TY - JOUR AU1 - Doan, Thanh Binh AU2 - Nguyen, Tien-Hoa AB - 1 Introduction 1.1 Background and motivation Internet-of-Things (IoT), a new paradigm shift in wireless communication, has recently opened a new chapter for linking billions of devices across domains, where the widespread adoption of IoT devices yields several remarkable improvements in efficiency, automation, and data-driven decision-making. However, this raises critical concerns of security [1], covert communications [2], and reliability [3]. The main reason for these trends mainly stems from the design limitations of IoT devices in terms of computing power, processing power, and resilience, which makes their data transmission vulnerable to malicious attacks, such as jamming, poisoning, and denial-of-service (DoS) [1]. Especially, due to the simple encryption of communication data, any information transmitted by IoT nodes can be easily captured by eavesdroppers capable of strong processing capability through eavesdropping and monitoring actions. Even if traditional encryption methods can be used to challenge the eavesdropper’s decryption, sensitive information can still be revealed by analyzing metadata components, and a prime example of this is network traffic patterns [4]. Another example is in defence scenarios, where communications need to be both secure and covert, ensuring that even the existence of the communication is hidden from adversaries. Since traditional encryption methods fall short of providing this level of protection, transmitting data information over wireless open environments like IoT requires the new development of an efficient security approach aware of the privacy feature. On the other hand, providing reliable communication and high data rate transmission plays an important role in IoT networking developments. This facilitates IoT nodes with limited hardware to achieve stable connectivity and consistent communication quality in the context of dynamic situations such as channel conditions or fading phenomena. Among potential candidates, non-orthogonal multiple access (NOMA) technology is a promising choice for the next generation of IoT networks [5, 6], for its ability to enable multiple NOMA users to share the same time slots, frequency bands, and spreading codes by taking advantages of user signal superimposed in the power domain and successive-interference cancellation technique to separate the signals [7–9]. Accordingly, NOMA has been investigated in various scenarios of wireless transmissions. For example, in millimeter wave multiple-input multiple-output systems, the work in [10] considered finding the optimal random beamforming coefficients by minimizing the outage probability (OP) for NOMA users. The work in [11] proposed the use of space-time block coding schemes combined with NOMA to reduce communication overhead and latency. In [12], the authors employed random near-far NOMA pairing while optimizing the power allocation and beamforming coefficients to enhance the system performance. Another example of NOMA applications is in limited energy resources. For example, the work in [13] investigated the NOMA for cooperative IoT networks in the presence of co-channel interference. In [14], the authors investigated the functionality of NOMA combined with simultaneously transmitting and reflecting intelligent surface, along with analysis of the performance limits of OP and the tradeoffs between energy and rate as well as between energy and reliability. NOMA not only delivers fundamental benefits as mentioned above but also helps improve security and covert communication. For example, by dynamically managing power distribution and refining coding and decoding methods, NOMA can help reduce the risks of eavesdropping and illegal entities [15–18]. Especially in cases where a transmitter needs to communicate with a receiver without being detected by a warden, NOMA can leverage background noise in conjunction with inter-user interference (i.e., covert signal is encoded together with public or overt signal) to confuse the surveillance activity, thereby improving covert transmission [19–23]. 1.2 Literature review 1.2.1 Reliability aspect. The popularity of NOMA in improving transmission reliability for IoT networks has been demonstrated in several studies in recent years. For instance, a novel target power allocation (PA) approach for uplink NOMA-based IoT systems was proposed in [24], with an emphasis on the importance of the trade-off between sum rate and reliability in enhancing the overall performance. By generalizing the model proposed in [24] to cellular IoT networks, an adaptive rate NOMA scheme was introduced in [25] to enhance the IoT user capacity and reduce delay transmissions simultaneously. In [26], NOMA protocols were exploited as a bridge to connect cellular systems with IoT networks, allowing the former to have wide communication coverage to support cell-edge users and the latter to flexibly access licensed spectrum to enhance its quality-of-service. The efficacy of this shared communication protocol was confirmed through the analysis of OP. The benefit of the NOMA protocol in improving reliable communication was demonstrated in wirelessly powered cognitive radio paradigms [27], where the authors show that jointly optimizing user power distribution and energy harvesting time-switching factor can efficiently minimize the OP and maximize the system throughput. 1.2.2 Secure aspect. Similar to the reliability aspect, the research on NOMA with physical-layer security has also been explored in many eavesdropper contexts. For example, in [15], a joint power and beamforming design was proposed to deal with the issue of pairing untrusted near users with far users. In [16], the performance quality of terrestrial-integrated aerial IoT NOMA systems with the existence of aerial eavesdroppers was characterized by a secrecy outage probability (SOP) framework. To avoid the outage floor in a secured NOMA system with short-packet transmission, a novel PA strategy was developed in [17], along with analyses of trade-offs in security-efficiency and security-reliability. In [18], the authors analyzed the security performance of short-packet NOMA-IoT networks by deriving a secrecy rate formula. 1.2.3 Covert aspect. Several investigations have analyzed the prospect of NOMA in IoT systems from various covert communication perspectives. In [19], a covert NOMA scheme was introduced for cooperative device-to-device communication. This scheme focuses on characterizing the detection error probability (DEP) of the eavesdropper, followed by the finding of the minimal DEP as the worst-case scenario of the main system to lay the foundation for maximizing covert throughput. Inspired by this, the work in [20] proposed to enhance the covert throughput in downlink NOMA IoT systems by optimizing the PA policy under the constraints of the DEP and OP. Similarly, the work in [21] also focused on the same covert maximization problem in [20] but in light of the network’s uncertain channel state information. In [22], the authors examined the ergodic rate maximization by optimizing the power resource under the detection threshold constraint. The work in [23] designed a random artificial noise-based beamforming scheme to reduce the eavesdropping rate of the strong user while enhancing the covert communication rate. Very recently, the work in [28] presented a comprehensive analysis and optimization frameworks for the OP, SOP, and DEP performance of active reconfigurable repeater for NOMA systems in the context of IoTs. Despite the promise of NOMA in providing high-reliability transmission, secured communication services, and advanced covert transmission, very limited studies have explored enhancing covert communication quality in NOMA-based IoT systems through a joint assessment of reliability, security, and confidentiality. For example, the research in [15, 16, 18] provides solid mathematical frameworks for SOP, effective secrecy throughput, and effective secrecy rate but their correlation in enhancing the quality of the system has been not touched yet except for [17]. Similarly, the works in [19–23] mostly study how to derive the mathematical frameworks for the OP, DEP, and effective covert throughput, where only two investigations in [20, 21] take into consideration of both DEP and OP constraints to the covert throughput maximization. Likewise, the work in [28] investigated the analysis and optimization tasks for the OP, SOP, and DEP but in separate manners. 1.3 Novelty and contributions As discussed in Sections 1.1 and 1.2, given the potential nature of NOMA technology, it is apparent that the development of joint secure and confidential communication protocols to improve reliable transmission in IoT networks has not yet received sufficient attention. Therefore, increasing research efforts in this aspect is timely and necessary. To fill this important gap in the literature, we focus on jamming-assisted covert NOMA systems, where the covert signal of a nearby user is embedded with a public signal of the far user using NOMA transmission and a friendly jammer is deployed to confuse the surveillance of eavesdroppers. In this context, we start with a mathematical framework for evaluating key performance indicators of reliability, security and covertness to comprehensively observe the system characteristics. Then, we provide an optimization framework to enhance the quality of covert transmission in NOMA-based systems. In summary, the main contributions of this work include From the eavesdropper’s perspective, we derive the exact DEP expression for the surveillance situation. We then implement the lower-bound optimal DEP by considering the worst-case scenario where the eavesdropper can optimize his judgment threshold. This analysis will serve as an effective guideline for developing a covert communication design of the main system. By assuming that the eavesdropper is able to distinguish the covert signal from the overt signal through monitoring, we further quantify the exact and approximate closed-form expressions for the SOP in the eavesdropping situation. From the users’ perspective, we derive closed-form expressions for the covert and public OP as well as ergodic rate formulas. To gain insight into the impact of the transmitted signal-to-noise ratio (SNR) on users’ performance, we have also conducted the asymptotic OP and ergodic rate analyses. Building upon both user and eavesdropper behaviors, we formulate and address two problems of optimizing the NOMA power distribution to minimize covert OP and maximize covert ergodic rate under strict requirements of systems, where sub-optimal closed-form expressions for the PA coefficient are derived. By realizing our proposed optimization frameworks, the system can achieve triple goals simultaneously, including reliability, security, and covertness. Numerical results verify the correctness of the developed mathematical frameworks while demonstrating the proposed optimization frameworks in minimizing covert outage performance and maximizing the covert rate transmission, both following stringent requirements of reliability, security and covertness. 1.4 Structure of the paper The remaining structure of this work can be summarized as follows. We start with the system model description in Section 2, followed by Section 3 with detailed performance analysis, critical problems on providing effective covert communication design, and how to solve these problems. Section 4 provides numerical examples to validate the developed mathematical evaluation and optimization frameworks on the one hand as well as explore the impacts of system parameters on the other hand. Finally, we conclude the paper with Section 5. 