• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array

    2024-04-28 11:58:42MaYueMaRuiqianLinZhiYangWeiweiCaiYuemingMiaoChenWuWen
    China Communications 2024年4期

    Ma Yue ,Ma Ruiqian ,Lin Zhi ,Yang Weiwei ,Cai Yueming ,Miao Chen ,Wu Wen

    1 Key Laboratory of Near-Range RF Sensing ICs&Microsystems(NJUST),Ministry of Education,School of Electronic and Optical Engineering,Nanjing University of Science and Technology,Nanjing 210094,China

    2 College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China

    3 College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China

    Abstract: In this paper,the covert age of information (CAoI),which characterizes the timeliness and covertness performance of communication,is frist investigated in the short-packet covert communication with time modulated retrodirective array (TMRDA).Specifcially,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is suffciiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fxied block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI.

    Keywords: age of information;covert communication;retrodirective array;time modulation

    I.INTRODUCTION

    1.1 Background

    With the proliferation of wireless devices,ensuring secure communication has become increasingly critical,especially with the emergence of the Internet of Things(IoT)in various domains[1-5].While existing research on wireless communication security primarily focuses on protecting communication content from eavesdropping through encryption[6,7]and physical layer security (PLS) [8-12].However,there are situations where privacy of communication behavior is also important,necessitating the need for covert transmission of private messages.For instance,in scenarios such as military reconnaissance signaling in battlefeilds,private e-health signal transmission in public spaces,and confdiential fniancial data messaging,it is crucial to ensure not only the security of the transmitted information but also the covertness of the transmission behavior itself.

    Covert communication has emerged as a prominent communication technology and has attracted substantial research and application interest in recent decades[13].The history of covert communication can be traced back to the Cold War era,and with advancements in technology,it has found expanding applications in various domains including military,security,and the IoT [14].One of the key advantages of covert communication lies in its ability to provide higher levels of security compared to traditional secure communications methods[15].By operating under the surveillance,covert communication offers an additional layer of protection against detection [16].The pioneer work [17] was a groundbreaking study that unveiled the square root limit of covert transmission over an additive white gussian noise (AWGN)channel.After that signifciant progress has been made in the information theory of covert communication,researchers have extensively investigated various aspects of covert communication,including different channel models[14-16],different uncertainty sources[18-20],and multiple networks [21-24].To enhance the performance of covert communications,multiple antenna technology (MAT) [13,25] has been introduced and utilized via exploiting spatial degrees of freedom.However,this introduction also leads to an increased workload for pilot interaction,which may not be adaptable in situations with limited energy and high real-time requirements.The emergence of time modulated reconfgiurable array (TMRDA) [26] can potentially solve this problem.TMRDA enables the incident signal to be returned along its original path,facilitating automatic tracking and reducing the burden of multiple pilot interactions.On the other hand,in situations where delay is critical and energy resources are limited,it is more practical to adopt the short-packet communication [27].Against this background,in this work,we investigate the short-packet covert communication with TMRDA.

    1.2 Related Works

    A great research effort has been made in the covert communication by considering single antenna.In[28],channel inversion power control is adopted to achieve covert communications in Rayleigh fading wireless networks,where the location of transmitter can possibly be hidden from a warden.In [29],the aim is to enhance the timeliness of data collection subject to a covertness constraint in unmanned aerial vehicle (UAV)-aided IoT networks.In this scenario,a UAV is periodically engaged in wireless power transfer,charging an energy-constrained IoT device.Subsequently,the IoT device opportunistically sends its collected data to the UAV.In [30],the investigation of short-packet covert communication with transmission time uncertainty is conducted.The random subslot selection covert transmission scheme is proposed to ensure a higher level of communication covertness by leveraging the random transmission time.The research of short-packet covert communication in interweave cognitive radio networks is conducted in [31].In this scenario,the occasionally idle spectrum is opportunistically accessed by a secondary transmitter under the supervision of a primary transmitter.

    Nevertheless,it is important to acknowledge that single antenna system has room for improvement.It presents certain limitations in terms of diversity,security,capacity,and reliability,which should be taken into consideration when selecting a communication system for covert operations.To further enhance performance of covert communication,MAT has been introduced,offering signifciant beneftis such as considerable channel capacity,and robust reliability.MAT can enhance the received signal-to-noise ratio (SNR)[32] and can also be utilized to improve relay performance [33].In [34],the focus is on studying multiantenna aided covert communications in the presence of randomly located wardens and interferers.Both centralized and distributed antenna systems are taken into account in the investigation.Besides,two relay beamforming schemes in a multi-antenna relay network for enhanced communication covertness were proposed[35].Furthermore,Forouzeshet al.[36]employed MRT at Alice to exploit the null space and employ 3D beamforming,resulting in improved transmission performance.However,the use of MAT in covert communications typically necessitates accurate and perfect channel state information(CSI)[37],which introduce added complexity to the network design.Additionally,existing MAT employed in covert communication often involves multiple pilot interactions during the beam training phase,limiting their applicability in scenarios that prioritize strict delay and limited energy.

    Fortunately,TMRDA emerges as a promising technology with distinct advantages [26].In contrast to conventional methods,the transmitter does not require prior knowledge of the intended receivers’ location and does not rely on CSI,thereby facilitating automatic tracking and substantially reducing system complexity.In[38],the retrodirective frequency diversity array was proposed for secure IoT communications,as with TMRDA plays to the strengths of the retrospective formation.The value of TMRDA is particularly advantageous in unique scenarios such as battlefeild IoT,where the TMRDA is distinguished by its ability to automatically track the desired receiver in both range and angle directions.This implies that the transmitter does not need to possess any prior knowledge about the intended receiver’s location,and there is no necessity for CSI estimation at the transmitter.Nevertheless,despite the extensive capabilities offered by TMRDA,a state-of-the-art communication technology,there is still a limited understanding of the tactics and methodologies involved in achieving covert communication through TMRDA.

