Preprint Shadow Wireless Intelligence: Large Language Model-Driven Reasoning in Covert Communications

Published in arXiv preprint arXiv:2505.04068, 2025

Overview

[Preprint] Shadow Wireless Intelligence: Large Language Model-Driven Reasoning in Covert Communications
Fig. 1: Overview of CC technologies: scenarios, evolution, optimization challenges, and enhancement strategies. Source: arXiv

Abstract

Covert Communications (CC) can secure sensitive transmissions in industrial, military, and mission-critical applications within 6G wireless networks. However, traditional optimization methods based on Artificial Noise (AN), power control, and channel manipulation might not adapt to dynamic and adversarial environments due to the high dimensionality, nonlinearity, and stringent real-time covertness requirements. To bridge this gap, we introduce Shadow Wireless Intelligence (SWI), which integrates the reasoning capabilities of Large Language Models (LLMs) with retrieval-augmented generation to enable intelligent decision-making in covert wireless systems. Specifically, we utilize DeepSeek-R1, a mixture-of-experts-based LLM with RL-enhanced reasoning, combined with real-time retrieval of domain-specific knowledge to improve context accuracy and mitigate hallucinations. Our approach develops a structured CC knowledge base, supports context-aware retrieval, and performs semantic optimization, allowing LLMs to generate and adapt CC strategies in real time. In a case study on optimizing AN power in a full-duplex CC scenario, DeepSeek-R1 achieves 85% symbolic derivation accuracy and 94% correctness in the generation of simulation code, outperforming baseline models. These results validate SWI as a robust, interpretable, and adaptive foundation for LLM-driven intelligent covert wireless systems in 6G networks.

Source: arXiv

Recommended citation: Yuanai Xie, Zhaozhi Liu, Xiao Zhang, Shihua Zhang, Rui Hou, Minrui Xu, Ruichen Zhang, and Dusit Niyato. (2025). "Shadow Wireless Intelligence: Large Language Model-Driven Reasoning in Covert Communications" arXiv preprint arXiv:2505.04068.

Paper