ] ) x A [ s , l ] + P J [ s ] ( r c [ s ] + g c T [ s ] [ s ] r I [ s ] ) x J [ s , l ] + n c [ s , l ] , ( 1 ) y Adv [ s , l ] = P A ( h Adv [ s ] + g Adv T [ s ] [ s ] h I [ s ] ) x A [ s , l ] + P J [ s ] ( r Adv [ s ] + g c T [ s ] [ s ] r I [ s ] ) x J [ s , l ] + n Adv [ s , l ] , ( 2 ) where h c [ s ] CN ( 0 , h C 2 ) and h Adv [ s ] CN ( 0 , h Adv 2 )

represent the channels from the agent to client and the agent to adversary, respectively. Also,

[00017] h I [ s ] N 1 C N ( 0 , h I 2 I N ) , g C [ s ] N 1 C N ( 0 , g C 2 I N ) and g Adv [ s ] N 1 C N ( 0 , g Adv 2 I N )

stand for the channels from the agent to the IRS, from the IRS to client, and from the IRS to adversary, respectively, where I.sub.N denotes NN identity matrix. Here,

[00018] r C [ s ] C N ( 0 , r C 2 ) , r Adv [ s ] C N ( 0 , r Adv 2 ) and r I [ s ] N 1 C N ( 0 , r I 2 I N )

are the channels from the jammer to the agent, adversary and IRS, respectively. Here

[00019] h C 2 , h Adv 2 , h I 2 , g C 2 , g Adv 2 , r C 2 , r Adv 2 and r I 2

mean the large-scale path losses of the corresponding channels. In addition,

[00020] n C [ s , l ] C N ( 0 , C 2 ) and n Adv [ s , l ] C N ( 0 , Adv 2 )

are the complex additive Gaussian noise at the client and adversary, respectively.

[0058] The adversary has knowledge of the transmit power at the agent P.sub.A, transmission probability at the agent , the jamming power P.sub.J[s] between P.sub.lb and P.sub.ub, the effective channel gains to the adversary

[00021] A [ s ] = .Math. "\[LeftBracketingBar]" h A d v [ s ] + g Adv T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 and J [ s ] = .Math. "\[LeftBracketingBar]" r Adv [ s ] + g Adv T [ s ] [ s ] r I [ s ] ] .Math. "\[RightBracketingBar]" 2 .

This case presents the worst-case scenario from covertness perspective.

[0059] The agent and IRS have knowledge of their channels to the client (h.sub.C[s], g.sub.C[s] and h.sub.I[s]) and the statistics of the channels

[00022] ( h C 2 , g C 2 , and h I 2 ) .

However, the agent and IRS only know the statistics of the effective channels to the adversary and do not have information about the instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) in every slot. Furthermore, the agent and IRS only have knowledge of the statistics of the channels from the jammer to the client

[00023] ( r C 2 and r I 2 )

and do not know the instantaneous channels from the jammer to the client (r.sub.C[s] and r.sub.I[s]) in every slot.

[0060] In order to detect the existence of the transmission, the adversary attempts to distinguish the following two hypotheses:

[00024] 0 [ s ] : y Adv [ s , l ] = P J [ s ] ( r Adv [ s ] + g Adv T [ s ] [ s ] r I [ s ] ) x J [ s , l ] + n Adv [ s , l ] , ( 3 a ) 1 [ s ] : y Adv [ s , l ] = P A ( h Adv [ s ] + g Adv T [ s ] [ s ] h I [ s ] ) x A [ s , l ] + P J [ s ] ( r Adv [ s ] + g Adv T [ s ] [ s ] r I [ s ] ) x J [ s , l ] + n Adv [ s , l ] , ( 3 b )

where custom-character[s] designates the null hypothesis in which there is no transmission and custom-character[s] signifies the alternative hypothesis in which there is a transmission in slot s.

[0061] In slot s, based on the observations y.sub.Adv[s, 1], . . . , y.sub.Adv[s, L], the adversary makes a binary decision whether the agent's transmission happened or not. The adversary employs a radiometer for the binary decision and conducts a threshold test as follows:

[00025] y Adv [ s ] = 1 L .Math. l = 1 L .Math. "\[LeftBracketingBar]" y A d v [ s , l ] .Math. "\[RightBracketingBar]" 2 0 [ s ] 1 [ s ] [ s ] , ( 4 )

where [s] is the detection threshold in slot s, and custom-character[s] and custom-character[s] respectively denote the decisions in favor of custom-character[s] and custom-character[s].