    It is worth mentioning that the block-length is always fniite in the practical scenarios,especially in the above mentioned delay-sensitive and energy-limited applications [39].By considering the covert communication with short-packet,it is more challenge for the warden to perform the correct detection due to the f-i nite observation samples.In [40],researchers examined the covert communication with random transmit power in the regime of fniite block-length.They determined the optimal transmit power and block-length that maximize the average effective covert throughput (AECT).Similarly,in [41],they focused on a covert mmWave communication system and studied the beam training duration,training power,and data transmission power that maximize the effective covert throughput.Furthermore,the authors analyzed the covertness performance with fniite block-length [42],considering both conventional and truncated channel inversion power control schemes to hide the transmitter’s location and communication behavior.In addition,the authors investigated covert communication aided by an intelligent reflecting surface [43],where the transmit power and reflect coeffciient were jointly designed to satisfy the block-length constraint.To quantify the timeliness of information transmission,AoI was defnied and introduced in [44].The AoI is a comprehensive metric that can be employed to quantify the information freshness in status updating systems and applications [45].In [46],the requirement of timeliness performance in covert communications was considered for the frist time.By utilizing artifciial noise generated from a full-duplex receiver,a covertness maximization problem was formulated under the constraint of average AoI to optimize the transmit probability of the information signal.In [47],an energy-effciient transmit probabilitypower control scheme was proposed for covert deviceto-device communication,in which average AoI was derived to characterize the freshness of status information.Recently,the covert information freshness in intelligent reflecting surface-aided communications is investigated in [48],and the block-length was optimized to get the improved covert channel quality.In [27],the optimal transmission design that jointly guarantees communication covertness and timeliness of short-packet communications is investigated.

    1.3 Motivation and Contributions

    In order to mitigate the overhead of multi-antenna pilot interaction,enable signal auto-tracking transmission,and reduce the complexity of MAT,TMRDA has been attracting increasing attention.The application scenarios of TMRDA involving battlefeild IoT and target auto-tracking,where sensors and transmitters should maintain low complexity.Additionally,short-packet communication is well-suited for sensor data transmission in IoT monitoring system[28],and the use of short-packets increases the warden’s uncertainty of its received signals,thereby further hiding the communication behavior and enhancing the covertness performance.However,there are fewer studies related to the evaluation of AoI performance in short-packet covert communication.It is worth mentioning that the timeliness is also an important aspect evaluating the performance of short-packet communication with TMRDA.Nevertheless,the evaluating framework of AoI in the short-packet covert communication with TMRDA needs to be further established and the influence of various parameters on the timeliness performance is unclear.Besides,the design of the parameters for improving the joint performance of covertness and timeliness needs to be further exploited.These factors motivate this work to reconsider the relationship between the communication covertness and timeliness and redesign the transmission.The innovation of this work can be summarized into three main points:

    1) We consider a short-packet covert communication system with TMRDA,where the back-haul is performed after that the transmitter receives the data.In order to guarantee the communication covertness,both the transmissions at the two phases are joint hidden against the detection of the warden.Besides,the TMRDA is optimally designed via the proposed Cuckoo Search (CS) algorithm,and thus the antenna gain to the legitimate node is enhanced while the side lobe level (SLL) is signifciantly suppressed.Moreover,considering the non-ideal conditions during the transmission,the impact of the BPE is also examined.

    2) Considering the worst-case scenarios for the covert communication with TMRDA,the stricter covertness constraint is derived based on the Kullback-Leibler(KL)divergence.Then,the analytical expression of covert age of information (CAoI) is derived,as a function of transmit power,block-length,and the antenna number of TMRDA.To facilitate the packet transmission design,the optimization problem of minimizing the CAoI is formulated,of which the transmit power and block-length are optimally determined.Our analysis demonstrates that there exist a non-trial tradeoff between the covertness and timeliness via optimizing the transmit power and block-length.

    3)The simulations are presented for obtaining more insights on the design of short-packet covert transmission with TMRDA.First,The results highlight the presence of an optimal block-length that achieves the minimum CAoI.Then,it is shown that the CAoI deteriorates as the beam pointing errors(BPE)of the TMRDA increases.Besides,as Bob’s transmit power increases,both the optimal block-length and the fxied block-length make the CAoI performance degrade,and the optimal block-length outperforms the fxied block-length in the interval,which demonstrates the effectiveness of the presented optimization scheme.Moreover,it is shown that the CAoI can be further enhanced by adopting a larger number of antennas at the TMRDA.

    Notations: The main symbols used in this paper are listed in Table 1.

    Table 1.List of main symbols.

    II.SYSTEM MODEL

    In this paper,we investigate a specifci communication scenario depicted in Figure 1,where a two-way covert communication is operated between Alice and Bob.Specifcially,when Bob generates a updated packet containsNbits,Bob covertly transmits it to Alice with a fniite block-length,and then Alice replies to Bob.Meanwhile,the warder Willie collects the signal samples and determines whether there exists the transmission or not.Figure 2 illustrates the frame structure of this communication scheme,which consists of two phases.In the frist phase,Bob sends pilot signal and covert information to Alice,and in the second phase,Alice transmits covert information to Bob.This unique scenario deviates from the conventional setup where Bob is an active participant,instead assuming a passive receiver.Such scenarios are commonly encountered in target tracking and battlefeild command applications,which introduces new models and challenges for covertness constraints and timeliness performance optimization.We assume that the blocklength isN.The wireless channels between nodes experience AWGN.Alice employs a TMRDA withMantennas,while both Bob and Willie are equipped with single-antenna systems.

    Figure 1.Covert communication with TMRDA.

    Figure 2.Frame structure of the TMRDA for covert communication.

