{"id":"https://openalex.org/W3041535426","doi":"https://doi.org/10.1109/jiot.2020.3038682","title":"Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden","display_name":"Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden","publication_year":2020,"publication_date":"2020-11-17","ids":{"openalex":"https://openalex.org/W3041535426","doi":"https://doi.org/10.1109/jiot.2020.3038682","mag":"3041535426"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3038682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3038682","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2007.05502","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021302824","display_name":"Moslem Forouzesh","orcid":"https://orcid.org/0000-0002-3559-5994"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Moslem Forouzesh","raw_affiliation_strings":["Tarbiat Modares University, Tehran, Iran","Tarbiat Modares University"],"affiliations":[{"raw_affiliation_string":"Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]},{"raw_affiliation_string":"Tarbiat Modares University","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034801509","display_name":"Paeiz Azmi","orcid":"https://orcid.org/0000-0001-9736-3462"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Paeiz Azmi","raw_affiliation_strings":["Tarbiat Modares University, Tehran, Iran","Tarbiat Modares University"],"affiliations":[{"raw_affiliation_string":"Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]},{"raw_affiliation_string":"Tarbiat Modares University","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101661066","display_name":"Ali Kuhestani","orcid":"https://orcid.org/0000-0002-8184-3338"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]},{"id":"https://openalex.org/I4210157736","display_name":"Qom University of Technology","ror":"https://ror.org/04zepk655","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210157736"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Kuhestani","raw_affiliation_strings":["Faculty of Electrical and Computer Engineering, Qom University of Technology, Qom, Iran","Tarbiat Modares University"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, Qom University of Technology, Qom, Iran","institution_ids":["https://openalex.org/I4210157736"]},{"raw_affiliation_string":"Tarbiat Modares University","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064721659","display_name":"Phee Lep Yeoh","orcid":"https://orcid.org/0000-0002-2516-4226"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Phee Lep Yeoh","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia","University of Sydney"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"University of Sydney","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021302824"],"corresponding_institution_ids":["https://openalex.org/I1516879"],"apc_list":null,"apc_paid":null,"fwci":0.4159,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61300872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"8","issue":"9","first_page":"7170","last_page":"7181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.8244419097900391},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.768732488155365},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7261338233947754},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5930330753326416},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.536314070224762},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.5217098593711853},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.49628645181655884},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4851844906806946},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4691756069660187},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.45818108320236206},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44497668743133545},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.439943790435791},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3499472141265869},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.32511135935783386},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21513265371322632},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1410847306251526},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11089730262756348},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08160027861595154}],"concepts":[{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.8244419097900391},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.768732488155365},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7261338233947754},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5930330753326416},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.536314070224762},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.5217098593711853},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.49628645181655884},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4851844906806946},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4691756069660187},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.45818108320236206},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44497668743133545},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.439943790435791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3499472141265869},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.32511135935783386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21513265371322632},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1410847306251526},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11089730262756348},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08160027861595154},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/jiot.2020.3038682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3038682","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2007.05502","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2007.05502","pdf_url":"https://arxiv.org/pdf/2007.05502","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:3041535426","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2007.05502.