{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T19:40:27Z","timestamp":1722627627664},"reference-count":40,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Science Natural Foundation of China","award":["No. 61901502","No. 61971474","No. 62001517"]},{"name":"the Project of Space Engineering University","award":["No. 2020XXAQ01","No. 2019XXAQ05"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication. It both utilizes the advantages of the two systems and overcomes their shortcomings. However, security issues inevitably arise in the ISMTRN resulting from the broad coverage of the satellite beams and the openness of wireless communication. One of the promising methods to achieve secure transmission is covert communication technology, which has been a hot discussion topic in recent years. In this paper, we investigate the performance of covert communication in the ISMTRN with partial relay selection. Particularly, when the satellite transmits its signal to the user, we consider the scenario that the selected relay opportunistically sends covert information to the destination. Furthermore, the closed-form error detection probability and average covert communication rate are derived. Finally, numerical simulation results are provided to reveal the impact of critical parameters on system covert performance.<\/jats:p>","DOI":"10.3390\/s22155524","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T08:52:47Z","timestamp":1658739167000},"page":"5524","source":"Crossref","is-referenced-by-count":7,"title":["Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0815-9513","authenticated-orcid":false,"given":"Zeke","family":"Wu","sequence":"first","affiliation":[{"name":"School of Space Information, Space Engineering University, Beijing 101416, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3147-878X","authenticated-orcid":false,"given":"Rui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Space Information, Space Engineering University, Beijing 101416, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3970-9044","authenticated-orcid":false,"given":"Haifeng","family":"Shuai","sequence":"additional","affiliation":[{"name":"School of Space Information, Space Engineering University, Beijing 101416, China"}]},{"given":"Shibing","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Space Information, Space Engineering University, Beijing 101416, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5260-0794","authenticated-orcid":false,"given":"Changqing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Space Information, Space Engineering University, Beijing 101416, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/JIOT.2019.2943900","article-title":"Physical-layer security in space information networks: A survey","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"5129","DOI":"10.1109\/TVT.2020.2979496","article-title":"Physical layer security for multi-user satellite communication systems with threshold-based scheduling scheme","volume":"69","author":"Guo","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/LWC.2019.2924631","article-title":"On the performance of cache-enabled hybrid satellite-terrestrial relay networks","volume":"8","author":"An","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"7009","DOI":"10.1109\/JIOT.2020.3037408","article-title":"Auction-based multichannel cooperative spectrum sharing in hybrid satellite-terrestrial IoT networks","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/TCCN.2020.3016096","article-title":"Robust secure beam-forming for wireless powered cognitive satellite-terrestrial networks","volume":"7","author":"Lin","year":"2021","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.1109\/TVT.2021.3122029","article-title":"NOMA-based overlay cognitive integrated satellite-terrestrial relay networks with secondary network selection","volume":"71","author":"Liu","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"65275","DOI":"10.1109\/ACCESS.2018.2877709","article-title":"Relay selection for improving physical-layer security in hybrid satellite-terrestrial relay networks","volume":"6","author":"Cao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"154","DOI":"10.23919\/JCC.2019.12.012","article-title":"Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks","volume":"16","author":"Yan","year":"2019","journal-title":"China Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"55815","DOI":"10.1109\/ACCESS.2018.2872718","article-title":"Physical layer security for hybrid satellite terrestrial relay networks with joint relay selection and user scheduling","volume":"6","author":"Guo","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2718","DOI":"10.1109\/TAES.2019.2952698","article-title":"Performance analysis of integrated satellite-terrestrial multi-antenna relay networks with multi-user scheduling","volume":"56","author":"Huang","year":"2020","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_11","first-page":"34708","article-title":"Reliability and security performance analysis of hybrid satellite-terrestrial multi-relay systems with artificial noise","volume":"17","author":"Huang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","first-page":"118","article-title":"Secure data encryption based on quantum walks for 5G IoT scenario","volume":"9","author":"Mazurczyk","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/TCC.2019.2944367","article-title":"Forward secure public key encryption with keyword search for outsourced cloud storage","volume":"10","author":"Zeng","year":"2022","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5482","DOI":"10.1109\/ACCESS.2021.3139456","article-title":"6G networks physical layer security using RGB visible light communications","volume":"10","author":"Soderi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4917","DOI":"10.1109\/JIOT.2021.3119053","article-title":"A