[0062] Then, for slot s, the detection error probability (DEP) at the adversary P.sub.E[s] is given by:

[00026] P E [ s ] = M D [ s ] + ( 1 - ) F A [ s ] , ( 5 )

where custom-character[s]=Pr(custom-character[s]|custom-character[s]) and custom-character[s]=Pr(custom-character[s]|custom-character[s]) are respectively the missed detection probability and the false alarm probability.

[0063] In every slot s, the adversary computed the optimal detection threshold [s] that minimizes the DEP P.sub.E[s] and makes a binary decision following the threshold test. The expected DEP over slots is defined by as

[00027] P _ E = [ P E [ s ] ] .

[0064] Since the probability that the agent transmits data to the client is , the expected achievable rate at the client R.sub.C is given by:

[00028] R C = [ log 2 ( 1 + P A .Math. "\[LeftBracketingBar]" h C [ s ] + g C T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 P J [ s ] .Math. "\[LeftBracketingBar]" r C [ s ] + g C T [ s ] [ s ] r I [ s ] .Math. "\[RightBracketingBar]" 2 + C 2 ) ] , ( 6 )

where the expectation is taken over slots. The goal of this invention is to maximize R.sub.C while satisfying the covertness constraint on the expected DEP at the adversary, i.e., P.sub.E should be larger than a target DEP . We term the achieved R.sub.C with the covertness constraint as covert rate.

[0065] Here, we provide a new covert communication technique that jointly optimizes the transmit power at the agent P.sub.A, the transmission probability at the agent , the IRS reflection matrices {[s]}, the random jamming power P.sub.j[s] for the covert rate maximization problem. The covert rate maximization problem is formulated as:

[00029] max { [ s ] } , P A , P lb , P ub R _ C s . t . P A P A , max , P u b P J , max and P E , ( 7 )

where P.sub.A,max and P.sub.J,max are the maximum available transmit powers at the agent and jammer, respectively. Here, [0, min(, 1)) since the maximum achievable P.sub.E is [0, min(, 1)) when is known at the adversary.

[0066] Note that the instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) and the instantaneous channels from the jammer (r.sub.C[s] and r.sub.I[s]) are not available at the agent and IRS. Hence, to enhance the achievable rate at the client based on only the available channel information, [s]=diag{e.sup.j.sup.1.sup.[s], e.sup.j.sup.2.sup.[s], . . . , e.sup.j.sup.N.sup.[s]} is calculated to maximize the strength of the received signal at the client from the agent

[00030] P A .Math. "\[LeftBracketingBar]" h C [ s ] + g C T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 .

Then, the reflection coefficient .sub.n[s] is obtained as:

[00031] n [ s ] = arg ( h C [ s ] ) - arg ( g C , n [ s ] ) - arg ( h I , n [ s ] ) , n , ( 8 )

where arg() is the angle of complex scalar , and g.sub.C,n[s] and h.sub.I,n[s] indicate the n-th elements of g.sub.C[s] and h.sub.I[s], respectively.

[0067] When the number of channel uses in a slot is large enough, by the Strong Law of Large Numbers,

[00032] y Adv [ s ] = P J [ s ] J [ s ] + Adv 2

when custom-character and

[00033] y Adv [ s ] = P A A [ s ] + P J [ s ] J [ s ] + Adv 2

when custom-character. As the jamming power P.sub.J[s] follows a uniform distribution in [P.sub.lb, P.sub.ub], when the adversary computes the detection threshold [s] that minimizes P.sub.E[s], the DEP P.sub.E[s] is expressed as

[00034] P E [ s ] = { min ( , 1 - ) ( 1 - P A A [ s ] A [ s ] ( P ub - P lb ) if A [ s ] J [ s ] P ub - P lb P A 0 , otherwise . ( 9 )

[0068] Note that since the IRS reflection coefficients are calculated only based on the channels to the client, the IRS reflection matrix [s] is independent of the channels to the adversary. Therefore the effective channels to the adversary .sub.A[s] and .sub.J[s] follow exponential distributions with parameter

[00035] A = 1 h Adv 2 + N h I 2 g Adv 2 and J = 1 r Adv 2 + N r I 2 g Adv 2 ,

respectively. Then, the expected DEP over slots

[00036] P _ E = [ P E [ s ] ]

is given by.