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2007.05502","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2007.05502","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2007.05502","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2007.05502","pdf_url":"https://arxiv.org/pdf/2007.05502","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7872692562","display_name":null,"funder_award_id":"98020505","funder_id":"https://openalex.org/F4320322243","funder_display_name":"Iran National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322243","display_name":"Iran National Science Foundation","ror":"https://ror.org/03sr1ma14"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3041535426.pdf","grobid_xml":"https://content.openalex.org/works/W3041535426.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1967516555","https://openalex.org/W1970578484","https://openalex.org/W1996215314","https://openalex.org/W2025488327","https://openalex.org/W2043769961","https://openalex.org/W2065615867","https://openalex.org/W2093554016","https://openalex.org/W2098346479","https://openalex.org/W2103063389","https://openalex.org/W2109394932","https://openalex.org/W2112513314","https://openalex.org/W2133406100","https://openalex.org/W2151488545","https://openalex.org/W2302349451","https://openalex.org/W2506174538","https://openalex.org/W2557746379","https://openalex.org/W2566155463","https://openalex.org/W2598708957","https://openalex.org/W2792196893","https://openalex.org/W2796578942","https://openalex.org/W2893082680","https://openalex.org/W2896420513","https://openalex.org/W2903188535","https://openalex.org/W2906954590","https://openalex.org/W2910280139","https://openalex.org/W2949672874","https://openalex.org/W2954197931","https://openalex.org/W2963125781","https://openalex.org/W2963874728","https://openalex.org/W2964272961","https://openalex.org/W2964286662","https://openalex.org/W2965066985","https://openalex.org/W2987093331","https://openalex.org/W3000032937","https://openalex.org/W3001150855","https://openalex.org/W3009494512","https://openalex.org/W3010475607","https://openalex.org/W3028777793","https://openalex.org/W3102020296","https://openalex.org/W4250589301","https://openalex.org/W6743935292"],"related_works":["https://openalex.org/W3105644655","https://openalex.org/W2964054606","https://openalex.org/W3000752090","https://openalex.org/W2001283559","https://openalex.org/W2889325974","https://openalex.org/W2962872759","https://openalex.org/W2962922900","https://openalex.org/W1673670404","https://openalex.org/W2805462113","https://openalex.org/W2075593748","https://openalex.org/W2963601677","https://openalex.org/W2775272426","https://openalex.org/W3099267321","https://openalex.org/W2953001817","https://openalex.org/W2976081738","https://openalex.org/W3185729298","https://openalex.org/W2949109375","https://openalex.org/W3201949613","https://openalex.org/W1974130958","https://openalex.org/W2084796966"],"abstract_inverted_index":{"In":[0],"this":[1],"article,":[2],"we":[3,96,154,165,189],"investigate":[4],"joint":[5],"information-theoretic":[6],"secrecy":[7],"and":[8,27,35,50,55,142,176,202,210],"covert":[9,51,79,139],"communication":[10,140],"in":[11,42,118],"a":[12,17,36,138,143,161,223],"single-input-multioutput":[13],"(SIMO)":[14],"system":[15,169],"where":[16],"transmitter":[18],"(Alice)":[19],"is":[20,152,186],"communicating":[21],"with":[22,128],"two":[23],"legitimate":[24],"users":[25],"(Bob":[26],"Carol).":[28],"We":[29,123],"consider":[30,97,190],"that":[31,64,82,98,181,193,216],"an":[32,125],"untrusted":[33,74],"user":[34],"warden":[37,112],"node":[38],"are":[39,69,87],"also":[40,114],"present":[41],"the":[43,48,73,91,111,129,133,148,182,199,217,228],"network":[44],"attempting":[45],"to":[46,53,107,137,159,171,232],"attack":[47],"secure":[49,61,144],"communications":[52,62,80,145],"Bob":[54,59,209],"Carol,":[56],"respectively.":[57],"Specifically,":[58],"requires":[60,78],"such":[63,81],"his":[65],"messages":[66,84,102,117],"from":[67,85,110],"Alice":[68,86,99,174,194],"not":[70,88],"decoded":[71],"by":[72,90],"user,":[75],"while":[76,113],"Carol":[77,221],"her":[83],"detected":[89],"warden.":[92],"To":[93],"do":[94],"so,":[95],"transmits":[100],"Carol's":[101],"during":[103],"selected":[104],"time":[105,120],"slots":[106],"hide":[108],"them":[109],"transmitting":[115],"Bob's":[116],"each":[119],"slot":[121],"contentiously.":[122],"formulate":[124],"optimization":[126,150],"problem":[127,151],"aim":[130],"of":[131,198,208],"maximizing":[132],"average":[134,183,229],"rate":[135,185,230],"subject":[136],"requirement":[141],"constraint.":[146],"Since":[147],"proposed":[149,168],"nonconvex,":[153],"utilize":[155],"successive":[156],"convex":[157],"approximation":[158],"obtain":[160],"tractable":[162],"solution.":[163],"Moreover,":[164],"extend":[166],"our":[167],"model":[170],"multiple":[172],"antenna":[173],"scenario":[175],"find":[177],"beamforming":[178],"vectors":[179],"so":[180],"sum":[184],"maximized.":[187],"Furthermore,":[188],"practical":[191],"assumptions":[192],"has":[195,222],"imperfect":[196,203,218,233],"knowledge":[197],"warden's":[200],"location":[201],"channel":[204],"state":[205],"information":[206],"(CSI)":[207],"Carol.":[211],"Our":[212],"numerical":[213],"examples":[214],"highlight":[215],"CSI":[219,234],"at":[220,235],"more":[224],"detrimental":[225],"impact":[226],"on":[227],"compared":[231],"Bob.":[236]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
