Abstract
This paper addresses the power allocation problem in a network where joint information-theoretic secrecy and covert communication are required. In this network, a single transmitter (Alice) sends information to two legitimate users (Bob and Carol). There is also an untrusted user who attempts to detect the content of Bob’s message and a warden (Willie) who wants to detect the existence of communication between Alice and the two users. Thus, Carol requires covert transmission, and Bob requires secure and covert communication. The network utilizes a friendly jammer to address these demands and overcome the low transmission rate of covert communication. To achieve covert communication, Alice sends both users’ data simultaneously in selected time slots to hide it from Willie, while the jammer continuously transmits signals in all time slots. The objective is to maximize the average transmission rate over the allocated powers of Bob, Carol, and the jammer while meeting the two users’ requirements. A novel iterative algorithm is proposed to obtain an effective solution. Simulation results indicate that the proposed method can enhance the network’s average rate while satisfying the users’ demands.
-
Research ethics: Not applicable.
-
Informed consent: Not applicable.
-
Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.
-
Use of Large Language Models, AI and Machine Learning Tools: None declared.
-
Conflict of interest: The authors state no conflict of interest.
-
Research funding: None declared.
-
Data availability: Not applicable.
Appendix: Obtaining (15b) and (15c) from (13f)
By replacing θ op obtained from (11) in the constraint (13f) and according to (10), we have
By applying some mathematical operations, we will face the following formula for the constraint (13f):
Now, with the help of the auxiliary variable t = λ 2 − λ 1 and replacing it in the (25), this equation can be represented as
References
[1] C. S. R. Murthy and B. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, London, Pearson education, 2004.Search in Google Scholar
[2] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, Cambridge, Cambridge University Press, 2011.10.1017/CBO9780511977985Search in Google Scholar
[3] P. Angueira et al.., “A survey of physical layer techniques for secure wireless communications in industry,” IEEE Commun. Surv. Tutorials, vol. 24, no. 2, pp. 810–838, 2022, https://doi.org/10.1109/comst.2022.3148857.Search in Google Scholar
[4] Z. Yu, H. Gao, X. Cong, N. Wu, and H. H. Song, “A survey on cyber–physical systems security,” IEEE Internet Things J., vol. 10, no. 24, pp. 21670–21686, 2023, https://doi.org/10.1109/jiot.2023.3289625.Search in Google Scholar
[5] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975, https://doi.org/10.1002/j.1538-7305.1975.tb02040.x.Search in Google Scholar
[6] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert communications with a full-duplex receiver over wireless fading channels,” in 2018 IEEE International Conf. on Communications (ICC), Kansas City, MO, USA, IEEE, 2018, pp. 1–6.10.1109/ICC.2018.8422941Search in Google Scholar
[7] X. Chen et al.., “Covert communications: A comprehensive survey,” IEEE Commun. Surv. Tutorials, vol. 25, no. 2, pp. 1173–1198, 2023, https://doi.org/10.1109/comst.2023.3263921.Search in Google Scholar
[8] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert communication in the presence of an uninformed jammer,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 6193–6206, 2017, https://doi.org/10.1109/twc.2017.2720736.Search in Google Scholar
[9] J. An, B. Kang, Q. Ouyang, J. Pan, and N. Ye, “Covert communications meet 6g NTN: A comprehensive enabler for safety-critical IoT,” IEEE Network, vol. 38, no. 4, pp. 17–24, 2024, https://doi.org/10.1109/mnet.2024.3379864.Search in Google Scholar
[10] X. Li et al.., “Covert communication of STAR-RIS aided NOMA networks,” IEEE Trans. Veh. Technol., vol. 73, no. 6, pp. 9055–9060, 2024, https://doi.org/10.1109/tvt.2024.3349543.Search in Google Scholar
[11] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26–31, 2015, https://doi.org/10.1109/mcom.2015.7355562.Search in Google Scholar