[00037] P _ E = min ( , 1 - ) ( 1 + ln ( ) - 2 ) , ( 10 ) where = 1 1 + A J P ub - P lb P A . ( 11 )

[0069] Here, the expected DEP P.sub.E is a decreasing function of .

[0070] As increases with P.sub.lb, the expected DEP P.sub.E decays with P.sub.lb. Also, the expected rate at the client R.sub.C gets smaller when P.sub.lb becomes larger. Therefore, in order to maximize R.sub.C while satisfying the constraint on the expected DEP, the optimal jamming power lower bound is given by:

[00038] P lb = 0 . ( 12 )

[0071] Since the expected DEP P.sub.E and expected rate R.sub.C are respectively monotonically increasing and decreasing functions of P.sub.ub, to maximize R.sub.C, the optimal P.sub.ub given and P.sub.A should. meet the covertness constraint with equality, i.e., P.sub.E=. By setting P.sub.lb=6 and defining

[00039] ( ) = P ub ( ) P A ( ) ,

becomes

[00040] = J J + A ( ) .

Here, as P.sub.E is an increasing function of () when is given, () that fulfills P.sub.E= can be identified, for instance, by leveraging the bisection method. Then, the optimal P.sub.ub() for a given is expressed as:

[00041] P ub ( ) = ( ) P A ( ) . ( 13 )

[0072] With this P.sub.ub(), the covertness constraint is satisfied, and so the maximum allowable transmit power P.sub.A() should be used to maximize the expected rate R.sub.C. Note that P.sub.ub() depends on P.sub.A() and P.sub.ub() cannot be higher than P.sub.J,max. Thus, considering the power budgets at the client and jammer, we obtain the optimal transmit power at the agent P.sub.A() for any given as:

[00042] P A ( ) = min ( P A , max , P J , max ( ) ) . ( 14 )

[0073] With the optimized P.sub.lb, P.sub.ub(), and P.sub.A(), the covertness constraint is satisfied for every transmission probability at the agent .

[0074] Due to the fact that there are no closed-form solutions for P.sub.ub() and P.sub.A(), it is intractable to derive an exact expression of the expected rate at the client R.sub.C. To make the problem tractable, we employ an approximation of R.sub.C as:

[00043] R _ C R ~ C = [ log 2 ( 1 + P A ( ) E [ .Math. "\[LeftBracketingBar]" h C [ s ] + g C T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 ] E [ P J [ s ] ] E [ .Math. "\[LeftBracketingBar]" r C [ s ] + g C T [ s ] [ s ] r I [ s ] .Math. "\[RightBracketingBar]" 2 ] ) ] , ( 15 ) where E [ .Math. "\[LeftBracketingBar]" h C [ s ] + g C T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 ] = 4 N h I 2 g C 2 h C 2 + ( 2 N 2 1 6 + ( 1 - 2 1 6 ) N ) h 2 I g C 2 + h C 2 = , E [ P J [ s ] ] = P ub ( ) 2 , E [ .Math. "\[LeftBracketingBar]" r C [ s ] + g C T [ s ] [ s ] r I [ s ] .Math. "\[RightBracketingBar]" 2 ] = N r I 2 g C 2 + r C 2 = .

[0075] Then, the approximation of the expected rate {tilde over (R)}.sub.C is given by:

[00044] R ~ C = log 2 ( 1 + 2 ( ) ) ( 16 )

[0076] Having presented the various equations above, we present a novel methodology to optimize the transmission probability, transmit power at the agent and the reflection matrix of the IRS with the goal of maximizing the achievable rate at a client while ensuring a covertness constraint.

[0077] FIG. 3 depicts a flow chart of the novel methodology 300 according to one embodiment of the invention. It allows us to establish a covert communication link between the agent device 102 and the client device 104 using the IRS 106 and the friendly jamming device 110. This includes configuring the IRS 106 for RF communication between the agent device 102 and the client device 104 for covert communications. Plus, it configures the jamming device 110 to generate and broadcast a confusion signal to confuse the adversary device in detecting the existence of the communication between the agent device and the client device. For instance, it may confuse the adversary device in detecting the existence of the communication between the agent device and the client device while alleviating the interference at the client.

[0078] In step 310, we provide an intelligent reflecting surface (IRS) to reflect wireless radio frequency (RF) communication signals transmitted from the agent device to the client device, the IRS comprising a two-dimensional array of individually controllable RF reflecting elements. An exemplary IRS 106 is shown in FIGS. 2A and 2B, described above.