    2.1 The Principle of TMRDA

    The structure of a TMRDA withMantennas is illustrated in Figure 3 (a).Each antenna is followed by a 1-bit switch [49] to achieve time modulation.An RF downconversion structure is employed to achieve phase conjugation.The incident signal passes through a downconversion mixer,resulting in an intermediate frequency (IF) signal that has the same frequency as the RF signal but with phase conjugation.This IF signal is then retransmitted through the antennas,thereby enabling retro-directivity.The signal processor serves two purposes in the system: 1) The signal processor controls the switching time of the switches in the TMRDA system.It determines when each switch should be turned on or off to achieve the desired time modulation pattern.By precisely controlling the switching time,the signal processor enables the array to steer the transmitted signal in a specifci direction for retrodirective functionality.2) the signal processor is responsible for processing the received signals.It performs necessary signal processing techniques such as demodulation,flitering,and decoding to extract the information embedded in the received signals.Subsequently,it generates the appropriate response or covert message to be transmitted back to the sender,Alice,in a covert manner.The array factor of a TMRDA withMelement can be expressed as

    Figure 3.(a)Proposed TMRDA for covert communication;(b)the time switching sequences.

    wherekrepresents the wavenumber,f0denotes the primary frequency,θis the incident direction of target in broadside,dis the space of array elements and it is assumed to be half of the wavelength.The time switching scheme in a periodTpis depicted in Figure 3(b),in which state“π”corresponds to a symbol of “-1”.Furthermore,the starting time of each “1”state and its duration arel ∈[1,L],respectively,while the starting time and duration of “-1”state isj ∈[1,J],respectively.Um(t)can be expressed as follows

    after the Fourier transform,Um(t)can be denoted as

    wherefp=1/Tpis the modulation frequency,am,his the Fourier series coeffciient ofh-th harmonic,which can be expressed as

    Then the array factor of the TMRDA can be formulated as follows

    By examining (2) to (5),it can be observed that a proper allocation of switching time allows for the design of TMRDA to generate an ideal radiation pattern,and no energy wastage occurs at the RF end.

    2.2 Legitimate Transmission

    The communication process between Alice and Bob begins with Bob sending a data packet to Alice,followed by Alice sending a response message.When Alice replies to Bob,the received signals at Bob can be expressed as

    wherexab[i]denotes the transmit signal form Alice to Bob,nab[i]~CN(0,σ2)represents the AWGN,σ2denotes the noise power,i=1,2,···,Nis the index of the channel use in one block,dabis the distance between Alice and Bob,θer=|θb-θi| is the BPE when signal transmitted form Alice to Bob,Pais the transmit power at Alice,the null hypothesisH0means that no transmission between Alice and Bob,andH1denotes that Alice transmits the signals to Bob.The SNR at Bob can be deduced as

    whereA(t)denotes the start time of last valid packet.It is worth mentioning that the AoI monotonously increases over time and is reset to zero only when a packet is successfully received at Bob.The average AoI represents the integrated area under the AoI curve,averaged over time.This metric signifeis the average duration during which Bob can covertly receive and successfully decode a packet.

    2.3 Detection Performance at Willie

    The signal from Alice to Willie is expressed as

    wherexaw[i]denotes the transmit signal form Alice to Bob,andnaw[i]~CN(0,σ2)represents the AWGN,θawis the angle between Alice and Willie,anddawis the distance between Alice and Willie.

    When Bob transmits,the received signals at Alice can be written as

    wherexba[i]denotes the transmit signal form Bob to Alice,dis the distance between Bob and Willie,Pbis the trbawnsmit power at Bob,naw[i]~CN(0,σ2)denotes the AWGN.

    The overall detection error probability can be expressed as follows:

    whereρ0denotes the prior probability that Alice does not transmit,ρ1denotes the prior probability that Alice transmits,andρ0+ρ1=1,PFAdenotes the false alarm probability,and PMDdenotes missed detection probability.

    This paper considers Willie has complete knowledge of the transmit powerP,block-lengthL,and prior transmission probabilityρ1.This extensive level of information enables Willie to utilize an optimal statistical hypothesis test,such as the likelihood ratio test(LRT),to discriminate between the null and alternative hypotheses.To achieve covert communication,it is necessary to satisfy[17]

    According to the Neyman-Pearson criterion,the optimal detection strategy for Willie is the LRT,which can be expressed as follows:

    where?denotes Kronecker product,IN×Nis unit matrix ofN×N,Srepresents the diagonal matrix and can be expressed as

    andUis the column vector that can be written as

    The covariance matrix of P0can be expressed as

    Then,the KL divergence can be obtained as follows

    where tr(·),dim(·),and |·| denotes the trace,determinant,and the dimension of the matrix,respectively.Besides,μ0=0 andμ1=0 are the mean vector of P0and P1.The following theorem outlines the covertness constraint for the TMRDA schemes.

    Theorem 1.In the model under consideration,the covertness constraint can be expressed as

    Proof.Typically,the received SNR is low in covert communications[51].Therefore,(18)can be rewritten using an inequality ln(1+x)≥x-x2/2,x ≥0,i.e.,

    The packet error probability of short-packet covert communication is given as[52]

    2.4 Covert Age of Information

    In this work,we assume that Alice periodically generates short-packets within a fxied interval,and the interval is set asT=N/W.However,she only opportunistically transmits these packets to maintain the covert nature of her wireless transmission behavior.Consequently,there is a possibility that some realtime packets may not be transmitted in a timely manner.In addition,the covert outage probabilityPcand packet error probabilityδcan result in the reception of invalid packets at Bob.Here,a valid packet refers to one that has been covertly transmitted and successfully decoded.The CAoI is defnied as the duration since the generation of the most recent valid packet at Alice.The average CAoI in an interval (0,τ) can be expressed as

    The CAoI measures the freshness of information when a packet is transmitted.As shown in Figure 4,the CAoI for thei-th valid packet can be expressed asbi-ai.Additionally,the time interval between theith andi+1-th packets is defnied as Ξi=bi+1-bi.Moreover,the sojourn time of thei-th packet is given bybi+1-ai.The closed-form solution for the CAoI in this system can be written as

    Figure 4.Covert age of information in TMRDA.

    whereWdenotes the bandwidth of the system,andProof.Given the presence ofQtime slots between thei-th andi+1-th valid packets,the frist-order moment of Ξiis calculated as follows:

    Then,the average arrival rate of valid packet can be written as

    Suppose the frist-order moment of interval time ΔTis

    Further,the second-order moment of interval time can be deduced as

    Utilizing the law of total probability,we can derive the second-order moment of Ξias presented in equation (28).In particular,part (a) of (28) arises from the independence between ΔTmand ΔTl.Additionally,in Figure 4,χirepresents the area of rectangular trapezoids.

