Intelligent Covert Communication: Recent Advances and Future Research Trends

Zan Li, Jia Shi, Jiangbo Si, Lu Lv, Lei Guan, Benjian Hao, Zhuangzhuang Tie, Danyang Wang, Chengwen Xing, Tony Q.S. Quek

Engineering ›› 2025, Vol. 44 ›› Issue (1) : 101-111.

PDF(2155 KB)
PDF(2155 KB)
Engineering ›› 2025, Vol. 44 ›› Issue (1) : 101-111. DOI: 10.1016/j.eng.2024.12.007
Research
Review

Intelligent Covert Communication: Recent Advances and Future Research Trends

Author information +
History +

Abstract

With the future substantial increase in coverage and network heterogeneity, emerging networks will encounter unprecedented security threats. Covert communication is considered a potential enhanced security and privacy solution for safeguarding future wireless networks, as it can enable monitors to detect the transmitter’s transmission behavior with a low probability, thereby ensuring the secure transmission of private information. Due to its favorable security, it is foreseeable that covert communication will be widely used in various wireless communication settings such as medical, financial, and military scenarios. However, existing covert communication methods still present many challenges toward practical applications. In particular, it is difficult to guarantee the effectiveness of covert schemes based on the randomness of eavesdropping environments, and it is challenging for legitimate users to detect weak covert signals. Considering that emerging artificial-intelligence-aided transmission technologies can open up entirely new opportunities to address the above challenges, we provide a comprehensive review of recent advances and potential research directions in the field of intelligent covert communications in this work. First, the basic concepts and performance metrics of covert communications are introduced. Then, existing effective covert communication techniques in the time, frequency, spatial, power, and modulation domains are reviewed. Finally, this paper discusses potential implementations and challenges for intelligent covert communications in future networks.

Graphical abstract

Keywords

Covert communication / Artificial intelligence / Wireless security

Cite this article

Download citation ▾
Zan Li, Jia Shi, Jiangbo Si, Lu Lv, Lei Guan, Benjian Hao, Zhuangzhuang Tie, Danyang Wang, Chengwen Xing, Tony Q.S. Quek. Intelligent Covert Communication: Recent Advances and Future Research Trends. Engineering, 2025, 44(1): 101‒111 https://doi.org/10.1016/j.eng.2024.12.007