1.1 Background and motivation Internet-of-Things (IoT), a new paradigm shift in wireless communication, has recently opened a new chapter for linking billions of devices across domains, where the widespread adoption of IoT devices yields several remarkable improvements in efficiency, automation, and data-driven decision-making. However, this raises critical concerns of security [1], covert communications [2], and reliability [3]. The main reason for these trends mainly stems from the design limitations of IoT devices in terms of computing power, processing power, and resilience, which makes their data transmission vulnerable to malicious attacks, such as jamming, poisoning, and denial-of-service (DoS) [1]. Especially, due to the simple encryption of communication data, any information transmitted by IoT nodes can be easily captured by eavesdroppers capable of strong processing capability through eavesdropping and monitoring actions. Even if traditional encryption methods can be used to challenge the eavesdropper’s decryption, sensitive information can still be revealed by analyzing metadata components, and a prime example of this is network traffic patterns [4]. Another example is in defence scenarios, where communications need to be both secure and covert, ensuring that even the existence of the communication is hidden from adversaries. Since traditional encryption methods fall short of providing this level of protection, transmitting data information over wireless open environments like IoT requires the new development of an efficient security approach aware of the privacy feature. On the other hand, providing reliable communication and high data rate transmission plays an important role in IoT networking developments. This facilitates IoT nodes with limited hardware to achieve stable connectivity and consistent communication quality in the context of dynamic situations such as channel conditions or fading phenomena. Among potential candidates, non-orthogonal multiple access (NOMA) technology is a promising choice for the next generation of IoT networks [5, 6], for its ability to enable multiple NOMA users to share the same time slots, frequency bands, and spreading codes by taking advantages of user signal superimposed in the power domain and successive-interference cancellation technique to separate the signals [7–9]. Accordingly, NOMA has been investigated in various scenarios of wireless transmissions. For example, in millimeter wave multiple-input multiple-output systems, the work in [10] considered finding the optimal random beamforming coefficients by minimizing the outage probability (OP) for NOMA users. The work in [11] proposed the use of space-time block coding schemes combined with NOMA to reduce communication overhead and latency. In [12], the authors employed random near-far NOMA pairing while optimizing the power allocation and beamforming coefficients to enhance the system performance. Another example of NOMA applications is in limited energy resources. For example, the work in [13] investigated the NOMA for cooperative IoT networks in the presence of co-channel interference. In [14], the authors investigated the functionality of NOMA combined with simultaneously transmitting and reflecting intelligent surface, along with analysis of the performance limits of OP and the tradeoffs between energy and rate as well as between energy and reliability. NOMA not only delivers fundamental benefits as mentioned above but also helps improve security and covert communication. For example, by dynamically managing power distribution and refining coding and decoding methods, NOMA can help reduce the risks of eavesdropping and illegal entities [15–18]. Especially in cases where a transmitter needs to communicate with a receiver without being detected by a warden, NOMA can leverage background noise in conjunction with inter-user interference (i.e., covert signal is encoded together with public or overt signal) to confuse the surveillance activity, thereby improving covert transmission [19–23]. 1.2 Literature review 1.2.1 Reliability aspect. The popularity of NOMA in improving transmission reliability for IoT networks has been demonstrated in several studies in recent years. For instance, a novel target power allocation (PA) approach for uplink NOMA-based IoT systems was proposed in [24], with an emphasis on the importance of the trade-off between sum rate and reliability in enhancing the overall performance. By generalizing the model proposed in [24] to cellular IoT networks, an adaptive rate NOMA scheme was introduced in [25] to enhance the IoT user capacity and reduce delay transmissions simultaneously. In [26], NOMA protocols were exploited as a bridge to connect cellular systems with IoT networks, allowing the former to have wide communication coverage to support cell-edge users and the latter to flexibly access licensed spectrum to enhance its quality-of-service. The efficacy of this shared communication protocol was confirmed through the analysis of OP. The benefit of the NOMA protocol in improving reliable communication was demonstrated in wirelessly powered cognitive radio paradigms [27], where the authors show that jointly optimizing user power distribution and energy harvesting time-switching factor can efficiently minimize the OP and maximize the system throughput. 1.2.2 Secure aspect. Similar to the reliability aspect, the research on NOMA with physical-layer security has also been explored in many eavesdropper contexts. For example, in [15], a joint power and beamforming design was proposed to deal with the issue of pairing untrusted near users with far users. In [16], the performance quality of terrestrial-integrated aerial IoT NOMA systems with the existence of aerial eavesdroppers was characterized by a secrecy outage probability (SOP) framework. To avoid the outage floor in a secured NOMA system with short-packet transmission, a novel PA strategy was developed in [17], along with analyses of trade-offs in security-efficiency and security-reliability. In [18], the authors analyzed the security performance of short-packet NOMA-IoT networks by deriving a secrecy rate formula. 1.2.3 Covert aspect. Several investigations have analyzed the prospect of NOMA in IoT systems from various covert communication perspectives. In [19], a covert NOMA scheme was introduced for cooperative device-to-device communication. This scheme focuses on characterizing the detection error probability (DEP) of the eavesdropper, followed by the finding of the minimal DEP as the worst-case scenario of the main system to lay the foundation for maximizing covert throughput. Inspired by this, the work in [20] proposed to enhance the covert throughput in downlink NOMA IoT systems by optimizing the PA policy under the constraints of the DEP and OP. Similarly, the work in [21] also focused on the same covert maximization problem in [20] but in light of the network’s uncertain channel state information. In [22], the authors examined the ergodic rate maximization by optimizing the power resource under the detection threshold constraint. The work in [23] designed a random artificial noise-based beamforming scheme to reduce the eavesdropping rate of the strong user while enhancing the covert communication rate. Very recently, the work in [28] presented a comprehensive analysis and optimization frameworks for the OP, SOP, and DEP performance of active reconfigurable repeater for NOMA systems in the context of IoTs. Despite the promise of NOMA in providing high-reliability transmission, secured communication services, and advanced covert transmission, very limited studies have explored enhancing covert communication quality in NOMA-based IoT systems through a joint assessment of reliability, security, and confidentiality. For example, the research in [15, 16, 18] provides solid mathematical frameworks for SOP, effective secrecy throughput, and effective secrecy rate but their correlation in enhancing the quality of the system has been not touched yet except for [17]. Similarly, the works in [19–23] mostly study how to derive the mathematical frameworks for the OP, DEP, and effective covert throughput, where only two investigations in [20, 21] take into consideration of both DEP and OP constraints to the covert throughput maximization. Likewise, the work in [28] investigated the analysis and optimization tasks for the OP, SOP, and DEP but in separate manners. 1.2.1 Reliability aspect. The popularity of NOMA in improving transmission reliability for IoT networks has been demonstrated in several studies in recent years. For instance, a novel target power allocation (PA) approach for uplink NOMA-based IoT systems was proposed in [24], with an emphasis on the importance of the trade-off between sum rate and reliability in enhancing the overall performance. By generalizing the model proposed in [24] to cellular IoT networks, an adaptive rate NOMA scheme was introduced in [25] to enhance the IoT user capacity and reduce delay transmissions simultaneously. In [26], NOMA protocols were exploited as a bridge to connect cellular systems with IoT networks, allowing the former to have wide communication coverage to support cell-edge users and the latter to flexibly access licensed spectrum to enhance its quality-of-service. The efficacy of this shared communication protocol was confirmed through the analysis of OP. The benefit of the NOMA protocol in improving reliable communication was demonstrated in wirelessly powered cognitive radio paradigms [27], where the authors show that jointly optimizing user power distribution and energy harvesting time-switching factor can efficiently minimize the OP and maximize the system throughput. 1.2.2 Secure aspect. Similar to the reliability aspect, the research on NOMA with physical-layer security has also been explored in many eavesdropper contexts. For example, in [15], a joint power and beamforming design was proposed to deal with the issue of pairing untrusted near users with far users. In [16], the performance quality of terrestrial-integrated aerial IoT NOMA systems with the existence of aerial eavesdroppers was characterized by a secrecy outage probability (SOP) framework. To avoid the outage floor in a secured NOMA system with short-packet transmission, a novel PA strategy was developed in [17], along with analyses of trade-offs in security-efficiency and security-reliability. In [18], the authors analyzed the security performance of short-packet NOMA-IoT networks by deriving a secrecy rate formula. 1.2.3 Covert aspect. Several investigations have analyzed the prospect of NOMA in IoT systems from various covert communication perspectives. In [19], a covert NOMA scheme was introduced for cooperative device-to-device communication. This scheme focuses on characterizing the detection error probability (DEP) of the eavesdropper, followed by the finding of the minimal DEP as the worst-case scenario of the main system to lay the foundation for maximizing covert throughput. Inspired by this, the work in [20] proposed to enhance the covert throughput in downlink NOMA IoT systems by optimizing the PA policy under the constraints of the DEP and OP. Similarly, the work in [21] also focused on the same covert maximization problem in [20] but in light of the network’s uncertain channel state information. In [22], the authors examined the ergodic rate maximization by optimizing the power resource under the detection threshold constraint. The work in [23] designed a random artificial noise-based beamforming scheme to reduce the eavesdropping rate of the strong user while enhancing the covert communication rate. Very recently, the work in [28] presented a comprehensive analysis and optimization frameworks for the OP, SOP, and DEP performance of active reconfigurable repeater for NOMA systems in the context of IoTs. Despite the promise of NOMA in providing high-reliability transmission, secured communication services, and advanced covert transmission, very limited studies have explored enhancing covert communication quality in NOMA-based IoT systems through a joint assessment of reliability, security, and confidentiality. For example, the research in [15, 16, 18] provides solid mathematical frameworks for SOP, effective secrecy throughput, and effective secrecy rate but their correlation in enhancing the quality of the system has been not touched yet except for [17]. Similarly, the works in [19–23] mostly study how to derive the mathematical frameworks for the OP, DEP, and effective covert throughput, where only two investigations in [20, 21] take into consideration of both DEP and OP constraints to the covert throughput maximization. Likewise, the work in [28] investigated the analysis and optimization tasks for the OP, SOP, and DEP but in separate manners. 