    By substituting(25) and (29) into(22),we can obtain a closed-form expression for the average CAoI.

    It is worth noting that the covertness constraint can also be interpreted asPc ≤ε,wherePcrepresents the covert communication outage probability.This probability denotes the likelihood that the covertness constraint cannot be met.Based on(20),we can derive an upper bound forPc,which is expressed as(30).

    III.PROBLEM FORMULATION AND OPTIMIZATION

    In this section,we will introduce the optimization of the radiation pattern for TMRDA,as well as the optimization of CAoI.

    3.1 Optimization of TMRDA

    The ideal array pattern for TMRDA can be achieved by optimizing the switching time based on (5).To ensure that the results meet the desired requirements,optimization objectives are set in algorithms.For this study,the Cuckoo Search(CS)algorithm is chosen due to its superior performance compared to the particle swarm optimization algorithm and its relatively lower complexity[53].The steps of the algorithm is shown in Algorithm 1.It begins with initializing the timeswitching sequences,which undergo adjustments and are inputted into the ftiness function to compute their ftiness values throughout the iterative process.When the number of iterations falls below the designated value ofK,the Le′vy flight mechanism is utilized to explore the solution space while evaluating their ftiness.During this search process,any nest with a lower ftiness level is randomly replaced.As the iterations progress,poor solutions are pruned,and new ones are generated by the algorithm.Finally,the best solution is stored and evaluated.The ftiness function at thei-th step can be expressed as follows:

    wherehis the used harmonic for beamforming,ηidenotes system effciiency,andψddenote the optimized and desired SLL,?h,iand?drepresent the optimized and desired beamwidth,ciis the weighting factor and their sum is 1.

    3.2 Optimization of Average CAoI

    The block-lengthNplays a crucial role in determining the average CAoI.It is a signifciant factor which influence the packet error probability,delay,and covert outage probability.Therefore,considering the transmit powerPaand prior transmission probabilityρ,the optimization problem for minimizing the average CAoI can be formulated as

    According to the Theorem 1,c1can be further rewritten as (33) in next page.Then,we can obtain the following corollaries.

    Corollary 1.When a specific N is given,the optimal transmit powerthat maximizes the objective function is existed.

    Proof.According to (33),it can be observed that,given a certain value ofPband under the optimalN,a larger value ofPaleads to better average CAoI performance.In this case,a larger value ofPais preferred,and the optimal value can be calculated using the following expression

    Corollary 2.As>0,we are able to obtain the following inequation from corollary 1:

    Proof.According to (34),the expression inside the root sign must be positive,which can be written as

    subsequently(35)proved.

    The optimization of equation(32)can be further expressed as:

    From(37),it can be inferred that the fnial optimization problem can be tackled using one-dimensional search methods.

    IV.SIMULATION RESULTS

    4.1 Parameter Setting

    In this section,we frist validate the optimization of TMRDA radiation pattern.To ensure CAoI performance of TMRDA within a tolerable BPE range,the parameter?dis set to 4.2°as an acceptable BPE range[54].Referring to[53],the number of iterations of the CS algorithmKis set as 1000,and the number of antennaMis set as 16.The harmonic index is set ash=0,and the number of host nests in the CS algorithm is set asS=25.The number of time sequences status is set asL=50,and the SLL of optimized beam pattern isψd=-30 dB without prejudice to generality[26].

    Based on the performance of TMRDA and in conjunction with relevant reference[17,23],the following parameters are considered for the optimization of the system’s CAoI are set as follows: path attenuation isα=3,the distance between Alice and Bob,Alice and Willie,Bob and Willie aredab=40 m,daw=10 m,anddbw=20 m,respectively.Then the power of noise is set asσ2=-114 dBm,the bandwitdh of system isW=1 MHz,the angle between Alice and Willie isθaw=10°,the minimum and maximum of-length areNmin=100 andNmax=800,respectively.

    4.2 TMRDA Pattern Optimization

    Figure 5 (a) shows the optimized radiation pattern of TMRDA,where it can be observed that the SLL meets the design requirements,and the beamwidth achieves the desired value.Figure 5 (b) shows the switching time for above array pattern.In the next subsection,we will utilize this radiation pattern as a benchmark to optimize and evaluate the CAoI performance of TMRDA.

    Figure 5.(a)Optimized array pattern;(b)The switching sequences in a Tp (yellow means ”1” state,black means”π”state).

    4.3 Simulation of Average CAoI

    The simulation results in Figure 6 demonstrate that the CAoI initially decreases and then increases with varying values ofN.There exists an optimal value ofNthat leads to the best CAoI performance.Additionally based on Eq.(35),we set different values forPbin our simulations to observe the variations in CAoI.It can be found as the transmit powerPbincreases,the overall CAoI performance gradually deteriorates.

    Figure 6.Average CAoI versus N with ρ1=0.5.

    The simulation results in Figure 7 illustrate the variation of CAoI performance with respect to BPE for the optimal value ofN.It can be observed that as the BPE increases,the CAoI gradually increases and then sharply escalates.Ideally,the smaller the BPE the smaller the CAoI.In practical scenarios,the BPE is typically less than 3°[54],which satisfeis the minimum requirements for covert communication.

    Figure 7.Average CAoI versus BPE with optimal N and Pb=-18 dBm.

    Figure 8 shows that asγabincreases,the CAoI gradually improves,indicating that an increase inγabis advantageous for covert communication.Whenγabis less than-14.2 dB,a higher value ofρ1leads to better CAoI performance.On the other hand,whenγabis greater than -12.8 dB,a lower value ofρ1is preferred for improved CAoI performance.Figure 9 gives the change of CAoI versusε,it can be found that the greaterε,the better CAoI.Besides,smallerρ1means better CAoI.

