Abstract
In this work, a wireless covert communication system with full-duplex (FD) multiantenna receiver is considered. In order to improve the convert performance of the wireless communication system in the FD mode, a scheme based on selection combining/zero forcing beamforming (SC/ZFB) is proposed. More specifically, a covert message receiver with a FD multiantenna uses the zero forcing beamforming method to transmit randomly varying noise power to the adversary while receiving covert information from the sender. Firstly, we derive the optimal detection threshold and the corresponding closed expression of the minimum detection error rate of the warden. Secondly, the transmission interruption probability is explored to measure the communication reliability between the sender and the receiver of the covert message. Finally, the throughput performance of the covert communication system is analyzed under random geometry. Our analysis shows that the proposed SC/ZFB scheme can achieve the positive effective convert rate while interfering with the detection of the warden as much as possible. It is worth noting that the increase of the number of antennas and the power of covert message transmission can improve the convert performance of the system.
1. Introduction
The confidentiality of network activities and the integrity of data transmission are the basic goals of wireless network system construction. Although the network system structure [1, 2] and network control protocol [3, 4] design determine the efficiency of data transmission to a certain extent, due to the wireless network uses the public electromagnetic wave as an open medium to transmit data signals, the risk of data transmission will be greatly increased. Therefore, how to ensure the security and privacy of information in wireless networks has been a hot research issue. The common methods include traditional information theory technology [5–7], encryption technology [8, 9], and emerging covert communication technology [10, 11]. Traditional methods [12, 13] focus on protecting information content from eavesdropping, while new methods focus on protecting information transmission process. The covert communication technology (also known as low probability detection communication ()) appeared in the form of spread spectrum technology in the earliest stage. In recent years, the researchers have studied covert communication under additive white Gaussian noise () channel [14, 15], binary symmetric channel () [16], and discrete memoryless channel () [17], respectively. At the same time, the basic limitations of covert communication under these channels have also been studied in these literatures, especially in the pioneering work of covert communication [14]; a pessimistic conclusion is put forward that when , there is , which means that when is large enough, the covert rate is 0. Therefore, more and more people are devoting themselves to exploring the conditions that can ensure the positive covert rate and putting forward some new research methods; the main purpose is to create conditions for the warden to detect errors. The basic strategy is adopted to disturb the warden detection by uncertainties of noise [18, 19], channel [20], interference power [19, 21–23], and communication time [24]. In addition, covert communication schemes with relays [25] have also been proposed successively, and the literature [26] studies covert communication with finite block length in AWGN channels. Yan et al. [27] study delay-intolerant covert communications in AWGN channels with finite block length. Recently, some researchers consider covert communication in the network environment of unmanned aerial vehicle () [28]. However, the existing covert communication systems involve multiple antennas in addition to [29–31]; most of the existing research on covert communication focuses on single-antenna scenarios, while multiantenna covert communication scenarios [32] have not been well developed.
Full-duplex () technology in wireless communication scenarios has been effectively explored in [22, 33, 34]. Shu et al. [33] send artificial interference to the adversary through the FD receiver, so as to enhance the convert performance. Wang et al. [34] use channel uncertainty to explore covert communication in relay networks operating in the FD mode. Similarly, Shahzad et al. [22] also use FD technology; when the receiver of the covert message receives the signal, it will generate artificial noise with different power, resulting in uncertainty to the opponent.
As for beamforming technology, it is rarely used. In [35], the enhancement effect of multiantenna AN nodes on covert performance is studied, and it is pointed out that directional beamforming is the optimal AN strategy. In fact, how to use multiantenna technology to improve spectrum efficiency so as to bring more security gains in covert communication systems and how to design more appropriate multiantenna scenarios to make effective covert rate higher are necessary to be considered. Therefore, the potential of multiantenna technology for covert communication in fading channels remains to be tapped, which also stimulates the current research work.