1.3 Novelty and contributions As discussed in Sections 1.1 and 1.2, given the potential nature of NOMA technology, it is apparent that the development of joint secure and confidential communication protocols to improve reliable transmission in IoT networks has not yet received sufficient attention. Therefore, increasing research efforts in this aspect is timely and necessary. To fill this important gap in the literature, we focus on jamming-assisted covert NOMA systems, where the covert signal of a nearby user is embedded with a public signal of the far user using NOMA transmission and a friendly jammer is deployed to confuse the surveillance of eavesdroppers. In this context, we start with a mathematical framework for evaluating key performance indicators of reliability, security and covertness to comprehensively observe the system characteristics. Then, we provide an optimization framework to enhance the quality of covert transmission in NOMA-based systems. In summary, the main contributions of this work include From the eavesdropper’s perspective, we derive the exact DEP expression for the surveillance situation. We then implement the lower-bound optimal DEP by considering the worst-case scenario where the eavesdropper can optimize his judgment threshold. This analysis will serve as an effective guideline for developing a covert communication design of the main system. By assuming that the eavesdropper is able to distinguish the covert signal from the overt signal through monitoring, we further quantify the exact and approximate closed-form expressions for the SOP in the eavesdropping situation. From the users’ perspective, we derive closed-form expressions for the covert and public OP as well as ergodic rate formulas. To gain insight into the impact of the transmitted signal-to-noise ratio (SNR) on users’ performance, we have also conducted the asymptotic OP and ergodic rate analyses. Building upon both user and eavesdropper behaviors, we formulate and address two problems of optimizing the NOMA power distribution to minimize covert OP and maximize covert ergodic rate under strict requirements of systems, where sub-optimal closed-form expressions for the PA coefficient are derived. By realizing our proposed optimization frameworks, the system can achieve triple goals simultaneously, including reliability, security, and covertness. Numerical results verify the correctness of the developed mathematical frameworks while demonstrating the proposed optimization frameworks in minimizing covert outage performance and maximizing the covert rate transmission, both following stringent requirements of reliability, security and covertness. 1.4 Structure of the paper The remaining structure of this work can be summarized as follows. We start with the system model description in Section 2, followed by Section 3 with detailed performance analysis, critical problems on providing effective covert communication design, and how to solve these problems. Section 4 provides numerical examples to validate the developed mathematical evaluation and optimization frameworks on the one hand as well as explore the impacts of system parameters on the other hand. Finally, we conclude the paper with Section 5. 2 System model description As depicted in Fig 1, we consider a downlink NOMA system, where source information communicates with two users, one covert near user and one public far user , by NOMA signaling under the surveillance of an eavesdropper who can be an idle user or potential eavesdropping candidate. 0.5 < ρ < 1 is the PA factor while x1 and x2 represent the intended signals of and , respectively, such that and . A jammer () is deployed to support main channel communication by continuously generating artificial noise xja with power pj to degrade the quality of , and xja is shared for users, with . In this investigation, both and are assumed to know the channel state information (CSI) from and to themselves, enabling them to remove the jamming signal detection from the received signal, then subtract this jamming component, and finally decode their information signal. This CSI can be obtained via uplink pilot training while the absence of channel feedback results in only obtaining the statistical CSI of . We focus on the scenario performs two phases of detection and decoding processes to determine whether transmits a signal to and then goes into decoding ’s signal if it is detected. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 1. A downlink NOMA system: One source, one jammer, a pair of NOMA users, and one eavesdropper. https://doi.org/10.1371/journal.pone.0317289.g001 Accordingly, to better enhance its physical layer security performance, let us go into the details of communication characteristics at , , and . Denote by is the channel of links from node to node , and it follows Rayleigh fading distribution with scale parameter . Thus, the Probability Density Functions (PDF) and Cumulative Distribution Functions (CDF) of the channel gain can be, respectively, modeled as in [9, Eqs. (13) and (14)] as (1) (2) Given the transmit power ps by , the signal received at under the additive white Gaussian noise (AWGN) can be rewritten as (3) Due to a smaller power level allocated, decodes his signal by performing the successive-interference cancellation (SIC) process to subtract the decoded signal x2 from the received signal and then decode x1 under perfect SIC assumption. The achievable rates of decoding x2 and x1 at can be respectively written as (4) where presents the average transmit signal-to-noise ratio (SNR). As an unauthorized entity, has no information regarding x1, and thus, a radiometer is employed with two hypotheses to determine the existence of x1: h1 (true—the existence of x1) and h0 (false—the none of x1). Thus, the signal observed at can be classified into (5) Denote by d1 and d0 the respective decisions of events h1 and h0, and ζ is the judgment threshold for deciding whether h1 or h0. Suppose that is able to successfully detect x1; and thus, the achievable rate of decoding x1 at can be expressed as (6) From the aforementioned above, we next turn to explore the performance behaviour of monitoring and eavesdropping activities and then establish an appropriate strategy to enhance the system’s covert performance in the following section. 3 Performance analysis, problem statement, and solution This section first analyzes the performance of detecting x1 and intercepting x1 at , then formulate the strategies to enhance the system performance, and finally provide the corresponding efficient solutions. 3.1 Performance analysis In the context of performance analysis, achieving closed-form expressions in wireless performance analysis helps provide simplified and exact representations of complex relationships, enabling quick and efficient evaluations of performance metrics, and offering deep insights into the system behaviour without extensive simulations. This is because such closed-form expressions can be readily programmable by common package software like Matlab, mathematical, and Maple. As such, one can evaluate specific scenarios of network deployments by replacing input parameters before using them for online implementations. Therefore, in this study, we will analyze the system performance by first deriving closed-form expressions for the DEP, SOP, OP, and rate metrics. 3.1.1 Monitoring analysis. To have the best knowledge on the behaviour of monitoring x1 at for improving the security transmission at the physical layer, this subsection will analyze the DEP in the role of an eavesdropper. This is because the DEP metric will reflect the level of error probability that the eavesdropper encounters during the monitoring process. To be specific, we first derive the DEP by assuming the judgment threshold is fixed, i.e., ζ. Based on this, we then quantify how the eavesdropper will optimize the judgment threshold ζ to minimize the DEP metric. Such analysis would provide useful benchmarks in enhancing security countermeasures since it focuses on the worst-case scenario, where DEP is minimized at an eavesdropper. In detail, we first go into deriving the exact DEP, which can be mathematically written as (7) where the first probability implies that the transmission of x1 observed by exists but there is no actual transmission. In contrast, the second probability refers to no transmission observed by , but there is a transmission of x1. Similar to [19–23], we assume that the infinite number of signal examples are collected by to detect x2. Thus, the first probability in (7) can be derived from (5) as (8) where is the jammer SNR and Δ = ζ/σ2 − 1. Meanwhile, the second probability in (7) can be derived as (9) By plugging (8) and (9) into (7), we get the following theorem. Lemma 1. The closed-form expression for the DEP of can be derived as (10) The result in (10) shows that σ2, , ζ, and are arbitrary values without controlling ability. Meanwhile, examining and discloses that when occurs, the DEP at becomes unity, i.e., . This means that is an increasing function of . However, this is only correct when does not optimize its judgement threshold ζ. Therefore, deriving the optimal DEP at with the optimization of ζ⋆ is necessary but not easy, which motivates us to introduce the following lower-bound optimal DEP. Proposition 1. The lower-bound optimal DEP at can be derived as (11) Proof. Let us reconsider the probabilities in (7) by conditioning on as (12) (13) By plugging (12) and (13) into (7) and then taking Δ with respect to ζ equal zero, we get that (14) Finally, plugging Δ in (12) and (13), we get the lower-bound optimal DEP. Remark 1. The result in (11) reveals that is increased with an increase in ρ. Specifically, when ρ = 0, we get . When ρ = 0.5, . When ρ → 1, since limρ→1 ρ1/(1−ρ) = 1/exp(1) and limρ→1 ρρ/(1−ρ) = 1/exp(1), which is attained based on the property of the exponential function limit. On the other hand, it is worth noting that the result (11) will converge to the exact optimal DEP at whenever , which shall be soon demonstrated in numerical results. 3.1.2 Analysis of eavesdropping activity. In this section, we will further go into a detailed analysis of the case where the eavesdropper can detect the covert signal from the monitoring activity and then try to wiretap this signal. Herein, we focus on evaluating the SOP performance as the role of the legitimate system rather than the eavesdropper in the previous section. Specifically, the SOP metric will reflect how much probability that the legitimate link’s channel capacity is larger than the eavesdropper link’s channel capacity when compared to a given secrecy rate R1 of decoding design, i.e., . If is negative and its magnitude is larger than the secure rate R1, it means that the eavesdropper can strongly wiretap the covert signal with the probability of one. This means that using security techniques like encryption is not effective. Conversely, is positive. This means that the eavesdropper can have a quality of achievable rate worse than the legitimate user, and if this achieved rate gap is larger than the secure rate, the eavesdropper cannot decode any information. In other words, using security techniques is entirely effective. Following that, the SOP that eavesdrops on x1 can be mathematically written as follows: (15) By substituting (4) and (6) into (15), the SOP that eavesdrops on x1 can be derived as (16) where . Making use of [29, eq. (3.352.2)], we achieve the following lemma. Lemma 2. Exact closed-form expressions for the SOP that eavesdrops on x1 can be derived as (17) where Ξ is the short-notation of (18) where Ei(⋅) is the exponential integral function [29, Eq. (8.211.1)]. This function is special in mathematics and is defined as the integral of the ratio between an exponential function and its argument. For real non-zero values of (x), the exponential integral is given by: (19) Remark 2. As high SNR, i.e., , the SOP of in (17) can be upper bounded using the connection 1 − exp(−x) ≃ x as x → 0 to get that (20) Remark 3. The result in (20) reveals that the SOP at is an increasing function of ρ since exp(−1/(1 − ρ)) → 0. When , the SOP at becomes (a constant value). 