physical-layer key generation approach based on received signal strength in smart homes","volume":"9","author":"Zhao","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/MWC.103.2100283","article-title":"Physical layer anonymous precoding: The path to privacy-preserving communications","volume":"29","author":"Wei","year":"2022","journal-title":"IEEE Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Shi, W., Xu, W., You, X., Zhao, C., and Wei, K. (2022). Intelligent reflection enabling technologies for integrated and green Internet-of-Everything beyond 5G: Communication, sensing, and security. IEEE Wirel. Commun.","DOI":"10.1109\/MWC.018.2100717"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MCOM.002.2100972","article-title":"Toward multi-functional 6G wireless networks: Integrating sensing, communication, and security","volume":"60","author":"Wei","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/TWC.2021.3093722","article-title":"Fundamentals of physical layer anonymous communications: Sender detection and anonymous precoding","volume":"21","author":"Wei","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Simmons, G.J. (1984). The prisoners\u2019 problem and the subliminal channel. Advances in Cryptology, Springer.","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4766","DOI":"10.1109\/TWC.2018.2831217","article-title":"Covert communication achieved by a greedy relay in wireless networks","volume":"17","author":"Hu","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"4276","DOI":"10.1109\/TSP.2019.2928949","article-title":"Joint optimization of a UAV\u2019s trajectory and transmit power for covert communications","volume":"67","author":"Zhou","year":"2019","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1921","DOI":"10.1109\/JSAC.2013.130923","article-title":"Limits of reliable communication with low probability of detection on AWGN channels","volume":"31","author":"Bash","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3493","DOI":"10.1109\/TIT.2016.2548471","article-title":"Fundamental limits of communication with low probability of detection","volume":"62","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/TIT.2016.2530089","article-title":"Covert communication over noisy channels: A re-solvability perspective","volume":"62","author":"Bloch","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1109\/JSTSP.2015.2421477","article-title":"Achieving undetectable communication","volume":"9","author":"Lee","year":"2015","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/LCOMM.2016.2647716","article-title":"On covert communication with noise uncertainty","volume":"21","author":"He","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MWC.2017.1800070","article-title":"Covert wireless communications in IoT systems: Hiding information in interference","volume":"25","author":"Liu","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/LWC.2020.3033786","article-title":"Covert communication with relay selection","volume":"10","author":"Su","year":"2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"6313","DOI":"10.1109\/JIOT.2021.3051694","article-title":"Covert communication in relay-assisted IoT systems","volume":"8","author":"Gao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TCOMM.2012.032012.110430","article-title":"Amplify-and-forward relay selection with outdated channel estimates","volume":"60","author":"Michalopoulos","year":"2012","journal-title":"IEEE Trans. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"6193","DOI":"10.1109\/TWC.2017.2720736","article-title":"Covert communication in the presence of an uninformed jammer","volume":"16","author":"Sobers","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/LWC.2018.2872058","article-title":"Covert communication with the help of relay and channel uncertainty","volume":"8","author":"Wang","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"6286","DOI":"10.1109\/TWC.2014.2329682","article-title":"Performance of the multi-beam satellite return link with correlated rain attenuation","volume":"13","author":"Arnau","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_35","unstructured":"(2013). Prediction Procedure for the Evaluation of Interference between Stations on the Surface of the Earth at Frequencies above about 0.1 GHz (Standard No. ITU-R P.452-15)."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2604","DOI":"10.1109\/TAES.2018.2886611","article-title":"Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-Band","volume":"55","author":"An","year":"2019","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4031","DOI":"10.1109\/TVT.2014.2361832","article-title":"Dual-hop communication over a satellite relay and shadowed rician channels","volume":"64","author":"Miridakis","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_38","unstructured":"(2022, June 14). The Wolfram Function Site. Available online: http:\/\/functions.wolfram.com."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Brychkov, Y.A. (2008). Handbook of Special Functions: Derivatives, Integrals, Series and Other Formulas, Chapman Hall\/CRC Press.","DOI":"10.1201\/9781584889571"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3343","DOI":"10.1109\/JSYST.2019.2934358","article-title":"Ergodic capacity of NOMA-based uplink satellite networks with randomly deployed users","volume":"14","author":"Yan","year":"2020","journal-title":"IEEE Syst. J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5524\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T19:12:33Z","timestamp":1722625953000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":40,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["s22155524"],"URL":"https:\/\/doi.org\/10.3390\/s22155524","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,7,25]]}}}
  NODES