[0079] Next, in step 320, we provide a jamming device which radiates jamming signals with random power to confuse the adversary device in detecting the existence of the communication between the agent device and the client device. This adds the jamming device 110 to the network. Again, the jamming device's 110 role is to broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The jamming randomly chooses its jamming power from a uniform distribution in [P.sub.lb, P.sub.ub].

[0080] And, in step 330, we establish a covert RF communication link between the agent device and the client device by determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client R.sub.C while ensuring covertness of the transmission. An example of step 330 is shown in more detail FIG. 3A and described below.

[0081] We can use method 300 for wireless network embodiments where a transmitter (e.g., agent, cellular base station, user equipment) sends a data to its receiver with the aid of an IRS to increase the coverage region and maximize the achievable rate at the client. In specific embodiments, it is suitable for any IRS-assisted networks where there exist security threats, low computational complexity is desirable, and only the statistic of the channel to a potential adversary is available.

[0082] Step 330 establishes a covert communication link between the agent device 102 and the client device 104 using the IRS 106. It adaptively reconfigures the wireless network environments via controlled reflections. Again, our method presumes transmissions from the agent device 102 to the client device 104 using the IRS 106. But the roles of the agent and the client can repeatedly change again and again as needed. This step may preferably include establishing a covert RF communication link between the agent device and the client device using the IRS may determining a transmission probability between the agent device and the client device, a transmit power P at an agent, random jamming power of the jamming device P.sub.J[s] and an IRS reflection matrix for configuration data for the IRS elements to optimize an achievable data rate at a client R.sub.C while ensuring covertness of the transmission. This step is further explained with respect to sub-steps 332, 334 and 336 in FIG. 3A.

[0083] In step 332, we determine the transmission probability between the agent device and the client device that optimizes the achievable data rate at the client device R.sub.C taking into account an expected detection error probability (DEP) at an adversary device. Again, because we are unable to derive an exact expression of the expected rate at the client, we use an approximation thereof, custom-character.

[0084] Here, we note that P.sub.E=min(, 1) where =1+ ln().sup.2. Hence, the value of () that meets the covertness constraint with equality fulfills

[00045] = min ( , 1 - )

where is an increasing function of () from the fact that is a decreasing function of

[00046] = J J + A ( ) .

When 0.5, () satisfying the condition

[00047] = min ( , 1 - )

decays with as gets larger with () and

[00048] min ( , 1 - )

becomes smaller with . In this sense, if 0.5, to maximize R.sub.C, should be set to 0.5. On the other hand, for >0.5, () such that

[00049] = min ( , 1 - )

grows with . From these observations, we can infer that R.sub.C is a unimodal function of , and therefore there exists a unique maximum in [0.5, 1].

[0085] The approximated expected achievable rate maximizing transmission probability can be found by solving the following:

[00050] = arg max [ 0.5 , 1 ] R ~ C . ( 17 )

[0086] The arguments of the maxima function (commonly abbreviated as argmax) returns the maximum value for the target function. Thus, Eq. (17) determines the maximum value of {tilde over (R)}.sub.C which is used for .

[0087] Since {tilde over (R)}.sub.C is a unimodal function of , the solution of the problem can be found by exploiting one-dimensional search strategies such am extremum finding technique, like the golden section search method. To solve for this, in various embodiments, we can plot the covert rate (in units of bps/Hz) as a function of transmission probability to determine the value of for which the covert rate function is maximum. An exemplary plot for the scenario depicted in FIG. 5 is shown in FIG. 5A. The plot there has two curves: one is the exact covert rate R.sub.C without any approximations, and the other is the derived approximation of the covert rate {tilde over (R)}.sub.C. As we mathematically analyzed, it is shown that the approximation is a unimodal function of the transmission probability (i.e., there is only one peak). Also, it turns out that the exact covert rate is also a unimodal function. The point here is that the value of transmission probability that maximizes the approximation is very close to the point that maximizes the exact covert rate. Due to this fact, our approach which is based on the approximation maximization works well.

[0088] Extremum finding techniques (such as the golden section search method) are well-known techniques for analyzing functions. (For more information, see E. K. P. Chong and S. H. Zak, Introduction to Optimization, 4th ed. Hoboken, NY, USA: Wiley, 2013). This can be achieved by suitable data analysis software. For that exemplary scenario plot of FIG. 5A, the covert rate is maximum for of approximately 0.625.

