I. Introduction
With the widespread interconnectivity in sixth-generation (6G) mobile communication [1], the Internet of Things (IoT) assumes a central role in diverse applications, including smart homes and industrial automation. However, the proliferating number of IoT devices inadvertently broadens the scope of potential entry points for threats, thereby elevating the risk of security breaches [2], [3]. Furthermore, while the interconnectivity of IoT networks enables seamless data exchange between devices, it also presents formidable challenges in ensuring data protection during transmission [4]. Covert communication [5], which aims to transmit information while preventing adversaries from detecting the presence of communication, has attracted significant attention in recent years [6]. Due to the unique ability of hiding communication behavior, covert communication offers superior security levels compared to traditional secure communication techniques [7]. The ground-breaking work [8] uncovered the square root limit of covert transmission over an additive white Gaussian noise (AWGN) channel, marking a notable milestone in the field of covert communication. Since then, remarkable progress has been achieved in the information theory of covert communication [9], prompting researchers to delve deeply into various aspects of this intriguing communication paradigm.