{"title":"Design and Optimization on Covert Communication-Oriented Short Packet D2D","authors":"Xiaolong Zhang, Jie Liu, Liyu Zhi","doi":"10.1109/WCSP55476.2022.10039224","DOIUrl":null,"url":null,"abstract":"In this work, we investigate the relationship between the packet length and the prior probability by modeling the random generation process of short packets as a Poisson process in a D2D semantic communication scenario with monitors. Firstly, we derive closed expressions for the covert constraint, average bit error rate (ABER) and effective covert throughput (ECT) of the system. They reveal the trade-off relationships of packet length, power of cellular user and D2D pair transmission power on system covertness and effectiveness. Then, we consider optimizing the packet length, power of cellular network users and the transmission power of the D2D pair to maximize the effective covert throughput of the whole system. Finally, we find that the maximum packet length and the prior probability of 0.5 are not always optimal through numerical simulations.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP55476.2022.10039224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this work, we investigate the relationship between the packet length and the prior probability by modeling the random generation process of short packets as a Poisson process in a D2D semantic communication scenario with monitors. Firstly, we derive closed expressions for the covert constraint, average bit error rate (ABER) and effective covert throughput (ECT) of the system. They reveal the trade-off relationships of packet length, power of cellular user and D2D pair transmission power on system covertness and effectiveness. Then, we consider optimizing the packet length, power of cellular network users and the transmission power of the D2D pair to maximize the effective covert throughput of the whole system. Finally, we find that the maximum packet length and the prior probability of 0.5 are not always optimal through numerical simulations.