[0089] Next, in step 334, we determine a transmit power P of the agent that satisfies a covertness constraint for the RF communication for the determined transmission probability A obtained in step 310 and the jamming power P.sub.J[s] for jamming device 110. It can broadcast artificial random jamming signals (not data) with the aim of confusing the adversary. The range of random jamming power is between a lower bound P.sub.lb to an upper bound P.sub.ub. So, there are two optimization variables for the jamming power (P.sub.lb and P.sub.ub).

[0090] As increases with P.sub.lb, the expected DEP P.sub.E decays with P.sub.lb. Also, the expected rate at the client R.sub.C gets smaller when P.sub.lb becomes larger. Therefore, in order to maximize R.sub.C while satisfying the constraint on the expected DEP, the optimal jamming power lower bound is given by P.sub.lb=0. [Eq. (12)].

[0091] Since the expected DEP P.sub.E and expected rate R.sub.C are respectively monotonically increasing and decreasing functions of P.sub.ub, to maximize R.sub.C, the optimal P.sub.ub given and P.sub.A should meet the covertness constraint with equality, i.e., P.sub.E=. By setting P.sub.lb=6 and defining

[00051] ( ) = P ub ( ) P A ( ) ,

becomes

[00052] = J J + A ( ) .

Here, as P.sub.E is an increasing function of () when is given, () that fulfills P.sub.E= can be identified by leveraging a root-finding method, such as the bisection method as an example. Root-finding methods (such as the bisection method) are well-known techniques for analyzing functions. (For more information, see again E. K. P. Chong and S. H. Zak, Introduction to Optimization, 4th ed. Hoboken, NY, USA: Wiley, 2013).

[0092] Then, the optimal P.sub.ub() for a given is expressed as: P.sub.ub()=()P.sub.A(). [Eq. (13)]. With this P.sub.ub(), the covertness constraint is satisfied, and so the maximum allowable transmit power P.sub.A() should be used to maximize the expected rate R.sub.C. Note that P.sub.ub() depends on P.sub.A() and P.sub.ub() cannot be higher than P.sub.J,max. Thus, considering the power budgets at the client and jammer, we obtain the optimal transmit power at the agent P.sub.A() for any given as:

[00053] P A ( ) = min ( P A , max , P J , max ( ) ) . [ Eq . ( 14 ) ]

[0093] To solve for this, in various embodiments, we can plot the actual scaled agent transmit power as a function of P.sub.A. An exemplary plot for the scenario depicted in FIG. 5 is shown in FIG. 5B. The plot showing the upper bound of jamming power P.sub.ub and actual transmitted transmit power P.sub.A at the agent when the transmission probability obtained in step 332 is adopted. First, since P.sub.ub()=()P.sub.A(), P.sub.ub() linearly increases with P.sub.A() until P.sub.ub() reaches at P.sub.J,max. Note that, to satisfy the covertness constraint, the ratio between the powers

[00054] ( ) = P ub ( ) P A ( )

should remain constant. In this sense, even if we want to increase P.sub.A() further, the actual transmit power at the agent cannot be increased. Therefore, as shown in the plot, P.sub.A() remains the same (about 12 dBm) after P.sub.ub() reaches at P.sub.J,max. FIG. 5C further shows a plot of the covert rate as a function of P.sub.A(). It shows the covert rate is a non-decreasing function thereof. Also, as shown in the previous figure, P.sub.A() cannot be higher than 12 dBm. Thus, we can see that the covert rate increases as P.sub.A() grows, and the covert rate remains the same when P.sub.A() is equal or greater than 12 dBm. With the optimized P.sub.lb, P.sub.ub(), and P.sub.A(), the covertness constraint is satisfied for every transmission probability at the agent .

[0094] Lastly, in step 336, we determine the IRS reflection matrix by determining phase calculations of the n-th IRS elements of the IRS .sub.n[s]. This provides configuration data for the reflecting elements of the IRS 106. The instantaneous channels to the adversary (h.sub.Adv[s], g.sub.Adv[s], and r.sub.Adv[s]) and the instantaneous channels from the jammer (r.sub.C[s] and r.sub.I[s]) are not available at the agent and IRS. Hence, to enhance the achievable rate at the client based on only the available channel information, [s]=diag{e.sup.j.sup.1.sup.[s], e.sup.j.sup.2.sup.[s], . . . , e.sup.j.sup.N.sup.[s]} is calculated to maximize the strength of the received signal at the client from the agent

[00055] P A .Math. "\[LeftBracketingBar]" h C [ s ] + g C T [ s ] [ s ] h I [ s ] .Math. "\[RightBracketingBar]" 2 .

