This work investigates wireless covert communication in a multi-sensor asymmetric noise scenario. We adopt KL (Kullback-Leibler) divergence as the covertness constraint metric and mutual information as the transmission rate metric. To accurately approximate KL divergence and mutual information in covert communication, we employ the Taylor series expansion technique. Analytical expressions for KL divergence and mutual information in covert communication are derived, and we optimize the amplitude gain and phase angles based on these analytical expressions. Our findings underscore the importance of phase angle selection in covert communication within asymmetric noise systems. We propose an effective method for optimizing the transmission amplitude gain and phase angles in scenarios with asymmetric noise. Numerical results validate the effectiveness and superiority of our proposed method.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10857265 | PMC |
http://dx.doi.org/10.3390/s24030796 | DOI Listing |
PLoS One
January 2025
School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi, Vietnam.
The explosion of Internet-of-Thing enables several interconnected devices but also gives rise chance for unauthorized parties to compromise sensitive information through wireless communication systems. Covert communication therefore has emerged as a potential candidate for ensuring data privacy in conjunction with physical layer transmission to render two lines of defense. In this paper, we aim to enhance the individual transmission of nearby users in non-orthogonal multiple access (NOMA) systems under scenarios of an eavesdropper who monitors covert transmission before decoding covert information.
View Article and Find Full Text PDFPathologica
October 2024
Pathology Unit, Arcispedale Santa Maria Nuova, Azienda USL-IRCCS di Reggio Emilia, Reggio Emilia, Italy.
Objective: This study aimed to understand the dynamics of including Pathologists' Assistants in a surgical pathology department.
Methods: A qualitative ethnographic study employed covert participant observation and semi-structured interviews. Field notes and interview transcripts were descriptively analysed to identify categories.
PLoS One
January 2025
School of Public Policy and Administration, Carleton University, Ottawa, Canada.
Objective: Examine peer-reviewed scientific articles that used internal industry documents in the chemical sector to reveal corporate influence. Summarize sources of internal documents used in prior scientific papers to identify ongoing corporate strategies within the chemical field. Compare the corporate strategies identified in the chemical sector with the ones identified already identified in the pharmaceutical sector.
View Article and Find Full Text PDFData Brief
December 2024
Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks.
View Article and Find Full Text PDFBMC Public Health
December 2024
Hannover Medical School (MHH), Centre of Public Health, Department of Medical Psychology, Carl-Neuberg-Str. 1, Hannover, 30625, Germany.
Background: Zoonotic diseases are partly associated with pets. However, data is sparse on pet owners' compliance with preventive recommendations. Also, research focuses on self-reports, which are subject to overestimation biases, i.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!