References

[1]
Bash BA, Goeckel D, Towsley D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J Sel Areas Comm 2013; 31(9):1921-1930.
[2]
Bash BA, Goeckel D, Towsley D, Guha S. Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun Mag 2015; 53(12):26-31.
[3]
Hellman ME. An overview of public key cryptography. IEEE Commun Mag 2002; 40(5):42-49.
[4]
Liu Y, Chen HH, Wang L. Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor 2017; 19(1):347-376.
[5]
Bash B, Goeckel D, Towsley D. Covert communication gains from adversary’s ignorance of transmission time. IEEE Trans Wirel Commun 2016; 15(12):8394-8405.
[6]
Lu X, Yan S, Yang W, Li M, Ng DWK. Covert communication with time uncertainty in time-critical wireless networks. IEEE Trans Wirel Commun 2023; 22(2):1116-1129.
[7]
Dani V, Ramaiyan V, Jalihal D. Covert communication over asynchronous channels with timing advantage. In: Proceedings of 2021 IEEE Information Theory Workshop; 2021 Oct 17–21; Kanazawa, Japan; 2021.
[8]
Polydoros A, Weber C. Detection performance considerations for direct-sequence and time-hopping LPI waveforms. IEEE J Sel Areas Commun 1985; 3(5):727-744.
[9]
Hu Y, Han S, Zhao H, Han Y, Xu J, Yang G. Extension of the covert performance evaluation system for underwater spread spectrum communication. In: Proceedings of 2023 3rd International Conference on Electronic Information Engineering and Computer (EIECT); 2023 Nov 17–19; Shenzhen, China; 2023.
[10]
Du J, Zhang Y, Chen G. Bionic covert hydroacoustic spread spectrum communication based on improved adaptive filtering algorithm. In: Proceedings of 2024 4th International Conference on Neural Networks, Information and Communication (NNICE); 2024 Jan 19–21; Guangzhou, China. IEEE; 2024. p.1244–9.
[11]
Ning B, Guan L, Huang H. A novel frequency-hopping sequence for covert communication. IEEE Access 2017; 5:20157-20163.
[12]
Torrieri D, Talarico S, Valenti MC. Analysis of a frequency-hopping millimeter-wave cellular uplink. IEEE Trans Wirel Commun 2016; 15(10):7089-7098.
[13]
Hui P, Guan L, Si J, Li Z, Zhao Z, Xu R. A power–frequency joint optimization frequency hopping strategy for covert communication. IEEE Commun Lett 2023; 27(2):452-456.
[14]
Zheng TX, Wang HM, Ng DWK, Yuan J. Multi-antenna covert communications in random wireless networks. IEEE Trans Wirel Commun 2019; 18(3):1974-1987.
[15]
Wang C, Li Z, Shi J, Ng DWK. Intelligent reflecting surface-assisted multi-antenna covert communications: joint active and passive beamforming optimization. IEEE Trans Commun 2021; 69(6):3984-4000.
[16]
Jamali MV, Mahdavifar H. Covert millimeter-wave communication: design strategies and performance analysis. IEEE Trans Wirel Commun 2022; 21(6):3691-3704.
[17]
Gao W, Chen Y, Han C, Chen Z. Distance-adaptive absorption peak modulation (DA-APM) for terahertz covert communications. IEEE Trans Wirel Commun 2021; 20(3):2064-2077.
[18]
Zhang Y, Zhang Y, Wang J, Xiao S, Tang W. Distance-angle beamforming for covert communications via frequency diverse array: toward two-dimensional covertness. IEEE Trans Wirel Commun 2023; 22(12):8559-8574.
[19]
Zhang Y, Zhang Y, Wang J, Xiao S, Ni W, Tang W. Robust beamfocusing for FDA-aided near-field covert communications with uncertain location. In: Proceedings of 2023 IEEE International Conference on Communications Workshops (ICC Workshops); 2023 May 28–Jun 1; Rome, Italy. IEEE; 2023. p.1349–54.
[20]
Hu J, Yan S, Zhou X, Shu F, Li J, Wang J. Covert communication achieved by a greedy relay in wireless networks. IEEE Trans Wirel Commun 2018; 17(7):4766-4779.
[21]
Shu F, Xu T, Hu J, Yan S. Delay-constrained covert communications with a full-duplex receiver. IEEE Wirel Commun Lett 2019; 8(3):813-816.
[22]
Shahzad K, Zhou X, Yan S, Hu J, Shu F, Li J. Achieving covert wireless communications using a full-duplex receiver. IEEE Trans Wirel Commun 2018; 17(12):8517-8530.
[23]
Tao L, Yang W, Yan S, Wu D, Guan X, Chen D. Covert communication in downlink NOMA systems with random transmit power. IEEE Wirel Commun Lett 2020; 9(11):2000-2004.
[24]
Shi X, Wu D, Yue C, Wan C, Guan X. Resource allocation for covert communication in D2D content sharing: a matching game approach. IEEE Access 2019; 7:72835-72849.
[25]
Yang L, Yang W, Xu S, Tang L, He Z. Achieving covert wireless communications using a full-duplex multi-antenna receiver. In: Proceedings of 2019 IEEE 5th International Conference on Computer and Communications (ICCC); 2019 Dec 6–9; Chengdu, China. IEEE; 2019. p. 912–6.