Then, the reflection coefficient .sub.n[s] is obtained by: .sub.n[s]=arg (h.sub.C[s])arg(g.sub.C,n[s])arg(h.sub.l,n[s]), n, where arg() is the angle of complex scalar , and g.sub.C,n[s] and h.sub.I,n[s] indicate the n-th elements of g.sub.C[s] and h.sub.I[s], respectively. [Eq. (8)]. The IRS reflection matrix is computed in every communication slot s.

[0095] Method 300 may be embodied as software, hardware or some combination thereof. To that ends, computer-executable instructions (code) for implementation may be provided for. One skilled in the art can create suitable instructions (code) for executing the above-mentioned processing and mathematical calculations. In some embodiments, method 300 may be executed by the agent device 102 in cooperation with the IRS 106 and the jamming device 110.

[0096] FIG. 4 depicts a simplified high-level block diagram of an exemplary transceiver 400 for an agent device (102 in FIG. 1) in accordance with an embodiment. The transceiver allows the device to both transmit and receive RF signals. In some embodiments, a client device (104 in FIG. 1) and/or a jamming device (110 in FIG. 1) may also include this form of transceiver. The transceiver 400 comprises an antenna 402, an RF transmitter 404, an RF receiver 406, a controller 508 and, optionally, one or more sensors 410. In one embodiment, the transceiver 400 may be specifically configured to execute covert communications software 426 comprising computer-executable instructions or code to perform the method 300 (FIGS. 3 and 3A) as described above.

[0097] In one embodiment, the transmitter 404 is a conventional RF transmitter that is controlled by the controller 408 such that the transmitter shall transmit a data carrying communication signal. The transmitter 404 can have the phase of the transmitted signal adjusted by the controller 408. The receiver 406 may be a conventional RF receiver that is controlled by the controller 408. When operating as a client, the receiver 406 receives communications signals from the agent. When the transceiver 400 is a portion of a client, the receiver 406 receives the signals from the agent.

[0098] The optional sensors 410 may include one or more of cameras, microphones, multispectral imaging (UV/visible/IR) sensors; antennas (RF; radio); ranging (radar; LIDAR) sensors; location/position sensors (GPS, altitude/depth, etc.), motion sensors (speed/velocity, bearing/trajectory, acceleration, etc.); weather sensors (temperature, pressure, wind speed, ambient lighting, etc.); field sensors (electric, magnetic, vibrations, radiation, biological, etc.) and the like. The signals to/from these sensors 410 are processed by the controller 408 and may be used locally or transmitted to the client from an agent or to an agent from a client.

[0099] In one embodiment, the controller 408 comprises at least one processor 412, memory 424 and various support sub-systems and circuits such as, but not limited to, an RF input/output (I/O) interface 414, a clock 418, a phase control adjustor 420, a sensor(s) I/O interface 422, and a communications module 430. The RF input/output (I/O) interface 414 communicates with the RF hardware (e.g., receiver 406 and transmitter 404) so as to control the transmission/receptions of radio signals for Wireless communications. It includes frequency synchronization configured to carry out the novel concert communications methodology including handling the transmission in a manner to support the processing discussed above. The sensor(s) I/O interface 422 communicates with any sensor(s) which the agent or client may be equipped. The clock 418 is used for timing and establishing time slots. In one embodiment, the clock of each agent may be calibrated ahead of time such. The clock may also be synchronized to an external source such a satellite navigation system (e.g., a Global Positioning System (GPS)). In other embodiments, the agent could interface with the client (or another entity) for clock calibration. The communications module 430 generate signals for communications, including a RF communications signal generator 432 as generally known in the art. The module 430 may be capable of handling analog and/or digital signals, the later including packetized data. If desired, the signal generator 432 may provide encryption for provided confidential signals as known in the art.