In this work, we consider covert communication in the context of multiantenna receiver networks. Specifically, the full-duplex and multiantenna receiver generates artificial noise () with a randomized transmit power to deliberately confusion and affect the detection of Willie. The covert transmission selection combining/zero forcing beamforming () schemes are proposed: the destination selects the best antenna to receive the information from the source and uses all the remaining antennas to send the jamming signal to warden according to the principle of ZFB. The main contributions of this paper are summarized as follows:(i)We demonstrate the possibility that the proposed SC/ZFB scheme can achieve covert performance in wireless communication networks; the results show that the SC/ZFB schemes can achieve positive effective covert rate.(ii)The closed-form expressions of the minimum detection error rate and transmission outage probability are derived, respectively, and the covertness and reliability of the system are described, respectively, on this basis.(iii)Our analysis shows that increasing the number of antennas can improve the covert performance. In other words, with the increase of the number of antennas, the detection performance and covert performance of the covert communication system will also increase.
The remainder of this paper is organized as follows. The system model is introduced in Section 2. Sections 3 and 4 analyze the detection performance and the covert throughput for the SC/ZFB schemes, respectively. The theoretical analyzes are verified by numerical results in Section 5. Finally, Section 6 concludes the paper and summarizes the key findings.
Notation: throughout this paper, the boldface uppercase letters are used to denote matrices. is denoted as the conjugate transpose operation. is defined as the Frobenius norm. and represent the cumulative distribution function (CDF) and the probability density function (PDF) of random variable, respectively. denotes the expectation operation. A list of the fundamental variables is provided in Table 1.
2. System Model
2.1. Considered Scenario and Adopted Assumptions
As shown in Figure 1, considering a multiantenna wireless network consisting of a source Alice, a destination Bob, and a warden Willie, Warden Willie seeks to detect any transmission by Alice, and Alice desires to deliver messages to Bob reliably while guarantees a low probability of being detected by Willie; at the same time, they know each other’s existence and location. Bob is equipped with antennas, and all the other nodes, including Alice and Willie, are single-antenna devices. In addition to receiving covert messages, Bob uses additional antenna for transmission of AN in order to confuse Willie, and FD operations are assumed at Bob.

We assume that the wireless channels are subject to independent quasi-static Rayleigh fading, where the channel coefficient remains constant over one communication slot of channel uses and changes independently from slot to slot. The channels from Alice-to-Bob, Alice-to-Willie, and Bob-to-Willie, are denoted by , , and , respectively, while the self-interference channel of Bob is denoted by . We assume that Bob knows , while Willie knows and . Considering Bob knows about Willie, so it is assumed that Bob also knows .
Based on FD operation, Bob first selects the best antenna based on the channel state information () of the channel between Alice and Bob to receive the covert messages and utilizes the remaining antennas to send a weighted AN signal to disturb Willie’s detection. We adopt the ZFB algorithm to avoid the undesirable AN signals at Alice. Thus, the optimal weight vector is the solution of the following optimization problem:where is the conjugate transpose operator, denotes the Frobenius norm, and and denote the channel vectors between the remaining antennas of the Bob and the Willie and the remaining antennas of the Bob and the Alice, respectively. According to the theorems in [36], the solution of the optimal weight vector in formula (1) can be obtained aswhere is the projection idempotent matrix with rank .
Let us define and ; the corresponding probability density function () and the cumulative distribution function () can be expressed aswhere denotes the power of the AN signal from Bob and the is noise variance of Willie.
The instantaneous SINR at Bob is given by
When Alice transmits, the received signal at Willie is given bywhere denotes the channel coefficient between Alice and the th antenna of Bob, is the transmitted signal by Alice satisfying , is the index of each channel use, , and is the complex additive Gaussian noise at Willie with as its variance, i.e., .