    Figure 8.Average CAoI versus γab and Pb=-18 dBm.

    Figure 9.Average CAoI versus ε when Pb=-18 dBm.

    We further investigated the impact of the optimal block-length and fxied block-lengths on CAoI performance.As shown in Figure 10,it can be observed that as thePbincreases,the optimal block-length exhibits superior CAoI performance compared to various fxied block-lengths.

    Figure 10.Average CAoI versus Pb with fixed and optimal N.

    Lastly,the impact of the number of antennas in TMRDA on CAoI is explored.As the number of antennas increases,different beamforming algorithms exhibit varying effects.To quantitatively evaluate this impact,we select the conventional unidirectional phase center motion(UPCM)[55]as a benchmark for comparison.Additionally,to minimize the influence of side lobe levels,θawis set to 2°.Figure 11 represents the simulation results,demonstrating that with an increasing number of antennasM,the CAoI performance gradually improves.Meanwhile,it is observed that a smaller value ofρ1corresponds to better CAoI performance.However,the impact of differentρ1values on CAoI gradually diminishes asMincreases.

    Figure 11.Average CAoI versus M when Pb=-18 dBm.

    V.CONCLUSION

    In this paper,a novel antenna array,TMRDA,is frist introduced in the short-packet communication to achieve enhanced covertness and timeliness performance.Specifcially,the TMRDA is optimally designed via a CS algorithm to signifciantly suppress the side lobe gain against the warden.Then,the analytical expressions of the covertness constraint and CAoI were derived to characterize the joint performance involving timeliness and covertness.On the basis,the optimal transmit power and block-length were determined to minimize the CAoI.Our results showed that the CAoI with the optimized block-length is smaller than that with a fxied block-length,which demonstrates the effectiveness of the proposed design.Besides,the minimum CAoI deteriorates as the BPE enlarges,and it still can be improved by increasing the number of the antennas at TMRDA.In future work,this study will serve as a foundation for exploring and analyzing the impacts of various channel models on CAoI for short-packet covert communication with TMRDA.Additionally,further investigation will be conducted to explore different time modulation architectures in order to identify potential methods for enhancing covertness performance.