[0100] In an embodiment, the controller 408 includes a processor 412 coupled to a memory 424. The processor 412 may be one or more of, or combinations thereof, microprocessors, microcontrollers, application specific integrated circuits (ASICs), and/or the like. The memory 424 may be any form of read only memory, random access memory or combinations thereof. For instance, the memory 424 can be a non-transitory computer readable media that stores secure communications software 426 and data 436 such that the processor 412 may execute the software 426 to implement the method 300 of FIG. 3 to perform covert communications in accordance with embodiments of the invention described above. Portions of the method 300 are appropriately performed by a controller 408 in the agent as described above. The data 436 may include communications data, control data and feedback data.

[0101] Now, we investigate the impact of the number of IRS elements N on the expected DEP P.sub.E in Eq. (10). First, after some manipulations, in Eq. (11) can be rewritten as

[00056] = h I 2 g W 2 N + h W 2 ( h I 2 g W 2 P ub P A r I 2 g W 2 ) N + h W 2 + P ub P A r W 2 , ( 18 )

and, by differentiating with respect to N, we have

[00057] d dN = ( h I 2 r W 2 - h W 2 r I 2 ) P ub P A g W 2 ( ( h I 2 g W 2 + P ub P A r I 2 g W 2 ) N + h W 2 + P ub P A r W 2 ) 2 , ( 19 )

[0102] Note that P.sub.E gets smaller when p becomes higher. Thus, by defining

[00058] A = h I 2 h W 2 and J = r I 2 r W 2 ,

P.sub.E is an increasing (or a decreasing) function of the IRS element number N if .sub.A>.sub.J (or .sub.A>.sub.J). Here, .sub.A (or .sub.J) stands for the large-scale gain of the channel between the agent 102 (or the jammer 110) and the IRS 106 which is scaled by the large-scale gain of the direct channel between the agent 102 (or the jammer 110) and the adversary 108. In this sense, we can interpret that increasing N is beneficial (or harmful) to enhance the DEP P.sub.E when the scaled channel gain between the agent 102 and the IRS .sub.A is smaller (or larger) than the scaled channel between the jammer and the IRS .sub.J. The case with .sub.A<.sub.J means that the impact of the channel from the agent 102 to the adversary 108 through the IRS 106 is smaller than that of the channel from the jammer 110 to the adversary 108 via the IRS 106. This leads to an increased DEP since the jamming signal can confuse the adversary 108 more efficiently.

[0103] As a special case, when the channel gains of the direct links

[00059] h w 2 and r w 2

are the same, the DEP P.sub.E gets bigger with N when

[00060] h 1 2 < r 1 2 .

Also, if the gains of the channels to the IRS

[00061] h 1 2 and r 1 2

are the same, the DEP P.sub.E becomes greater with N when

[00062] h w 2 > r w 2 .

[0104] With respect to FIG. 5, in FIG. 5A-5C, we provide some numerical simulation results to demonstrate the effectiveness of the novel methodology 300 for the exemplary network scenario 10A. More specifically, for the exemplary scenario 10A, depicted in FIG. 5, the positions of the agent 102, the client 104, the adversary 108 and the jammer 110 are fixed, and positions of the IRS 102 is changing. Here, the agent 102 is located at (0 m, 0 m), the client 104 is located at (40 m, 10 m), the adversary 108 is located at (80 m, 0 m), and the jammer 110 is located at (70 m, 5 m), respectively. We consider different horizontal locations of the IRS 106 between (20 m, 0 m) and (60 m, 0 m). All distances are given in units of meters (m).

[0105] In FIG. 5A, we plot the covert rate (in units of bps/Hz) as a function of transmission probability 2. Here, we make the following network assumptions: N=200, P.sub.A,max=15 dB; P.sub.J,max=15 dBm;

[00063] C 2 = Adv 2 = - 80 dBm ;

the location of agent=[40 m,0 m]; the location of client=[40 m, 10 m]; the location of adversary=[80 m, 0 m]; the location of IRS=[40 m, 0 m]; the location of jammer=[60 m, 5 m]; and the target DEP =0.3. Again, as previously discussed, the plot has two curves: one is the exact covert rate R.sub.C without any approximations, and the other is the derived approximation of the covert rate {tilde over (R)}.sub.C. For that exemplary scenario plot here, the covert rate is maximum for of around 0.625.