3.1.3 Analysis of legitimate user. This part evaluates the performance of by deriving the OP and ergodic rate metric. Herein, the OP metric will reflect how much reliable communication users can achieve with the given predefined threshold rate, respectively. Meanwhile, the ergodic rate will clarify how much the average achievable rate that users can obtain when the system uses channel coding/modulation schemes to achieve near-zero errors during signal transmission. OP analysis for : Let ri is the given predefined threshold rate to decode xi, with i = 1, 2. Denoting , the OP of decoding x1 at can be mathematically defined as (21) This probability describes all the events that the achievable rates received by for decoding x1 or x2 or both of them are much less than the required target rates. This means that cannot decode either x1 or x2 or both of them. By injecting the formulas of and in (4) into the above probability, we can rewrite the term as (22) where ψ = ρ − (1 − ρ)κ2 > 0. Herein, if ψ ≤ 0, . By mapping the CDF in (1) with the above result, we obtain the final OP expression for as (23) Remark 4. The result in (23) shows that when κ2/ψ ≥ κ1/(1 − ρ), the effective region of ρ is (24) As for this case, increasing ρ decreases . Conversely, increasing ρ gives rise to . Remark 5. At high SNR, i.e., , the OP of in (23) can be upper bounded as (25) It is clear that is proportional to ; thus, we can infer that ’s diversity order is 1. Covert rate analysis for : The covert rate of sending x1 from to under no error decoding of x1 can be defined as (26) By applying integral by part methods [13, Eq. (30)] and mapping the CDF in (1), we can rewrite the term as (27) Now, applying the standard form in [29, Eq. (3.352.4)], we get the final expression for the covert rate of sending x1 from to as (28) Remark 6. At high SNR, i.e., , the covert rate of in (26) can be upper bounded as (29) Since scales up with a logarithm function of , ’s multiplexing gain is 1. Besides, we can also observe that scales down with an increase in ρ. OP analysis for : Besides investigating the performance of , it is also necessary to study the performance of serving . Specifically, the OP of to directly decode its message x2 can be described as (30) where can be derived similar to in (4) by simply replacing with . Accordingly, the OP of can be derived by mapping with the CDF in (1) as (31) Remark 7. Directly inspection of (31) shows that increasing , ρ or decreasing κ2 will decrease , i.e., improving the outage event to the smallest possible extent. Remark 8. At high SNR, i.e., , the OP of can be upper bounded as (32) Since is proportional to , ’s diversity gain is 1. Covert rate analysis for : The public rate of sending x2 from to can be defined as (33) To solve the above expression, we first apply the logarithm decomposition and then apply the integral by part methods as (34) Now, using the standard form in [29, Eq. (3.352.4)], we get the final expression for the public rate of sending x2 from to as (35) Remark 9. At high SNR, i.e., , the public rate of can be upper bounded as (36) Since does not scale up with a logarithm function of , ’s multiplexing gain is 0. Besides, we can also observe that scales up with an increase in ρ. 3.2 Outage performance optimization Having all the expressions of the lower-bound optimal DEP, the SOP, and the OP metrics in hand, in this section, we will first formulate the problem of optimizing resource power allocation subject to minimize the reliability of sending covert information while ensuring reliable communication of public signal at all legitimate users (passing SIC process at and successfully decoding at ) as well as two lines of security countermeasures for the physical layer transmission (one line from the monitoring signal of covert signals and another line for decoding covert information). Afterward, we will provide detailed guidance in achieving closed-form sub-optimal PA policy. 3.2.1 Problem formulation. In this subsection, we seek an efficient approach to ensure the covert transmission is not disclosed by an unauthorized thirsty party while ensuring reliable communication for all users. To be specific, we aim to improve the covert transmission of in terms of OP by optimizing the PA coefficient ρ while ensuring the maximum eavesdropping , the minimum covertness , and the minimum OP . Mathematically, this optimization problem can be formulated as (37a) (37b) (37c) where constraints in (37b) refers to the minimal OP of , the minimal SOP of , and the minimal DEP of , while constraints in (37c) is the operating condition. 3.2.2 Solution approach. Since the problem in (37) involves the complicated expression , finding the exact optimal PA solution ρ⋆ is an extremely intricate task. We therefore overcome this challenge by leveraging the connection . This enables us to simplify the optimization problem in (37) into a tractable problem by checking the feasible domain of ρ. Specifically, we begin with revisiting Remarks 1, 3, and 7, where we can obtain: and are an increasing function of ρ, respectively, while is a decreasing function of ρ. Based on this, we solve to get the second feasible region as (38) and solve to get the following inequality (39) However, finding the exact solution for (39) is extremely difficult; thus, we rely on Newton’s method for finding a root ρ+ of a function f(ρ) = 0, which has derivative (40) Thus, the fourth feasible region for (39) can be deduced as (41) Next, we solve to have the following inequality (42) To proceed, we move on exploring the objective function in (37a) and we notice that it is only improved if (24) holds. Combining this with (37c), we get the feasible region (43) where φ ≜ max{κ2/(1 + κ2) + ℓ, 0.5 + ℓ} and ξ ≜ min{κ2(1 + κ1)/(κ1(1 + κ2) + κ2), 1 − ℓ}. Putting (38) and (41)–(43) together, we obtain the sub-optimal solution for (37) as (44) 3.3 Covert rate maximization Having all the expressions of the lower-bound optimal DEP, the SOP, and the ergodic rate metrics in hand, in this section, we will first formulate the problem of optimizing resource power allocation subject to maximize the covert rate of sending covert information while ensuring reliable communication of public signal at all legitimate users as well as two lines of security countermeasures for the physical layer transmission. Afterward, we will provide detailed guidance in achieving closed-form sub-optimal PA policy. 3.3.1 Problem formulation. This section aims to optimize ρ to maximize the covert rate of while ensuring the systems’ security and covert requirements. Specifically, the optimization problem can be formulated as (45a) (45b) (45c) (45d) where is the minimum OP required for . 3.3.2 Solution approach. Since the complex results of (45a) and in (45d) makes obtaining the optimal solution for the problem in (45), we tackle this problem by leveraging the connection , providing the feasible region in (42). Next, we solve and , returning the respective results in (38) and (43). Meanwhile, solving results in (46) Besides, from (45d), (38), (42), (43), and (46), we can deduce the feasible region for ρ as (47) On the other hand, we get that is a decreasing function of ρ as stated in Remark 6. Thus, ρ should be designed with a small value within the feasible region. By combining (46) and (47), the sub-optimal solution for the problem in (45) can be deduced as (48) 3.1 Performance analysis In the context of performance analysis, achieving closed-form expressions in wireless performance analysis helps provide simplified and exact representations of complex relationships, enabling quick and efficient evaluations of performance metrics, and offering deep insights into the system behaviour without extensive simulations. This is because such closed-form expressions can be readily programmable by common package software like Matlab, mathematical, and Maple. As such, one can evaluate specific scenarios of network deployments by replacing input parameters before using them for online implementations. Therefore, in this study, we will analyze the system performance by first deriving closed-form expressions for the DEP, SOP, OP, and rate metrics. 3.1.1 Monitoring analysis. To have the best knowledge on the behaviour of monitoring x1 at for improving the security transmission at the physical layer, this subsection will analyze the DEP in the role of an eavesdropper. This is because the DEP metric will reflect the level of error probability that the eavesdropper encounters during the monitoring process. To be specific, we first derive the DEP by assuming the judgment threshold is fixed, i.e., ζ. Based on this, we then quantify how the eavesdropper will optimize the judgment threshold ζ to minimize the DEP metric. Such analysis would provide useful benchmarks in enhancing security countermeasures since it focuses on the worst-case scenario, where DEP is minimized at an eavesdropper. In detail, we first go into deriving the exact DEP, which can be mathematically written as (7) where the first probability implies that the transmission of x1 observed by exists but there is no actual transmission. In contrast, the second probability refers to no transmission observed by , but there is a transmission of x1. Similar to [19–23], we assume that the infinite number of signal examples are collected by to detect x2. Thus, the first probability in (7) can be derived from (5) as (8) where is the jammer SNR and Δ = ζ/σ2 − 1. Meanwhile, the second probability in (7) can be derived as (9) By plugging (8) and (9) into (7), we get the following theorem. Lemma 1. The closed-form expression for the DEP of can be derived as (10) The result in (10) shows that σ2, , ζ, and are arbitrary values without controlling ability. Meanwhile, examining and discloses that when occurs, the DEP at becomes unity, i.e., . This means that is an increasing function of . However, this is only correct when does not optimize its judgement threshold ζ. Therefore, deriving the optimal DEP at with the optimization of ζ⋆ is necessary but not easy, which motivates us to introduce the following lower-bound optimal DEP. Proposition 1. The lower-bound optimal DEP at can be derived as (11) Proof. Let us reconsider the probabilities in (7) by conditioning on as (12) (13) By plugging (12) and (13) into (7) and then taking Δ with respect to ζ equal zero, we get that (14) Finally, plugging Δ in (12) and (13), we get the lower-bound optimal DEP. Remark 1. The result in (11) reveals that is increased with an increase in ρ. Specifically, when ρ = 0, we get . When ρ = 0.5, . When ρ → 1, since limρ→1 ρ1/(1−ρ) = 1/exp(1) and limρ→1 ρρ/(1−ρ) = 1/exp(1), which is attained based on the property of the exponential function limit. On the other hand, it is worth noting that the result (11) will converge to the exact optimal DEP at whenever , which shall be soon demonstrated in numerical results. 