[26]
Yan S, Zhou X, Hu J, Hanly SV. Low probability of detection communication: opportunities and challenges. IEEE Wirel Commun 2019; 26(5):19-25.
[27]
Topal OA, Kurt GK. A countermeasure for traffic analysis attacks: covert communications with digital modulation. IEEE Wirel Commun Lett 2021; 10(2):441-445.
[28]
Ma S, Zhang Y, Sheng H, Li H, Shi J, Yang L, et al. Optimal probabilistic constellation shaping for covert communications. IEEE Trans Inf Forensics Security 2022; 17:3165-3178.
[29]
Mei L, Sha X, Zhang N. Covert communication based on waveform overlay with weighted fractional Fourier transform signals. In: Proceedings of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security; 2010 Jun 25–27; Beijing, China. IEEE; 2010. p. 472–5.
[30]
Zhou X, Yan S, Wu Q, Shu F, Ng DWK. Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint. IEEE Trans Wirel Commun 2022; 21(1):532-547.
[31]
Hu J, Wu Y, Chen R, Shu F, Wang J. Optimal detection of UAV’s transmission with beam sweeping in covert wireless networks. IEEE Trans Vehicular Technol 2019; 69(1):1080-1085.
[32]
Xie YA, Kang J, Niyato D, Van NTT, Luong NC, Liu Z. Securing federated learning: a covert communication-based approach. IEEE Netw 2023; 37(1):118-124.
[33]
Kim B, Erpek T, Sagduyu YE, Ulukus S. Covert communications via adversarial machine learning and reconfigurable intelligent surfaces. In: Proceedings of 2022 IEEE Wireless Communications and Networking Conference (WCNC); 2022 Apr 10–13; Austin, TX, USA. IEEE; 2022. p. 411–6.
[34]
Lu X, Hossain E, Shafique T, Feng S, Jiang H, Niyato D. Intelligent reflecting surface enabled covert communications in wireless networks. IEEE Netw 2020; 34(5):148-155.
[35]
Shi J, Yin Z, Tie Z, Hu J, Zhou Y, Liu C. Covert performance analysis for OTFS frame structure against sequential change-point detection. In: Proceedings of 2023 International Conference on Ubiquitous Communication; 2023 Jul 7–9; Xi'an, China. IEEE; 2023. p. 209–14.
[36]
Luong NC, Hoang DT, Gong S, Niyato D, Wang P, Liang YC, et al. Applications of deep reinforcement learning in communications and networking: a survey. IEEE Commun Surv Tutor 2019; 21(4):3133-3174.
[37]
Li Z, Shi J, Wang C, Wang D, Li X, Liao X. Intelligent covert communication design for cooperative cognitive radio network. China Commun 2023; 20(7):122-136.
[38]
Hu J, Lin Q, Yan S, Zhou X, Chen Y, Shu F. Covert transmission via integrated sensing and communication systems. IEEE Trans Vehicular Technol 2024; 73(3):4441-4446.
[39]
Huang KW, Wang HM, Towsley D, Poor HV. LPD communication: a sequential change-point detection perspective. IEEE Trans Commun 2020; 68(4):2474-2490.
[40]
Bhanot R, Hans R. A review and comparative analysis of various encryption algorithms. Int J Secur Its Appl 2015; 9(4):289-306.
[41]
Alenezi MN, Alabdulrazzaq H, Mohammad NQ. Symmetric encryption algorithms: review and evaluation study. Int J Commun Netw Inf Secur 2020; 12(2):256-272.
[42]
Wang D, Bai B, Zhao W, Han Z. A survey of optimization approaches for wireless physical layer security. IEEE Commun Surv Tutor 2019; 21(2):1878-1911.
[43]
Sun L, Du Q. Physical layer security with its applications in 5G networks: a review. China Commun 2017; 14(12):1-14.
[44]
Pickholtz RL, Milstein LB, Schilling DL. Spread spectrum for mobile communications. IEEE Trans Vehicular Technol 1991; 40(2):313-322.
[45]
Ramani V, Sharma SK. Cognitive radios: a survey on spectrum sensing, security and spectrum handoff. China Commun 2017; 14(11):185-208.
[46]
Li K, Sobers TV, Towsley D, Goeckel D. Covert communication in continuous-time systems in the presence of a jammer. IEEE Trans Wirel Commun 2022; 21(7):4883-4897.
[47]
Bai L, Xu J, Zhou L. Covert communication for spatially sparse mmWave massive MIMO channels. IEEE Trans Commun 2023; 71(3):1615-1630.
[48]
Daha MY, Rafferty J, Ashraf MI, Hadi MU. Artificial intelligence-enhanced signal detection technique for beyond fifth generation networks. Comput Electr Eng 2024; 119:109608.
[49]
Amuru SD, Tekin C, van M der Schaar, Buehrer RM. Jamming bandits—a novel learning method for optimal jamming. IEEE Trans Wirel Commun 2016; 15(4):2792-2808.
[50]
Zhao Y, Li Z, Cheng N, Wang W, Li C, Shen X. Covert localization in wireless networks: feasibility and performance analysis. IEEE Trans Wirel Commun 2020; 19(10):6549-6563.
AI Summary AI Mindmap
PDF(2155 KB)

Accesses

Citations

Detail

Sections
Recommended

/