[0106] In FIG. 5B, we plot the upper board of the jamming power and the actual scaled agent transmit power as a function of P.sub.A. Here, we make the following network assumptions: N=200; P.sub.A,max=15 dB; P.sub.J,max=6 dBm;

[00064] C 2 = Adv 2 = - 80 dBm ;

the location of agent=[0 m, 0 m]; the location of client=[40 m, 10 m]; the location of adversary=[80 m, 0 m]; the location of IRS=[40 m, 0 m]; the location of jammer=[40 m, 5 m]; and the target DEP =0.3. The nature of the plot is discussed above. In sum, the plots show P.sub.A() remains the same (about 12 dBm) after P.sub.ub() reaches at P.sub.J,max. FIG. 5C is a plot of the covert rate as a function of P.sub.A(). It shows the covert rate is a non-decreasing function thereof. Also, as shown in the previous figure, P.sub.A() cannot be higher than 12 dBm. Thus, we can see that the covert rate increases as P.sub.A() grows, and the covert rate remains the same when P.sub.A() is equal or greater than 12 dBm. The network setup for the plot of FIG. 5C is the same as that for FIG. 5B.

[0107] FIGS. 6-8 are some additional plots of covert data rate based on the exemplary network scenario in FIG. 5. Here, we model the large-scale channel gain between two nodes with distance d by .sup.2 (d) (in dB)=G.sub.t+G.sub.r37.522 log.sub.10(d) when line-of-sight (LOS), and .sup.2(d) (in dB)=G.sub.t+G.sub.r35.136.7 log.sub.10(d) when non-LOS (NLOS) where G.sub.t and G.sub.r respectively denote the transmitter and receiver gains. Unless otherwise stated, we assume P.sub.A,max=P.sub.J,max=15 dBm,

[00065] W 2 = W 2 = - 80 dBm ,

G.sub.t=G.sub.r=0 dBi, and only the link between the agent 102 and the IRS 106 and the link between the IRS 106 and the client 104 are LOS.

[0108] FIG. 6 demonstrates the expected covert rate R.sub.C in Eq. (6) with various values of , N, P.sub.A,max, and P.sub.J,max. Here, the optimal performance is obtained by exhaustively searching the optimal solution that maximizes the exact expected achievable rate R.sub.C in Eq. (6). The optimal without optimization means the case where the optimal P.sub.A, P.sub.lb, and P.sub.ub are adopted when On is computed as in Eq. (8) and is fixed to 0.5 Also, the optimal without IRS is the case where the optimal P.sub.PA, P.sub.lb, P.sub.ub and are identified assuming that there is no IRS. First, we can observe that the novel methodology exhibits near optimal performance with only one-dimensional line search methods. In addition, by comparing the proposed technique with the optimal without optimization and the optimal without IRS, it is shown that the performance is significantly enhanced by jointly optimizing P.sub.A, P.sub.lb, P.sub.ub, , and . Lastly, we see that the covert rate is improved when the IRS element number N and available power budgets (P.sub.A,max and P.sub.J,max) become larger.

[0109] In FIG. 7, we examine the covert rate as a function of X.sub.IRS where the IRS is located at (X.sub.IRS, 0) considering different values of N and E. We can see that the performance of the proposed algorithm is indistinguishable from the optimal performance. Since the IRS reflection matrix maximizes the received signal strength at the client 104 from the agent 102, the covert rate is maximized when X.sub.IRS is between the X coordinates of the locations of the agent 102 and the client 104 which are 0 and 40, respectively. It is also observed that the covert rate gets higher when the number of IRS elements N increases or the target DEP decreases.

[0110] FIG. 8 illustrates the expected covert rate R.sub.C in Eq. (6) with the different locations of the IRS and jammer where the IRS and jammer are positioned at (X.sub.IRS, 0) and (60, Y.sub.1), respectively. First of all, it is seen that R.sub.C is highly related to the locations of the IRS and jammer. Also, the optimal location of the IRS (or the jammer) changes when the location of the jammer (or the IRS) varies. Therefore, it is important to jointly optimize the locations of the IRS and jammer to enhance the covert rate.

[0111] In sum, we have shown the joint optimization of the transmit power at the agent, jamming power, IRS reflection matrix, and transmission probability for IRS-aided covert communication with a friendly jammer. We disclose a novel wireless system and methodology that experiences near optimal performance with only one-dimensional search methods. Also, we have analytically explored the influence of the number of IRS elements on the DEP at the adversary, and identified the case where increasing the IRS element number is beneficial to improve the DEP.

[0112] The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the present disclosure and its practical applications, and to describe the actual partial implementation in the laboratory of the system which was assembled using a combination of existing equipment and equipment that could be readily obtained by the inventors, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as may be suited to the particular use contemplated.

[0113] While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.