2.2. Detection Metrics at Willie
Warden Willie attempts to judge whether Alice is transmitting to Bob in a communication slot. To this end, Willies should distinguish two hypotheses, namely, the null hypothesis meaning that Alice is not transmitting covert information and the alternate hypothesis indicating an ongoing communication. The two hypotheses are detailed as below:where is the AWGN at Willie with as its variance, i.e., . Willie does not know and in a communication slot, while is fixed and known.
We focus on a communication slot, where Willie has to decide whether Alice transmitted covert information to Bob, or not. By applying Neyman-Pearson criterion [37] and likelihood ratio test, Willie can obtain the optimal decision rule to minimize his detection error; the rule is given bywhere is the average power received at Willie in the slot, is a predefined detection threshold, and are the binary decisions that infer whether the Alice transmits covert message to Bob or not, respectively, and decision is made if , whereas decision is made otherwise. We consider an infinite number of channel uses, i.e., .
The average received power is given by
At the end of the communication slot, Willie must make a decision. We define the false alarm rate as , and the miss detection rate is defined as . Under the assumption of equal a priori probabilities of hypotheses and , the detection performance of Willie is normally measured by the detection error probability, which is defined as .
3. Detection Performance at Willie
In this section, we derive Willie false alarm and miss detection rates and examine how Willie optimally sets the value of aiming to minimize the detection error rate .
3.1. False Alarm and Miss Detection Rates
Considering Rayleigh fading, the cumulative distribution function () of the channel coefficient between the th antenna of Bob and the Willie is given by .
Theorem 1. For SC/ZBF scheme, the false alarm and miss detection rates at Willie are derived as (10) and (11), shown at the top of the next page, where
Proof. According to the optimal decision rule and (8), the false alarm rate is given byFrom (10), the can be obtained asThen, we solve the integral in (13) with the aid of equation (3.351. 2.11) and equation (3.351.4) in [34], utilizing the variable substitution (i.e., setting ). Similarly, the miss detection rate is given by
3.2. The Optimization of Detection Threshold and Detection Error Rate at Willie
Theorem 2. For the SC/ZBF scheme, under the assumption of a radiometer at Willie, the optimal threshold that minimizes is derived asand the corresponding detection error rate is derived aswhere
Proof. Following (12) and (13), the detection error rate can be expressed as (17), shown at the top of the next page.
For , defining , we derive the first derivative of as . Similarly, we can derive the second derivative as . When , the first derivative of with respect to can be derived asWhen , the second derivative of with respect to can be derived asAccording to and the monotonicity of function , the minimum detection error rate at Willie is obtained at .
Using the same method, we can obtained that the minimum detection threshold and the corresponding minimum detection error rate for and are the same as those for . Hence, the optimal threshold that minimizes is . Substituting into (17), the desired can be obtained.
Corollary 1. For the SC/ZBF scheme, the minimum detection error rate increases with the increase of and .
Proof. From (16), for , is monotonic decreasing function of and is monotonic decreasing function of and , so or , .
Remark 1. The minimum detection error rate is a monotonic decreasing function of . This is because of is monotonic decreasing function of , and is monotonic increasing function of , so and .
4. Performance of Covert Communication
For the SC/ZBF scheme, the maximizing the effective covert rate subject to the constraint can be expressed aswhere .
4.1. Transmission Outage Probability from Alice to Bob
Theorem 3. A closed-form expression for the exact transmission outage probability of SC/ZFB is provided below:
Proof. If the transmission outage probability from Alice to Bob incurs, following (4), the probability can be represented asTo this end, substituting the PDF of into (23), the desired result can be derived.
Corollary 2. For the SC/ZBF scheme, the transmission outage probability decreases with the increase of and the increase of and increases with the increase of and R.
Proof. If gets bigger, gets smaller and , so gets smaller. Similarly, if gets bigger, gets smaller as R gets bigger.
Due to , gets smaller as gets bigger.
4.2. Optimal Transmission Power of Covert Information
Theorem 4. For a given transmission rate R and the covertness constraint , the optimal value for Alice transmission power of SC/ZFB is given bywhere is the solution of and is the solution of .