    天天添夜夜摸| 精品久久久久久久久久免费视频| 后天国语完整版免费观看| 日韩高清综合在线| 少妇裸体淫交视频免费看高清 | 999久久久国产精品视频| 精品福利观看| 国产免费男女视频| 99久久99久久久精品蜜桃| 丁香六月欧美| 人妻丰满熟妇av一区二区三区| 欧美中文综合在线视频| 高清毛片免费观看视频网站| 久久久国产精品麻豆| 亚洲精品粉嫩美女一区| 国产午夜精品久久久久久| 中文字幕人成人乱码亚洲影| 婷婷精品国产亚洲av在线| 国产欧美日韩一区二区三区在线| 欧美性长视频在线观看| 91老司机精品| 久久伊人香网站| 亚洲人成伊人成综合网2020| 一区在线观看完整版| 母亲3免费完整高清在线观看| 午夜福利,免费看| 欧美午夜高清在线| 波多野结衣av一区二区av| 此物有八面人人有两片| 亚洲成人免费电影在线观看| 变态另类成人亚洲欧美熟女 | 日本精品一区二区三区蜜桃| 亚洲精品国产一区二区精华液| 日韩有码中文字幕| 母亲3免费完整高清在线观看| av在线天堂中文字幕| 久久久精品欧美日韩精品| 成人亚洲精品一区在线观看| 欧美黄色片欧美黄色片| 国产在线观看jvid| 久久人人精品亚洲av| 99久久久亚洲精品蜜臀av| 免费在线观看影片大全网站| 老熟妇仑乱视频hdxx| 久久精品亚洲精品国产色婷小说| 成人18禁高潮啪啪吃奶动态图| 老司机午夜十八禁免费视频| 两性夫妻黄色片| 久久久久国内视频| av视频在线观看入口| 90打野战视频偷拍视频| 国产亚洲欧美在线一区二区| 91麻豆精品激情在线观看国产| 亚洲自拍偷在线| 久久人人精品亚洲av| 欧美乱码精品一区二区三区| 一级a爱片免费观看的视频| 国产人伦9x9x在线观看| 深夜精品福利| 一进一出抽搐动态| 日韩欧美免费精品| 国产精品自产拍在线观看55亚洲| 极品教师在线免费播放| 最近最新中文字幕大全免费视频| 亚洲黑人精品在线| av视频在线观看入口| 一边摸一边抽搐一进一小说| 制服诱惑二区| 99久久国产精品久久久| 国产精品秋霞免费鲁丝片| 在线av久久热| 午夜久久久在线观看| 丰满人妻熟妇乱又伦精品不卡| 亚洲欧洲精品一区二区精品久久久| 午夜久久久久精精品| 国产av一区在线观看免费| 天堂影院成人在线观看| 久久热在线av| 50天的宝宝边吃奶边哭怎么回事| 久久国产精品人妻蜜桃| 夜夜躁狠狠躁天天躁| 淫妇啪啪啪对白视频| 免费一级毛片在线播放高清视频 | 欧美老熟妇乱子伦牲交| 99国产精品免费福利视频| 国产午夜精品久久久久久| 大陆偷拍与自拍| 国内毛片毛片毛片毛片毛片| 亚洲精品中文字幕一二三四区| 久久久久九九精品影院| 国产极品粉嫩免费观看在线| 人人妻人人澡人人看| 热99re8久久精品国产| 欧美黄色淫秽网站| 伦理电影免费视频| 免费在线观看日本一区| 久久久久久久久中文| 美国免费a级毛片| 午夜日韩欧美国产| 9191精品国产免费久久| 天天一区二区日本电影三级 | 日本免费a在线| 日日干狠狠操夜夜爽| 免费看十八禁软件| 免费在线观看黄色视频的| 99久久精品国产亚洲精品| 欧美日韩亚洲国产一区二区在线观看| 在线播放国产精品三级| 黄片播放在线免费| 国产亚洲精品综合一区在线观看 | 男女下面进入的视频免费午夜 | 91精品国产国语对白视频| 丁香六月欧美| 国产精品亚洲美女久久久| 精品久久久久久成人av| 成熟少妇高潮喷水视频| 亚洲色图 男人天堂 中文字幕| 18禁裸乳无遮挡免费网站照片 | 亚洲视频免费观看视频| 久热这里只有精品99| 在线视频色国产色| 神马国产精品三级电影在线观看 | 国产色视频综合| 无人区码免费观看不卡| 久久久久久亚洲精品国产蜜桃av| 老司机福利观看| 久久人妻av系列| 色综合婷婷激情| 女性被躁到高潮视频| 亚洲一区中文字幕在线| 亚洲成人久久性| 丁香欧美五月| 亚洲少妇的诱惑av| 色在线成人网| 欧美激情 高清一区二区三区| 国产一区二区在线av高清观看| 欧美成人性av电影在线观看| 久久精品91无色码中文字幕| 别揉我奶头~嗯~啊~动态视频| 欧美成人免费av一区二区三区| 亚洲欧洲精品一区二区精品久久久| 九色国产91popny在线| 麻豆一二三区av精品| 亚洲av五月六月丁香网| 老汉色∧v一级毛片| 乱人伦中国视频| 搡老岳熟女国产| 色综合亚洲欧美另类图片| www.999成人在线观看| 久久精品人人爽人人爽视色| 欧美日韩乱码在线| 亚洲av熟女| 99在线视频只有这里精品首页| 两人在一起打扑克的视频| 少妇的丰满在线观看| 欧美中文综合在线视频| 国产精品电影一区二区三区| 欧美国产精品va在线观看不卡| 中文亚洲av片在线观看爽| 女人被躁到高潮嗷嗷叫费观| ponron亚洲| 亚洲国产精品999在线| 亚洲国产看品久久| 深夜精品福利| av在线天堂中文字幕| videosex国产| 日韩av在线大香蕉| 给我免费播放毛片高清在线观看| 无人区码免费观看不卡| 丰满人妻熟妇乱又伦精品不卡| 精品国内亚洲2022精品成人| 不卡av一区二区三区| 在线观看免费视频日本深夜| 久久人人97超碰香蕉20202| 亚洲国产看品久久| 久久久久久国产a免费观看| 啪啪无遮挡十八禁网站| 久久久久九九精品影院| 亚洲人成伊人成综合网2020| www国产在线视频色| 久久午夜综合久久蜜桃| 99久久99久久久精品蜜桃| 一级黄色大片毛片| 人人妻,人人澡人人爽秒播| 亚洲国产精品sss在线观看| 91麻豆精品激情在线观看国产| 国产精品精品国产色婷婷| 久久亚洲真实| 久99久视频精品免费| 免费久久久久久久精品成人欧美视频| 日韩欧美国产在线观看| 99国产精品99久久久久| 亚洲电影在线观看av| 亚洲第一av免费看| 视频区欧美日本亚洲| 69av精品久久久久久| 这个男人来自地球电影免费观看| 国产97色在线日韩免费| 国产成人av激情在线播放| 国产精品国产高清国产av| 午夜视频精品福利| 日韩欧美一区视频在线观看| 淫秽高清视频在线观看| 