Covert Backscatter Communication in the Presence of Multi-antenna Eavesdropper

Yifan Zhang, Roberto Di Candia, Hüseyin Yiğitler, Riku Jantti, Zheng Yan

Research output: Contribution to journalArticleScientificpeer-review

22 Downloads (Pure)

Abstract

Covert communication promises a secure transmission mechanism for Backscatter Communication (BC) by hiding the transmission behavior of backscatter devices from potential eavesdroppers. This letter investigates the upper limit of the covert rate in a scenario where a multi-antenna eavesdropper is present in BC setup, considering the inherent structural reflection of a backscatter tag. Specifically, the transceiver can employ a Gaussian signal to illuminate the tag, with special considering two distinct signals: a modulated signal and an additional reflected signal from the tag’s antenna structure. This letter considers a powerful eavesdropper who is equipped with a massive antenna to enhance its ability to detect the tag’s transmission activities. The results reveal the presence of the square root law (Θ(√ n ) covert bits in n channel uses) across various scenarios. Theoretical analysis demonstrates the inhibitory effects of both the tag’s antenna structural reflection and the variance of the transceiver’s Gaussian signal on the eavesdropper’s detection capabilities. Furthermore, numerical results illustrate the impact of different parameters on the covertness of the system
Original languageEnglish
Pages (from-to)1770-1774
Number of pages5
JournalIEEE Communications Letters
Volume28
Issue number8
Early online date11 Jun 2024
DOIs
Publication statusPublished - 2024
MoE publication typeA1 Journal article-refereed

Keywords

  • Antenna arrays
  • Backscatter
  • Binary phase shift keying
  • Covert communication
  • Reflector antennas
  • Signal to noise ratio
  • Symbols
  • Wireless communication
  • backscatter communication
  • tag’s structural reflection
  • tags structural reflection

Fingerprint

Dive into the research topics of 'Covert Backscatter Communication in the Presence of Multi-antenna Eavesdropper'. Together they form a unique fingerprint.

Cite this