3.1.2 Analysis of eavesdropping activity. In this section, we will further go into a detailed analysis of the case where the eavesdropper can detect the covert signal from the monitoring activity and then try to wiretap this signal. Herein, we focus on evaluating the SOP performance as the role of the legitimate system rather than the eavesdropper in the previous section. Specifically, the SOP metric will reflect how much probability that the legitimate link’s channel capacity is larger than the eavesdropper link’s channel capacity when compared to a given secrecy rate R1 of decoding design, i.e., . If is negative and its magnitude is larger than the secure rate R1, it means that the eavesdropper can strongly wiretap the covert signal with the probability of one. This means that using security techniques like encryption is not effective. Conversely, is positive. This means that the eavesdropper can have a quality of achievable rate worse than the legitimate user, and if this achieved rate gap is larger than the secure rate, the eavesdropper cannot decode any information. In other words, using security techniques is entirely effective. Following that, the SOP that eavesdrops on x1 can be mathematically written as follows: (15) By substituting (4) and (6) into (15), the SOP that eavesdrops on x1 can be derived as (16) where . Making use of [29, eq. (3.352.2)], we achieve the following lemma. Lemma 2. Exact closed-form expressions for the SOP that eavesdrops on x1 can be derived as (17) where Ξ is the short-notation of (18) where Ei(⋅) is the exponential integral function [29, Eq. (8.211.1)]. This function is special in mathematics and is defined as the integral of the ratio between an exponential function and its argument. For real non-zero values of (x), the exponential integral is given by: (19) Remark 2. As high SNR, i.e., , the SOP of in (17) can be upper bounded using the connection 1 − exp(−x) ≃ x as x → 0 to get that (20) Remark 3. The result in (20) reveals that the SOP at is an increasing function of ρ since exp(−1/(1 − ρ)) → 0. When , the SOP at becomes (a constant value). 3.1.3 Analysis of legitimate user. This part evaluates the performance of by deriving the OP and ergodic rate metric. Herein, the OP metric will reflect how much reliable communication users can achieve with the given predefined threshold rate, respectively. Meanwhile, the ergodic rate will clarify how much the average achievable rate that users can obtain when the system uses channel coding/modulation schemes to achieve near-zero errors during signal transmission. OP analysis for : Let ri is the given predefined threshold rate to decode xi, with i = 1, 2. Denoting , the OP of decoding x1 at can be mathematically defined as (21) This probability describes all the events that the achievable rates received by for decoding x1 or x2 or both of them are much less than the required target rates. This means that cannot decode either x1 or x2 or both of them. By injecting the formulas of and in (4) into the above probability, we can rewrite the term as (22) where ψ = ρ − (1 − ρ)κ2 > 0. Herein, if ψ ≤ 0, . By mapping the CDF in (1) with the above result, we obtain the final OP expression for as (23) Remark 4. The result in (23) shows that when κ2/ψ ≥ κ1/(1 − ρ), the effective region of ρ is (24) As for this case, increasing ρ decreases . Conversely, increasing ρ gives rise to . Remark 5. At high SNR, i.e., , the OP of in (23) can be upper bounded as (25) It is clear that is proportional to ; thus, we can infer that ’s diversity order is 1. Covert rate analysis for : The covert rate of sending x1 from to under no error decoding of x1 can be defined as (26) By applying integral by part methods [13, Eq. (30)] and mapping the CDF in (1), we can rewrite the term as (27) Now, applying the standard form in [29, Eq. (3.352.4)], we get the final expression for the covert rate of sending x1 from to as (28) Remark 6. At high SNR, i.e., , the covert rate of in (26) can be upper bounded as (29) Since scales up with a logarithm function of , ’s multiplexing gain is 1. Besides, we can also observe that scales down with an increase in ρ. OP analysis for : Besides investigating the performance of , it is also necessary to study the performance of serving . Specifically, the OP of to directly decode its message x2 can be described as (30) where can be derived similar to in (4) by simply replacing with . Accordingly, the OP of can be derived by mapping with the CDF in (1) as (31) Remark 7. Directly inspection of (31) shows that increasing , ρ or decreasing κ2 will decrease , i.e., improving the outage event to the smallest possible extent. Remark 8. At high SNR, i.e., , the OP of can be upper bounded as (32) Since is proportional to , ’s diversity gain is 1. Covert rate analysis for : The public rate of sending x2 from to can be defined as (33) To solve the above expression, we first apply the logarithm decomposition and then apply the integral by part methods as (34) Now, using the standard form in [29, Eq. (3.352.4)], we get the final expression for the public rate of sending x2 from to as (35) Remark 9. At high SNR, i.e., , the public rate of can be upper bounded as (36) Since does not scale up with a logarithm function of , ’s multiplexing gain is 0. Besides, we can also observe that scales up with an increase in ρ. 3.1.1 Monitoring analysis. To have the best knowledge on the behaviour of monitoring x1 at for improving the security transmission at the physical layer, this subsection will analyze the DEP in the role of an eavesdropper. This is because the DEP metric will reflect the level of error probability that the eavesdropper encounters during the monitoring process. To be specific, we first derive the DEP by assuming the judgment threshold is fixed, i.e., ζ. Based on this, we then quantify how the eavesdropper will optimize the judgment threshold ζ to minimize the DEP metric. Such analysis would provide useful benchmarks in enhancing security countermeasures since it focuses on the worst-case scenario, where DEP is minimized at an eavesdropper. In detail, we first go into deriving the exact DEP, which can be mathematically written as (7) where the first probability implies that the transmission of x1 observed by exists but there is no actual transmission. In contrast, the second probability refers to no transmission observed by , but there is a transmission of x1. Similar to [19–23], we assume that the infinite number of signal examples are collected by to detect x2. Thus, the first probability in (7) can be derived from (5) as (8) where is the jammer SNR and Δ = ζ/σ2 − 1. Meanwhile, the second probability in (7) can be derived as (9) By plugging (8) and (9) into (7), we get the following theorem. Lemma 1. The closed-form expression for the DEP of can be derived as (10) The result in (10) shows that σ2, , ζ, and are arbitrary values without controlling ability. Meanwhile, examining and discloses that when occurs, the DEP at becomes unity, i.e., . This means that is an increasing function of . However, this is only correct when does not optimize its judgement threshold ζ. Therefore, deriving the optimal DEP at with the optimization of ζ⋆ is necessary but not easy, which motivates us to introduce the following lower-bound optimal DEP. Proposition 1. The lower-bound optimal DEP at can be derived as (11) Proof. Let us reconsider the probabilities in (7) by conditioning on as (12) (13) By plugging (12) and (13) into (7) and then taking Δ with respect to ζ equal zero, we get that (14) Finally, plugging Δ in (12) and (13), we get the lower-bound optimal DEP. Remark 1. The result in (11) reveals that is increased with an increase in ρ. Specifically, when ρ = 0, we get . When ρ = 0.5, . When ρ → 1, since limρ→1 ρ1/(1−ρ) = 1/exp(1) and limρ→1 ρρ/(1−ρ) = 1/exp(1), which is attained based on the property of the exponential function limit. On the other hand, it is worth noting that the result (11) will converge to the exact optimal DEP at whenever , which shall be soon demonstrated in numerical results. 3.1.2 Analysis of eavesdropping activity. In this section, we will further go into a detailed analysis of the case where the eavesdropper can detect the covert signal from the monitoring activity and then try to wiretap this signal. Herein, we focus on evaluating the SOP performance as the role of the legitimate system rather than the eavesdropper in the previous section. Specifically, the SOP metric will reflect how much probability that the legitimate link’s channel capacity is larger than the eavesdropper link’s channel capacity when compared to a given secrecy rate R1 of decoding design, i.e., . If is negative and its magnitude is larger than the secure rate R1, it means that the eavesdropper can strongly wiretap the covert signal with the probability of one. This means that using security techniques like encryption is not effective. Conversely, is positive. This means that the eavesdropper can have a quality of achievable rate worse than the legitimate user, and if this achieved rate gap is larger than the secure rate, the eavesdropper cannot decode any information. In other words, using security techniques is entirely effective. Following that, the SOP that eavesdrops on x1 can be mathematically written as follows: (15) By substituting (4) and (6) into (15), the SOP that eavesdrops on x1 can be derived as (16) where . Making use of [29, eq. (3.352.2)], we achieve the following lemma. Lemma 2. Exact closed-form expressions for the SOP that eavesdrops on x1 can be derived as (17) where Ξ is the short-notation of (18) where Ei(⋅) is the exponential integral function [29, Eq. (8.211.1)]. This function is special in mathematics and is defined as the integral of the ratio between an exponential function and its argument. For real non-zero values of (x), the exponential integral is given by: (19) Remark 2. As high SNR, i.e., , the SOP of in (17) can be upper bounded using the connection 1 − exp(−x) ≃ x as x → 0 to get that (20) Remark 3. The result in (20) reveals that the SOP at is an increasing function of ρ since exp(−1/(1 − ρ)) → 0. When , the SOP at becomes (a constant value). 3.1.3 Analysis of legitimate user. This part evaluates the performance of by deriving the OP and ergodic rate metric. Herein, the OP metric will reflect how much reliable communication users can achieve with the given predefined threshold rate, respectively. Meanwhile, the ergodic rate will clarify how much the average achievable rate that users can obtain when the system uses channel coding/modulation schemes to achieve near-zero errors during signal transmission. OP analysis for : Let ri is the given predefined threshold rate to decode xi, with i = 1, 2. Denoting , the OP of decoding x1 at can be mathematically defined as (21) This probability describes all the events that the achievable rates received by for decoding x1 or x2 or both of them are much less than the required target rates. This means that cannot decode either x1 or x2 or both of them. By injecting the formulas of and in (4) into the above probability, we can rewrite the term as (22) where ψ = ρ − (1 − ρ)κ2 > 0. Herein, if ψ ≤ 0, . By mapping the CDF in (1) with the above result, we obtain the final OP expression for as (23) Remark 4. The result in (23) shows that when κ2/ψ ≥ κ1/(1 − ρ), the effective region of ρ is (24) As for this case, increasing ρ decreases . Conversely, increasing ρ gives rise to . Remark 5. At high SNR, i.e., , the OP of in (23) can be upper bounded as (25) It is clear that is proportional to ; thus, we can infer that ’s diversity order is 1. Covert rate analysis for : The covert rate of sending x1 from to under no error decoding of x1 can be defined as (26) By applying integral by part methods [13, Eq. (30)] and mapping the CDF in (1), we can rewrite the term as (27) Now, applying the standard form in [29, Eq. (3.352.4)], we get the final expression for the covert rate of sending x1 from to as (28) Remark 6. At high SNR, i.e., , the