Proof. According to the minimum detection error rate and its proof process, it is easy to be obtained; for , is monotonically decreasing with respect to . Therefore, the optimal Alice transmission power is determined by , and (24) can be obtained by jointing (16).
4.3. Maximum Effective Covert Rate
Theorem 5. For the SC/ZFB scheme, the achievable maximum effective covert rate is given by
Proof. From (21), we haveBecause decreases with the increase of , so gets bigger, that is, is monotonic increasing function with respect to . Therefore, the maximum value of can maximize the value of , and should be satisfied. For , decreases with the increase of , so the maximum value of is determined by , i.e., . Substituting (24) into (26), (25) can be derived.
Corollary 3. For the SC/ZBF scheme, the maximum effective covert rate increases with the increase of , , , and .
Proof. From (24), for , is the monotonic increasing function of , and from (25), is the monotonic increasing function of , so is the monotonic increasing function of . Other contents can be proved similarly.
Corollary 4. For the SC/ZFB scheme, when the transmit power at Alice increases, the maximum effective covert rate approaches a fixed value R:
Proof. Following (25), as , and then, , so .
Remark 2. The maximum effective covert rate is the monotonic decreasing function of the channel noise . That is, the larger is, the smaller is.
5. Numerical Result
In this section, we present representative numerical results to verify the detection performance of Willie and the covert communication performance of the considered system. In our simulations, because the channel coefficients change independently from slot to slot, their values within a time slot remains constant; we set all the channel coefficients to 0 dB. Except for the necessary comparisons, channel noise values are also 0 dB, and set the number of antennas to 3 and the transmission rate R to 1.5, respectively.
Figure 2 shows the detection error rate at Willie versus for different values of and for the SC/ZFB scheme. In this figure, we first observe that is a monotonically increasing function of , and it is easy to understand that increases with . This is because the increase of interference power and antenna number of single antenna makes the total interference of Willie transmission larger. The total interference directly hinders the detection of Willie, resulting in the higher error rate of Willie. We also observe that is a monotonically decreasing function of , since a higher transmission power used by Alice increases the probability of being detected by Willie. This observation is also consistent with our earlier comments in Corollary 1.

Figure 3 depicts the transmission outage probability with different for the SC/ZFB scheme, decreases with the increase of . This is because an increase in will increase the SINR at Bob, making transmission more secure and less likely to interrupt. The relationship between and Bob’s channel noise is also described in Figure 3. increases with the increase of . This is because the SINR at Bob decreases with the increase of , which makes the transmission easy to interrupt. It can also be observed from Figure 3 that the higher the transmission rate, the easier the transmission to interrupt. These observations are consistent with those in Corollary 2.

It can be seen from Figure 4 that the maximum effective covert rate increases with the increase of interference power transmitted by a single antenna based on the SC/ZFB scheme. This is because the greater the interference power transmitted, the more error-prone Willie detection, which makes the effective covert rate greater. increases with the increase of and in SC/ZFB schemes. These are consistent with Corollary 3. In addition, Figure 4 shows that the maximum effective covert rate tends to a fixed value R, which verifies the correctness of Corollary 4.

6. Conclusion
In this paper, we have investigated the wireless covert communication network with the FD multiantenna receiver to achieve the convert performance by the generated randomly AN power of the selected antenna, and the analysis process of the covert performance was based on the detection performance of the warden. Our examinations showed that a higher positive effective covert rate can be ensured by controlling the number of antennas, and the AN power of the antenna is selected randomly by Bob. It can be expected that more multiantenna covert transmission schemes will be devised to achieve better covert performance in the future.
Data Availability
The data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by the National Natural Science Foundation of China, under Grant no. 62071486, the National Natural Science Foundation of Hunan Province, under Grant no. 2021JJ50051, and the Scientific Research Project of Education Department Hunan Province, China (nos. 19C0561 and 18C0531).