18禁裸乳无遮挡免费网站照片 | 亚洲精品国产精品久久久不卡| 日韩av在线大香蕉| 很黄的视频免费| 久久热在线av| 亚洲专区字幕在线| 99久久久亚洲精品蜜臀av| 丁香欧美五月| 变态另类丝袜制服| 中亚洲国语对白在线视频| 国内精品久久久久久久电影| 国内久久婷婷六月综合欲色啪| 好看av亚洲va欧美ⅴa在| 色婷婷久久久亚洲欧美| 黄色 视频免费看| 久久婷婷人人爽人人干人人爱 | 精品午夜福利视频在线观看一区| 日韩欧美在线二视频| 精品久久久精品久久久| 丝袜在线中文字幕| 久久久国产欧美日韩av| 天堂√8在线中文| 一级,二级,三级黄色视频| 夜夜夜夜夜久久久久| 午夜两性在线视频| 精品不卡国产一区二区三区| 女人高潮潮喷娇喘18禁视频| 精品乱码久久久久久99久播| 人成视频在线观看免费观看| 久久久久久亚洲精品国产蜜桃av| 高潮久久久久久久久久久不卡| 亚洲欧美精品综合一区二区三区| 欧美av亚洲av综合av国产av| 欧美日本中文国产一区发布| 精品国产乱码久久久久久男人| 禁无遮挡网站| 黄色片一级片一级黄色片| 亚洲avbb在线观看| 欧美乱色亚洲激情| 老熟妇仑乱视频hdxx| 欧美黑人精品巨大| 视频区欧美日本亚洲| 国产精品久久久久久人妻精品电影| 可以在线观看的亚洲视频| 中文字幕色久视频| 亚洲情色 制服丝袜| 日韩国内少妇激情av| 麻豆久久精品国产亚洲av| 啦啦啦免费观看视频1| 女性生殖器流出的白浆| 两性夫妻黄色片| 日韩欧美国产在线观看| 老司机在亚洲福利影院| 久久人人97超碰香蕉20202| 他把我摸到了高潮在线观看| 国产av精品麻豆| 99久久国产精品久久久| 国产精品一区二区免费欧美| 亚洲欧美精品综合一区二区三区| 精品久久久久久,| 免费在线观看完整版高清| av网站免费在线观看视频| 欧美丝袜亚洲另类 | 天天躁狠狠躁夜夜躁狠狠躁| 久久久久久国产a免费观看| 91国产中文字幕| www.精华液| 亚洲自偷自拍图片 自拍| 亚洲中文字幕一区二区三区有码在线看 | 午夜福利视频1000在线观看 | 国产乱人伦免费视频| 99国产极品粉嫩在线观看| 一区二区日韩欧美中文字幕| av在线天堂中文字幕| 久久香蕉激情| 精品午夜福利视频在线观看一区| 黄色毛片三级朝国网站| 国产成人欧美| 欧美老熟妇乱子伦牲交| 国产成人精品无人区| 欧美日韩一级在线毛片| 老司机福利观看| 9191精品国产免费久久| 妹子高潮喷水视频| 久久人人精品亚洲av| 99精品欧美一区二区三区四区| 一级,二级,三级黄色视频| 欧美黄色淫秽网站| 91在线观看av| 亚洲 国产 在线| 欧美日韩中文字幕国产精品一区二区三区 | 午夜免费观看网址| cao死你这个sao货| 精品久久久久久成人av| 老熟妇乱子伦视频在线观看| 亚洲精品一区av在线观看| 天堂动漫精品| 久久久久国内视频| 国产av一区在线观看免费| 亚洲最大成人中文| 在线视频色国产色| 国产精品自产拍在线观看55亚洲| 夜夜夜夜夜久久久久| 一本大道久久a久久精品| 自线自在国产av| 亚洲无线在线观看| 人人妻人人澡人人看| 国产精品电影一区二区三区| 麻豆久久精品国产亚洲av| 亚洲av成人av| 成年人黄色毛片网站| 美女扒开内裤让男人捅视频| 亚洲色图av天堂| 国产高清激情床上av| 免费观看人在逋| tocl精华| 亚洲在线自拍视频| 999久久久精品免费观看国产| 午夜福利,免费看| 国产欧美日韩一区二区精品| 一级毛片女人18水好多| 12—13女人毛片做爰片一| 88av欧美| 两性夫妻黄色片| 人妻丰满熟妇av一区二区三区| 悠悠久久av| 亚洲精品国产精品久久久不卡| 国内精品久久久久久久电影| 9191精品国产免费久久| 丁香欧美五月| av网站免费在线观看视频| 制服人妻中文乱码| 悠悠久久av| 精品久久久久久久毛片微露脸| av片东京热男人的天堂| 一本综合久久免费| 韩国精品一区二区三区| 精品久久久久久久毛片微露脸| 欧美日韩福利视频一区二区| 国产成人精品无人区| 在线观看日韩欧美| 日日爽夜夜爽网站| 日韩精品青青久久久久久| 亚洲人成77777在线视频| 国产精品亚洲av一区麻豆| 9热在线视频观看99| 亚洲第一青青草原| 在线观看日韩欧美| 搡老熟女国产l中国老女人| 国产在线观看jvid| 国产成人精品无人区| svipshipincom国产片| 亚洲精品在线美女| 国产精品一区二区三区四区久久 | 成人亚洲精品一区在线观看| 国内精品久久久久久久电影| 亚洲午夜理论影院| 91成人精品电影| 1024视频免费在线观看| 夜夜躁狠狠躁天天躁| 精品一区二区三区视频在线观看免费| 长腿黑丝高跟| 99久久精品国产亚洲精品| 又黄又爽又免费观看的视频| 岛国视频午夜一区免费看| 国产成人一区二区三区免费视频网站| 久久精品亚洲精品国产色婷小说| 男女做爰动态图高潮gif福利片 | 亚洲男人的天堂狠狠| 一级黄色大片毛片| 女性生殖器流出的白浆| 十分钟在线观看高清视频www| 美国免费a级毛片| 国产又色又爽无遮挡免费看| 老鸭窝网址在线观看| 精品第一国产精品| 97碰自拍视频| 亚洲七黄色美女视频| 精品久久久久久成人av| 一边摸一边做爽爽视频免费| 国产精品日韩av在线免费观看 | 动漫黄色视频在线观看| 亚洲久久久国产精品| 中文字幕人妻熟女乱码| 中文字幕高清在线视频| 亚洲国产看品久久| 制服诱惑二区| 国产亚洲精品综合一区在线观看 | 18禁裸乳无遮挡免费网站照片 | 国产精品久久久久久人妻精品电影| 亚洲天堂国产精品一区在线| 每晚都被弄得嗷嗷叫到高潮| 黄色视频,在线免费观看| 亚洲成国产人片在线观看| 亚洲精品一卡2卡三卡4卡5卡| 精品国产美女av久久久久小说| 可以在线观看的亚洲视频| 好看av亚洲va欧美ⅴa在| 久久精品aⅴ一区二区三区四区| 99riav亚洲国产免费| 亚洲欧美日韩高清在线视频| 人人妻人人澡欧美一区二区 | 精品国产国语对白av| 亚洲自拍偷在线| 