covert rate of in (26) can be upper bounded as (29) Since scales up with a logarithm function of , ’s multiplexing gain is 1. Besides, we can also observe that scales down with an increase in ρ. OP analysis for : Besides investigating the performance of , it is also necessary to study the performance of serving . Specifically, the OP of to directly decode its message x2 can be described as (30) where can be derived similar to in (4) by simply replacing with . Accordingly, the OP of can be derived by mapping with the CDF in (1) as (31) Remark 7. Directly inspection of (31) shows that increasing , ρ or decreasing κ2 will decrease , i.e., improving the outage event to the smallest possible extent. Remark 8. At high SNR, i.e., , the OP of can be upper bounded as (32) Since is proportional to , ’s diversity gain is 1. Covert rate analysis for : The public rate of sending x2 from to can be defined as (33) To solve the above expression, we first apply the logarithm decomposition and then apply the integral by part methods as (34) Now, using the standard form in [29, Eq. (3.352.4)], we get the final expression for the public rate of sending x2 from to as (35) Remark 9. At high SNR, i.e., , the public rate of can be upper bounded as (36) Since does not scale up with a logarithm function of , ’s multiplexing gain is 0. Besides, we can also observe that scales up with an increase in ρ. 3.2 Outage performance optimization Having all the expressions of the lower-bound optimal DEP, the SOP, and the OP metrics in hand, in this section, we will first formulate the problem of optimizing resource power allocation subject to minimize the reliability of sending covert information while ensuring reliable communication of public signal at all legitimate users (passing SIC process at and successfully decoding at ) as well as two lines of security countermeasures for the physical layer transmission (one line from the monitoring signal of covert signals and another line for decoding covert information). Afterward, we will provide detailed guidance in achieving closed-form sub-optimal PA policy. 3.2.1 Problem formulation. In this subsection, we seek an efficient approach to ensure the covert transmission is not disclosed by an unauthorized thirsty party while ensuring reliable communication for all users. To be specific, we aim to improve the covert transmission of in terms of OP by optimizing the PA coefficient ρ while ensuring the maximum eavesdropping , the minimum covertness , and the minimum OP . Mathematically, this optimization problem can be formulated as (37a) (37b) (37c) where constraints in (37b) refers to the minimal OP of , the minimal SOP of , and the minimal DEP of , while constraints in (37c) is the operating condition. 3.2.2 Solution approach. Since the problem in (37) involves the complicated expression , finding the exact optimal PA solution ρ⋆ is an extremely intricate task. We therefore overcome this challenge by leveraging the connection . This enables us to simplify the optimization problem in (37) into a tractable problem by checking the feasible domain of ρ. Specifically, we begin with revisiting Remarks 1, 3, and 7, where we can obtain: and are an increasing function of ρ, respectively, while is a decreasing function of ρ. Based on this, we solve to get the second feasible region as (38) and solve to get the following inequality (39) However, finding the exact solution for (39) is extremely difficult; thus, we rely on Newton’s method for finding a root ρ+ of a function f(ρ) = 0, which has derivative (40) Thus, the fourth feasible region for (39) can be deduced as (41) Next, we solve to have the following inequality (42) To proceed, we move on exploring the objective function in (37a) and we notice that it is only improved if (24) holds. Combining this with (37c), we get the feasible region (43) where φ ≜ max{κ2/(1 + κ2) + ℓ, 0.5 + ℓ} and ξ ≜ min{κ2(1 + κ1)/(κ1(1 + κ2) + κ2), 1 − ℓ}. Putting (38) and (41)–(43) together, we obtain the sub-optimal solution for (37) as (44) 3.2.1 Problem formulation. In this subsection, we seek an efficient approach to ensure the covert transmission is not disclosed by an unauthorized thirsty party while ensuring reliable communication for all users. To be specific, we aim to improve the covert transmission of in terms of OP by optimizing the PA coefficient ρ while ensuring the maximum eavesdropping , the minimum covertness , and the minimum OP . Mathematically, this optimization problem can be formulated as (37a) (37b) (37c) where constraints in (37b) refers to the minimal OP of , the minimal SOP of , and the minimal DEP of , while constraints in (37c) is the operating condition. 3.2.2 Solution approach. Since the problem in (37) involves the complicated expression , finding the exact optimal PA solution ρ⋆ is an extremely intricate task. We therefore overcome this challenge by leveraging the connection . This enables us to simplify the optimization problem in (37) into a tractable problem by checking the feasible domain of ρ. Specifically, we begin with revisiting Remarks 1, 3, and 7, where we can obtain: and are an increasing function of ρ, respectively, while is a decreasing function of ρ. Based on this, we solve to get the second feasible region as (38) and solve to get the following inequality (39) However, finding the exact solution for (39) is extremely difficult; thus, we rely on Newton’s method for finding a root ρ+ of a function f(ρ) = 0, which has derivative (40) Thus, the fourth feasible region for (39) can be deduced as (41) Next, we solve to have the following inequality (42) To proceed, we move on exploring the objective function in (37a) and we notice that it is only improved if (24) holds. Combining this with (37c), we get the feasible region (43) where φ ≜ max{κ2/(1 + κ2) + ℓ, 0.5 + ℓ} and ξ ≜ min{κ2(1 + κ1)/(κ1(1 + κ2) + κ2), 1 − ℓ}. Putting (38) and (41)–(43) together, we obtain the sub-optimal solution for (37) as (44) 3.3 Covert rate maximization Having all the expressions of the lower-bound optimal DEP, the SOP, and the ergodic rate metrics in hand, in this section, we will first formulate the problem of optimizing resource power allocation subject to maximize the covert rate of sending covert information while ensuring reliable communication of public signal at all legitimate users as well as two lines of security countermeasures for the physical layer transmission. Afterward, we will provide detailed guidance in achieving closed-form sub-optimal PA policy. 3.3.1 Problem formulation. This section aims to optimize ρ to maximize the covert rate of while ensuring the systems’ security and covert requirements. Specifically, the optimization problem can be formulated as (45a) (45b) (45c) (45d) where is the minimum OP required for . 3.3.2 Solution approach. Since the complex results of (45a) and in (45d) makes obtaining the optimal solution for the problem in (45), we tackle this problem by leveraging the connection , providing the feasible region in (42). Next, we solve and , returning the respective results in (38) and (43). Meanwhile, solving results in (46) Besides, from (45d), (38), (42), (43), and (46), we can deduce the feasible region for ρ as (47) On the other hand, we get that is a decreasing function of ρ as stated in Remark 6. Thus, ρ should be designed with a small value within the feasible region. By combining (46) and (47), the sub-optimal solution for the problem in (45) can be deduced as (48) 3.3.1 Problem formulation. This section aims to optimize ρ to maximize the covert rate of while ensuring the systems’ security and covert requirements. Specifically, the optimization problem can be formulated as (45a) (45b) (45c) (45d) where is the minimum OP required for . 3.3.2 Solution approach. Since the complex results of (45a) and in (45d) makes obtaining the optimal solution for the problem in (45), we tackle this problem by leveraging the connection , providing the feasible region in (42). Next, we solve and , returning the respective results in (38) and (43). Meanwhile, solving results in (46) Besides, from (45d), (38), (42), (43), and (46), we can deduce the feasible region for ρ as (47) On the other hand, we get that is a decreasing function of ρ as stated in Remark 6. Thus, ρ should be designed with a small value within the feasible region. By combining (46) and (47), the sub-optimal solution for the problem in (45) can be deduced as (48) 4 Numerical results and discussions In this section, we provide some numerical examples using the Monte-Carlo simulation with 104 trials to validate the designed frameworks in the previous section. Specifically, we set the parameters throughout this section: σ2 = 1, , and . 4.1 Monitoring scenario In Figs 2–4, the DEP of monitoring covert transmission between and for different adjustment activity of to achieve the minimal DEP. As observed, both the simulation and analytical results in (10) are precisely consistent. Besides, we can find that the DEP has a downtrend with an increase in ζ and then becomes an uptrend in contrast. The reason is that when ζ increases, the probability of no transmission observed by decreases but the probability of existent transmission of x1 observed by increases and then the former becomes smaller than the latter, yielding an increase in DEP overall. Especially when they intersect, DEP reaches its minimum value, forming a downward concave shape. Fig 2 paints the DEP when dB. The results show that the amount of noise SNR strongly affects the DEP performance. When increases, faces more error-prone in covert signal detection, yielding better covert protection of communication for the main system. Especially, we can see that the developed lower bound in (11) is almost lower than the minimal DEP, showing our correct mathematical development. Fig 3 shows the DEP with different values of power distribution coefficients ρ. It is observed that the higher the value of ρ, the larger the higher DEP performance. It can be concluded that the DEP increases with the increase of ρ. The covert performance is improved due to the application of efficient power distribution among NOMA signals that take advantage of user-superimposed messages to make friendly interference. Moreover, from Fig 4, we can further observe that when the transmit SNR increases, must increase its threshold judgment to adapt to this change and from the developed asymptotic result, we can readily discover the minimum DEP that can achieve without challenging. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 2. Impact of (jamming SNR) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g002 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 3. Impact of ρ (PA coefficient of ) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g003 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 4. Impact of (transmit SNR) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g004 In Figs 5 and 6, we plot the DEP performance as a function of either or . From Fig 5, we can observe that when increases, the DEP curves has downtrend with variations of from 0.1 to 1 and uptrend with variations of beyond 1. Meanwhile, the result in Fig 6 reveals that the DEP curves almost increase with an increase in fading parameter . This is because the larger the value of , the stronger the channel interference from the jammer node to the eavesdropper. Besides, we can also observe that increasing the jamming SNR plays an important role in increasing the DEP at the eavesdropper. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 5. Impact of fading parameter on DEP performance. Setups: ρ = 0.6, dB, and ζ = 10 dB. https://doi.org/10.1371/journal.pone.0317289.g005 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 6. Impact of fading parameter on DEP performance. Setups: ρ = 0.6, dB, and ζ = 10 dB. https://doi.org/10.1371/journal.pone.0317289.g006 4.2 Eavesdropping scenario Next, we depict the SOP under different jamming power levels in Fig 7, different target security rates in Fig 8, and other PA coefficient in Fig 9. According to the numerical results, no matter what SNR varies, the developed analytical results in (17) perfectly match with the simulation ones and approach the asymptotic plotted using (20) at high SNR region, verifying our developed analytical frameworks. According to the results in Fig 7, it can be seen that the security performance begins to improve and saturates the security floor with dB when exceeds 10 dBm. However, we can surpass this challenge by increasing jamming signal levels, i.e., , to produce more interference to confuse ’s information extraction, strengthening the SOP significantly. Therefore, deploying a jammer has a splendid impact on security performance. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 7. Impact of ρ (PA coefficient of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g007 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 8. Impact of R1 (secure rate of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g008 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 9. Impact of ρ (PA coefficient of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g009 In Figs 10 and 11, we plot the SOP performance as a function of either or . Specifically, we can observe that there is an opposite SOP trend between Figs 10 and 11, where the SOP in Fig 10 tends to increase with the increment of , while that of Fig 11 tends to decrease with the increment of . This is because when the eavesdropper is close to the source information (i.e., is increased), its channel gain becomes better and thus covert information of Bob can be decoded with higher probability. Meanwhile, increasing results in higher channel interference on the reception of the eavesdropper, thus degrading its decoding ability and improving the SOP accordingly. However, both also have the same trend is that increasing the jamming SNR helps improve the SOP performance, which is true with the expected role of the jamming node. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 10. Impact of fading parameter on SOP performance. Setups: R1 = r2 = 0.25 bps/Hz, ρ = 0.6, and dB. https://doi.org/10.1371/journal.pone.0317289.g010 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 11. Impact of fading parameter on SOP performance. Setups: R1 = r2 = 0.25 bps/Hz, ρ = 0.6, and dB. https://doi.org/10.1371/journal.pone.0317289.g011 4.3 User performance 4.3.1 Outage and rate analysis. We investigate the relationship between the transmit SNR and the users’ OPs and rates. From Fig 12, it can be seen that no matter what the SNR changes, the OP curves improve considerably, and both simulation and analytical results are consistent with each other, showing the correctness of our derived expressions in (23) and (31). Besides, at high SNR, the asymptotic results (dot lines) can accurately predict the simulation ones, showing the correctness of (25) and (32). Moreover, we can further find from Fig 12 that the OP of almost improves with ρ = 0.55, 0.75, 0.95 when is constant. Conversely, the OP of has a downtrend with ρ = 0.55, 0.75 but an uptrend with ρ = 0.95. These observations are almost aligned with analyses in Remarks 4 and 7. Therefore, optimizing the power distribution coefficient ρ is a critical task. Next, from Fig 13, we can obtain the covert rate of corresponding to the linear curve of to its asymptote, where increasing has a strong effect in boosting the covert transmission rate. However, the rate of corresponds to the curve of to its asymptote, at which point increasing has almost no effect on the public transmission rate. However, when we increase the power distribution coefficient ρ, the public transmission rate improves considerably. Unfortunately, such configurations decline the quality of the covert transmission rate, yielding a trade-off in covert and public transmission rates between users. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 12. OP versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g012 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 13. User rate versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g013 4.3.2 Covert outage minimization and rate maximization. In Fig 14, the OP of transmitting a covert signal at is described as a function of the transmit . By comparing two schemes of fixed PA scheme 1 (sc1.): ρ = 0.6 and scheme 2 (sc2.): ρ = 0.9. Under the constants for designing security (yellow dash-dot line), covert (red dash-dot line), and reliability transmission (pink dash-dot line), it can be seen that scheme 1 can satisfy the SOP at and OP at with dB but violate the DEP requirement at . Meanwhile, scheme 2 satisfies the SOP at but requires dB to meet the OP at and dB to meet the SOP at . Especially, compared to scheme 1, scheme 2 offers a better OP performance for but a lower OP performance for . This trend is similar to that of Fig 14. This confirms the fact that distributing the coefficient ρ plays an important role in ensuring the system’s overall performance. With the proposed solution in (44), our approach does not only satisfy the DEP, SOP, and OP requirements but also improves the OP of considerably while achieving the OP of very close to that of scheme 2. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 14. Cover outage optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g014 In Fig 15, the covert rate of is plotted as a function of the transmit . As observed, exploiting scheme 2 provides a public rate for higher than Scheme 1 but results in a lower covert rage for , and vice versa. However, schemes 1 and 2 do not consider the OP, SOP, and DEP requirements. Thus, if these constraints are accounted for covert communication and our proposed method in (48) is used, we can observe that when the target covert rate of is small, the system has great change to allocate higher power level to enhance ’s covert rate. Specifically, when , the covert rate of can enhance up to 0.5 bps/Hz compared to Scheme 1 and 2 bps/Hz over Scheme 2. However, , the covert rate of is decreased since a lower PA level is required to meet the DEP demand as analyzed in Remark 1. Although the covert rate of is decreased, it remains higher than Scheme 2 and the public rate is indeed better than that of Scheme 1. These show that our proposed approach can efficiently capture the security risks and provide sustainable transmission with specific network conditions. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 15. User rate optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g015 4.1 Monitoring scenario In Figs 2–4, the DEP of monitoring covert transmission between and for different adjustment activity of to achieve the minimal DEP. As observed, both the simulation and analytical results in (10) are precisely consistent. Besides, we can find that the DEP has a downtrend with an increase in ζ and then becomes an uptrend in contrast. The reason is that when ζ increases, the probability of no transmission observed by decreases but the probability of existent transmission of x1 observed by increases and then the former becomes smaller than the latter, yielding an increase in DEP overall. Especially when they intersect, DEP reaches its minimum value, forming a downward concave shape. Fig 2 paints the DEP when dB. The results show that the amount of noise SNR strongly affects the DEP performance. When increases, faces more error-prone in covert signal detection, yielding better covert protection of communication for the main system. Especially, we can see that the developed lower bound in (11) is almost lower than the minimal DEP, showing our correct mathematical development. Fig 3 shows the DEP with different values of power distribution coefficients ρ. It is observed that the higher the value of ρ, the larger the higher DEP performance. It can be concluded that the DEP increases with the increase of ρ. The covert performance is improved due to the application of efficient power distribution among NOMA signals that take advantage of user-superimposed messages to make friendly interference. Moreover, from Fig 4, we can further observe that when the transmit SNR increases, must increase its threshold judgment to adapt to this change and from the developed asymptotic result, we can readily discover the minimum DEP that can achieve without challenging. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 2. Impact of (jamming SNR) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g002 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 3. Impact of ρ (PA coefficient of ) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g003 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 4. Impact of (transmit SNR) on DEP performance. Setups: a) ρ = 0.6 and dB, b) dB and dB, and c) ρ = 0.6 and dB. https://doi.org/10.1371/journal.pone.0317289.g004 In Figs 5 and 6, we plot the DEP performance as a function of either or . From Fig 5, we can observe that when increases, the DEP curves has downtrend with variations of from 0.1 to 1 and uptrend with variations of beyond 1. Meanwhile, the result in Fig 6 reveals that the DEP curves almost increase with an increase in fading parameter . This is because the larger the value of , the stronger the channel interference from the jammer node to the eavesdropper. Besides, we can also observe that increasing the jamming SNR plays an important role in increasing the DEP at the eavesdropper. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 5. Impact of fading parameter on DEP performance. Setups: ρ = 0.6, dB, and ζ = 10 dB. https://doi.org/10.1371/journal.pone.0317289.g005 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 6. Impact of fading parameter on DEP performance. Setups: ρ = 0.6, dB, and ζ = 10 dB. https://doi.org/10.1371/journal.pone.0317289.g006 4.2 Eavesdropping scenario Next, we depict the SOP under different jamming power levels in Fig 7, different target security rates in Fig 8, and other PA coefficient in Fig 9. According to the numerical results, no matter what SNR varies, the developed analytical results in (17) perfectly match with the simulation ones and approach the asymptotic plotted using (20) at high SNR region, verifying our developed analytical frameworks. According to the results in Fig 7, it can be seen that the security performance begins to improve and saturates the security floor with dB when exceeds 10 dBm. However, we can surpass this challenge by increasing jamming signal levels, i.e., , to produce more interference to confuse ’s information extraction, strengthening the SOP significantly. Therefore, deploying a jammer has a splendid impact on security performance. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 7. Impact of ρ (PA coefficient of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g007 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 8. Impact of R1 (secure rate of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g008 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 9. Impact of ρ (PA coefficient of ) on SOP performance under eavesdropping scenario. Setups: a) R1 = r2 = 0.25 bps/Hz and ρ = 0.6, b) r2 = 0.25 bps/Hz, dB, and ρ = 0.6, and c) R1 = r2 = 0.25 bps/Hz and dB. https://doi.org/10.1371/journal.pone.0317289.g009 In Figs 10 and 11, we plot the SOP performance as a function of either or . Specifically, we can observe that there is an opposite SOP trend between Figs 10 and 11, where the SOP in Fig 10 tends to increase with the increment of , while that of Fig 11 tends to decrease with the increment of . This is because when the eavesdropper is close to the source information (i.e., is increased), its channel gain becomes better and thus covert information of Bob can be decoded with higher probability. Meanwhile, increasing results in higher channel interference on the reception of the eavesdropper, thus degrading its decoding ability and improving the SOP accordingly. However, both also have the same trend is that increasing the jamming SNR helps improve the SOP performance, which is true with the expected role of the jamming node. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 10. Impact of fading parameter on SOP performance. Setups: R1 = r2 = 0.25 bps/Hz, ρ = 0.6, and dB. https://doi.org/10.1371/journal.pone.0317289.g010 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 11. Impact of fading parameter on SOP performance. Setups: R1 = r2 = 0.25 bps/Hz, ρ = 0.6, and dB. https://doi.org/10.1371/journal.pone.0317289.g011 4.3 User performance 4.3.1 Outage and rate analysis. We investigate the relationship between the transmit SNR and the users’ OPs and rates. From Fig 12, it can be seen that no matter what the SNR changes, the OP curves improve considerably, and both simulation and analytical results are consistent with each other, showing the correctness of our derived expressions in (23) and (31). Besides, at high SNR, the asymptotic results (dot lines) can accurately predict the simulation ones, showing the correctness of (25) and (32). Moreover, we can further find from Fig 12 that the OP of almost improves with ρ = 0.55, 0.75, 0.95 when is constant. Conversely, the OP of has a downtrend with ρ = 0.55, 0.75 but an uptrend with ρ = 0.95. These observations are almost aligned with analyses in Remarks 4 and 7. Therefore, optimizing the power distribution coefficient ρ is a critical task. Next, from Fig 13, we can obtain the covert rate of corresponding to the linear curve of to its asymptote, where increasing has a strong effect in boosting the covert transmission rate. However, the rate of corresponds to the curve of to its asymptote, at which point increasing has almost no effect on the public transmission rate. However, when we increase the power distribution coefficient ρ, the public transmission rate improves considerably. Unfortunately, such configurations decline the quality of the covert transmission rate, yielding a trade-off in covert and public transmission rates between users. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 12. OP versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g012 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 13. User rate versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g013 4.3.2 Covert outage minimization and rate maximization. In Fig 14, the OP of transmitting a covert signal at is described as a function of the transmit . By comparing two schemes of fixed PA scheme 1 (sc1.): ρ = 0.6 and scheme 2 (sc2.): ρ = 0.9. Under the constants for designing security (yellow dash-dot line), covert (red dash-dot line), and reliability transmission (pink dash-dot line), it can be seen that scheme 1 can satisfy the SOP at and OP at with dB but violate the DEP requirement at . Meanwhile, scheme 2 satisfies the SOP at but requires dB to meet the OP at and dB to meet the SOP at . Especially, compared to scheme 1, scheme 2 offers a better OP performance for but a lower OP performance for . This trend is similar to that of Fig 14. This confirms the fact that distributing the coefficient ρ plays an important role in ensuring the system’s overall performance. With the proposed solution in (44), our approach does not only satisfy the DEP, SOP, and OP requirements but also improves the OP of considerably while achieving the OP of very close to that of scheme 2. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 14. Cover outage optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g014 In Fig 15, the covert rate of is plotted as a function of the transmit . As observed, exploiting scheme 2 provides a public rate for higher than Scheme 1 but results in a lower covert rage for , and vice versa. However, schemes 1 and 2 do not consider the OP, SOP, and DEP requirements. Thus, if these constraints are accounted for covert communication and our proposed method in (48) is used, we can observe that when the target covert rate of is small, the system has great change to allocate higher power level to enhance ’s covert rate. Specifically, when , the covert rate of can enhance up to 0.5 bps/Hz compared to Scheme 1 and 2 bps/Hz over Scheme 2. However, , the covert rate of is decreased since a lower PA level is required to meet the DEP demand as analyzed in Remark 1. Although the covert rate of is decreased, it remains higher than Scheme 2 and the public rate is indeed better than that of Scheme 1. These show that our proposed approach can efficiently capture the security risks and provide sustainable transmission with specific network conditions. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 15. User rate optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g015 4.3.1 Outage and rate analysis. We investigate the relationship between the transmit SNR and the users’ OPs and rates. From Fig 12, it can be seen that no matter what the SNR changes, the OP curves improve considerably, and both simulation and analytical results are consistent with each other, showing the correctness of our derived expressions in (23) and (31). Besides, at high SNR, the asymptotic results (dot lines) can accurately predict the simulation ones, showing the correctness of (25) and (32). Moreover, we can further find from Fig 12 that the OP of almost improves with ρ = 0.55, 0.75, 0.95 when is constant. Conversely, the OP of has a downtrend with ρ = 0.55, 0.75 but an uptrend with ρ = 0.95. These observations are almost aligned with analyses in Remarks 4 and 7. Therefore, optimizing the power distribution coefficient ρ is a critical task. Next, from Fig 13, we can obtain the covert rate of corresponding to the linear curve of to its asymptote, where increasing has a strong effect in boosting the covert transmission rate. However, the rate of corresponds to the curve of to its asymptote, at which point increasing has almost no effect on the public transmission rate. However, when we increase the power distribution coefficient ρ, the public transmission rate improves considerably. Unfortunately, such configurations decline the quality of the covert transmission rate, yielding a trade-off in covert and public transmission rates between users. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 12. OP versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g012 Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 13. User rate versus SNR . Setups: a) r1 = 0.25 and r2 = 0.5. https://doi.org/10.1371/journal.pone.0317289.g013 4.3.2 Covert outage minimization and rate maximization. In Fig 14, the OP of transmitting a covert signal at is described as a function of the transmit . By comparing two schemes of fixed PA scheme 1 (sc1.): ρ = 0.6 and scheme 2 (sc2.): ρ = 0.9. Under the constants for designing security (yellow dash-dot line), covert (red dash-dot line), and reliability transmission (pink dash-dot line), it can be seen that scheme 1 can satisfy the SOP at and OP at with dB but violate the DEP requirement at . Meanwhile, scheme 2 satisfies the SOP at but requires dB to meet the OP at and dB to meet the SOP at . Especially, compared to scheme 1, scheme 2 offers a better OP performance for but a lower OP performance for . This trend is similar to that of Fig 14. This confirms the fact that distributing the coefficient ρ plays an important role in ensuring the system’s overall performance. With the proposed solution in (44), our approach does not only satisfy the DEP, SOP, and OP requirements but also improves the OP of considerably while achieving the OP of very close to that of scheme 2. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 14. Cover outage optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g014 In Fig 15, the covert rate of is plotted as a function of the transmit . As observed, exploiting scheme 2 provides a public rate for higher than Scheme 1 but results in a lower covert rage for , and vice versa. However, schemes 1 and 2 do not consider the OP, SOP, and DEP requirements. Thus, if these constraints are accounted for covert communication and our proposed method in (48) is used, we can observe that when the target covert rate of is small, the system has great change to allocate higher power level to enhance ’s covert rate. Specifically, when , the covert rate of can enhance up to 0.5 bps/Hz compared to Scheme 1 and 2 bps/Hz over Scheme 2. However, , the covert rate of is decreased since a lower PA level is required to meet the DEP demand as analyzed in Remark 1. Although the covert rate of is decreased, it remains higher than Scheme 2 and the public rate is indeed better than that of Scheme 1. These show that our proposed approach can efficiently capture the security risks and provide sustainable transmission with specific network conditions. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 15. User rate optimization versus SNR . Setups: a) r1 = 0.25 bps/Hz, R1 = r2 = 0.5 bps/Hz, dB, and ℓ = 10−3. b) r1 = 0.5 bps/Hz, R1 = 0.25 bps/Hz, dB, and ℓ = 10−3. https://doi.org/10.1371/journal.pone.0317289.g015 5 Conclusion This work provided a comprehensive analysis of the NOMA system with users and external eavesdroppers in terms of outage transmission, secrecy outage performance and detection error. Under artificial noise generated by the jammer, closed-form for the OP, SOP, and DEP had been derived in terms of exact and asymptotic manner. Moreover, the covert and public rate formulas were also derived in exact and asymptotic. To enhance covert transmission, two optimization problems of covert outage minimization and covert rate maximization subject to the OP, SOP, and DEP requirements had been formulated and addressed, where we relied on the developed OP, SOP, and DEP to find the sub-optimal PA coefficient by closed-form expressions. Finally, we validated the developed mathematical and optimization frameworks by numerical results. Some key findings can be deduced from investigations of numerical result studies as follows: Deploying the jamming node plays an important role in preventing potential external eavesdroppers. Specifically, increasing the jamming power not only causes more errors for the monitoring but also eavesdropping, leading to higher DEP and smaller SOP performances, respectively. There exists a trade-off in allocating the transmit power between public and covert signals, where increasing the PA coefficient ρ almost improves the OP of but it yields a down-up trend on the OP of . As for the ergodic rate aspect, increasing the PA coefficient ρ helps increase the capacity of but decreases that of . Given a fixed jamming power constraint, by exploring our proposed approach, the system can significantly improve the OP/cover rate of covert communication while ensuring the performance requirements of the OP of users, the SOP, and the DEP. Since there is still much room that has not been covered yet, it is interesting to further investigate in the near future works, such as multi-antenna transmission, generalized channel models (e.g., Nakgami-m or Rician), untrusted near–trusted far user scenarios, multi eavesdroppers with colluding and non-colluding situations, imperfect channel estimation, and the issues of joint secure and covert energy efficiency. Besides, extending this study to backscatter communication [30] along with coverage enhancement with a reconfigurable surface can be regarded as a great potential direction for less-battery networks. Supporting information S1 File. The simulation code used in this work can be found at: MatlabCode. https://doi.org/10.1371/journal.pone.0317289.s001 (ZIP) TI - Enhancing covert communication in NOMA systems with joint security and covert design JF - PLoS ONE DO - 10.1371/journal.pone.0317289 DA - 2025-01-13 UR - https://www.deepdyve.com/lp/public-library-of-science-plos-journal/enhancing-covert-communication-in-noma-systems-with-joint-security-and-SWUOYiBTUX SP - e0317289 VL - 20 IS - 1 DP - DeepDyve ER -