[12] M. R. Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2334–2354, 2016, https://doi.org/10.1109/tit.2016.2530089.Search in Google Scholar
[13] M. Forouzesh, F. S. Khodadad, P. Azmi, A. Kuhestani, and H. Ahmadi, “Simultaneous secure and covert transmissions against two attacks under practical assumptions,” IEEE Internet Things J., vol. 10, no. 12, pp. 10160–10171, 2023.10.1109/JIOT.2023.3237640Search in Google Scholar
[14] S. F. Azerang, F. Samsami Khodadad, and M. Forouzesh, “Covert communication based on energy harvesting and cooperative jamming,” Wireless Networks, vol. 28, no. 8, pp. 3729–3738, 2022, https://doi.org/10.1007/s11276-022-03082-x.Search in Google Scholar
[15] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Robust power allocation in covert communication: Imperfect CDI,” IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 5789–5802, 2021, https://doi.org/10.1109/tvt.2021.3076709.Search in Google Scholar
[16] K. Shahzad, X. Zhou, and S. Yan, “Covert wireless communication in presence of a multi-antenna adversary and delay constraints,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12432–12436, 2019, https://doi.org/10.1109/tvt.2019.2948608.Search in Google Scholar
[17] M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,” IEEE Internet Things J., vol. 8, no. 9, pp. 7170–7181, 2021, https://doi.org/10.1109/jiot.2020.3038682.Search in Google Scholar
[18] B. Kang, N. Ye, and J. An, “Achieving positive rate of covert communications covered by randomly activated overt users,” IEEE Trans. Inf. Forensics Secur., vol. 20, pp. 2480–2495, 2025, https://doi.org/10.1109/tifs.2025.3544957.Search in Google Scholar
[19] B. Xia, Z. Xu, M. Wang, C. Chen, Y. Yao, and J. Wang, “Covert communications with a full-duplex receiver in the finite blocklength regime: Analysis and optimization,” IEEE Trans. Wireless Commun., vol. 23, no. 10, pp. 15409–15420, 2024, https://doi.org/10.1109/twc.2024.3429308.Search in Google Scholar
[20] R. Sun et al.., “On covert rate in full-duplex d2d-enabled cellular networks with spectrum sharing and power control,” IEEE Trans. Mobile Comput., vol. 23, no. 10, pp. 9931–9945, 2024, https://doi.org/10.1109/tmc.2024.3371377.Search in Google Scholar
[21] H. Xiao et al.., “Simultaneously transmitting and reflecting RIS (STAR-RIS) assisted multi-antenna covert communication: Analysis and optimization,” IEEE Trans. Wireless Commun., vol. 23, no. 6, pp. 6438–6452, 2023.10.1109/TWC.2023.3331706Search in Google Scholar
[22] J. Liu, G. Yang, Y. Liu, and X. Zhou, “RIS empowered near-field covert communications,” IEEE Trans. Wireless Commun., vol. 23, no. 10, pp. 15477–15492, 2024, https://doi.org/10.1109/twc.2024.3430328.Search in Google Scholar
[23] L. Hu et al.., “Ris-assisted integrated sensing and covert communication design,” IEEE Internet Things J., vol. 11, no. 9, pp. 16505–16516, 2024, https://doi.org/10.1109/jiot.2024.3354247.Search in Google Scholar
[24] H. Mao, X. Pi, L. Zhu, Z. Xiao, X.-G. Xia, and R. Zhang, “Sum rate maximization for movable antenna enhanced multiuser covert communications,” IEEE Wireless Commun. Lett., vol. 14, no. 3, pp. 611–615, 2025, https://doi.org/10.1109/lwc.2024.3514199.Search in Google Scholar
[25] H. ZivariFard and X. Wang, “Covert communication via action-dependent states,” IEEE Trans. Inf. Theory, vol. 71, no. 4, pp. 3100–3128, 2025, https://doi.org/10.1109/tit.2025.3534067.Search in Google Scholar
[26] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert communication using null space and 3d beamforming: Uncertainty of Willie’s location information,” IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8568–8576, 2020, https://doi.org/10.1109/tvt.2020.2997074.Search in Google Scholar
[27] S. Ma et al.., “Robust beamforming design for covert communications,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 3026–3038, 2021, https://doi.org/10.1109/tifs.2021.3071602.Search in Google Scholar
[28] X. He and A. Yener, “Two-hop secure communication using an untrusted relay: A case for cooperative jamming,” in IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conf., New Orleans, LA, USA, IEEE, 2008, pp. 1–5.10.1109/GLOCOM.2008.ECP.185Search in Google Scholar
© 2026 Walter de Gruyter GmbH, Berlin/Boston