一边摸一边抽搐一进一小说| 麻豆一二三区av精品| 成人三级黄色视频| 日韩高清综合在线| 国产精品野战在线观看| 久久人人精品亚洲av| 欧美成人一区二区免费高清观看 | 国产精品 欧美亚洲| 女人被躁到高潮嗷嗷叫费观| 少妇裸体淫交视频免费看高清 | 亚洲欧美日韩另类电影网站| 国产精品爽爽va在线观看网站 | 亚洲国产精品成人综合色| 国产成人啪精品午夜网站| 曰老女人黄片| 亚洲av成人不卡在线观看播放网| 天天躁夜夜躁狠狠躁躁| 天天躁夜夜躁狠狠躁躁| 女人爽到高潮嗷嗷叫在线视频| 精品第一国产精品| √禁漫天堂资源中文www| 老司机深夜福利视频在线观看| 国产一区在线观看成人免费| 中国美女看黄片| 中文字幕av电影在线播放| 午夜免费观看网址| 少妇粗大呻吟视频| 俄罗斯特黄特色一大片| 国内久久婷婷六月综合欲色啪| 亚洲一区二区三区色噜噜| av电影中文网址| 欧美日本中文国产一区发布| 制服人妻中文乱码| 啦啦啦免费观看视频1| 一区二区三区精品91| 国产亚洲精品综合一区在线观看 | 国产av一区在线观看免费| 成人特级黄色片久久久久久久| 亚洲九九香蕉| 啦啦啦观看免费观看视频高清 | 国内精品久久久久久久电影| 国产精品免费视频内射| 亚洲精品国产精品久久久不卡| 国产精品 欧美亚洲| 女人被躁到高潮嗷嗷叫费观| 香蕉丝袜av| 欧美大码av| 日韩精品免费视频一区二区三区| 国产欧美日韩一区二区精品| 久久精品国产综合久久久| 99热只有精品国产| 少妇的丰满在线观看| 亚洲精品国产区一区二| 欧美成人性av电影在线观看| 日日夜夜操网爽| 久久精品国产亚洲av香蕉五月| 非洲黑人性xxxx精品又粗又长| 夜夜看夜夜爽夜夜摸| 午夜亚洲福利在线播放| 亚洲天堂国产精品一区在线| 亚洲自拍偷在线| 母亲3免费完整高清在线观看| 丝袜美足系列| 久久精品aⅴ一区二区三区四区| 国产国语露脸激情在线看| 亚洲av五月六月丁香网| 视频区欧美日本亚洲| 天堂影院成人在线观看| 午夜免费成人在线视频| 制服诱惑二区| 9热在线视频观看99| 国内毛片毛片毛片毛片毛片| 黄色a级毛片大全视频| 欧美在线黄色| 操出白浆在线播放| 国产精品亚洲一级av第二区| 性色av乱码一区二区三区2| 国产成人免费无遮挡视频| 国产精品久久久久久精品电影 | 日本vs欧美在线观看视频| 黑人巨大精品欧美一区二区mp4| 黄片小视频在线播放| 欧美一级毛片孕妇| 久久人人97超碰香蕉20202| 国产色视频综合| 亚洲午夜精品一区,二区,三区| 久久久久久国产a免费观看| 亚洲第一电影网av| 久久国产精品男人的天堂亚洲| 日韩有码中文字幕| 久久久久久免费高清国产稀缺| 99国产精品一区二区蜜桃av| 色综合婷婷激情| 长腿黑丝高跟| 多毛熟女@视频| 亚洲国产精品sss在线观看| 免费在线观看黄色视频的| 国产精品亚洲一级av第二区| cao死你这个sao货| 美国免费a级毛片| 色综合站精品国产| 夜夜躁狠狠躁天天躁| 免费av毛片视频| 成人亚洲精品av一区二区| 国产男靠女视频免费网站| bbb黄色大片| 亚洲欧美日韩另类电影网站| 亚洲精品中文字幕一二三四区| 久久精品国产综合久久久| 一二三四社区在线视频社区8| av天堂久久9| 午夜影院日韩av| 非洲黑人性xxxx精品又粗又长| 黄网站色视频无遮挡免费观看| 狠狠狠狠99中文字幕| 精品国产国语对白av| 国产一区二区三区综合在线观看| 在线播放国产精品三级| av在线播放免费不卡| 日本vs欧美在线观看视频| 一进一出抽搐gif免费好疼| 桃红色精品国产亚洲av| 又紧又爽又黄一区二区| 日本 欧美在线| 女性被躁到高潮视频| 国内毛片毛片毛片毛片毛片| 男男h啪啪无遮挡| 亚洲精品国产精品久久久不卡| xxx96com| 免费av毛片视频| 亚洲av电影不卡..在线观看| 国产三级在线视频| 极品人妻少妇av视频| av天堂在线播放| 日本撒尿小便嘘嘘汇集6| 色哟哟哟哟哟哟| 制服诱惑二区| 妹子高潮喷水视频| 丝袜人妻中文字幕| 又紧又爽又黄一区二区| 又大又爽又粗| 午夜两性在线视频| 亚洲人成电影观看| 日本黄色视频三级网站网址| 国产精品久久视频播放| 亚洲国产精品合色在线| 日韩欧美免费精品| 91九色精品人成在线观看| 嫩草影院精品99| 精品久久久精品久久久| 大陆偷拍与自拍| 国产熟女xx| 亚洲欧美一区二区三区黑人| 又黄又粗又硬又大视频| 黄频高清免费视频| 不卡av一区二区三区| 极品教师在线免费播放| 麻豆一二三区av精品| 国产精品日韩av在线免费观看 | 久久婷婷人人爽人人干人人爱 | 一区福利在线观看| 精品久久久久久成人av| 久久精品aⅴ一区二区三区四区| 午夜福利成人在线免费观看| 在线观看一区二区三区| 99久久综合精品五月天人人| 丁香欧美五月| 少妇的丰满在线观看| 啦啦啦免费观看视频1| 精品午夜福利视频在线观看一区| 精品国产一区二区三区四区第35| www国产在线视频色| 国产一区在线观看成人免费| 久久伊人香网站| 亚洲视频免费观看视频| 久久人妻av系列| 一二三四社区在线视频社区8| 一级毛片女人18水好多| 国产一区二区激情短视频| 丝袜美足系列| 欧美激情高清一区二区三区| 少妇熟女aⅴ在线视频| 午夜亚洲福利在线播放| 亚洲va日本ⅴa欧美va伊人久久| 最近最新中文字幕大全免费视频| 老熟妇乱子伦视频在线观看| 久久精品91无色码中文字幕| 麻豆成人av在线观看| 久久九九热精品免费| 老熟妇仑乱视频hdxx| bbb黄色大片| 人人妻人人澡欧美一区二区 | 午夜精品国产一区二区电影| bbb黄色大片| 日本五十路高清| 老司机福利观看| 亚洲视频免费观看视频| 精品一区二区三区av网在线观看| 欧美激情极品国产一区二区三区| 国产成人免费无遮挡视频| 大陆偷拍与自拍| 色婷婷久久久亚洲欧美| 午夜福利在线观看吧| 亚洲精品在线美女| 国产麻豆成人av免费视频| 看黄色毛片网站| 日本免费a在线| 国产乱人伦免费视频|