Communication Through Jamming Over a Slotted ALOHA Channel

被引:8
作者
Bhadra, Sandeep [1 ]
Bodas, Shreeshankar [2 ]
Shakkottai, Sanjay [2 ]
Vishwanath, Sriram [2 ]
机构
[1] Texas Instruments Inc, DSPS Res & Dev, Dallas, TX 75243 USA
[2] Univ Texas Austin, Dept Elect & Comp Engn, Wireless Networking & Commun Grp, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
ALOHA; covert channel; independent and identically distributed (i.i.d.) coding strategies;
D O I
10.1109/TIT.2008.929965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This correspondence derives hounds on the jamming capacity of a slotted ALOHA system. A system with n legitimate users, each with a Bernoulli arrival process is considered. Packets are temporarily stored at the corresponding user queues, and a slotted ALOHA strategy is used for packet transmissions over the shared channel. The scenario considered is that of a pair of illegitimate users that jam legitimate transmissions in order to communicate over the slotted ALOHA channel. Jamming leads to binary signaling between the illegitimate users, with packet collisions due to legitimate users treated as (multiplicative) noise in this channel. Further, the queueing dynamics at the legitimate users stochastically couples the jamming strategy used by the illegitimate users and the channel evolution. By considering various independent and identically distributed (i.i.d.) jamming strategies, achievable jamming rates over the slotted ALOHA channel are derived. Further, an upper bound on the jamming capacity, over the class of all ergodic jamming policies is derived. These bounds are shown to be light in the limit where the offered system load approaches unity.
引用
收藏
页码:5257 / 5262
页数:6
相关论文
共 10 条
[1]   Bits through queues [J].
Anantharam, V ;
Verdu, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (01) :4-18
[2]  
BHADRA S, 2008, ARXIV08080558V1CSIT
[3]  
DOGU T, 1999, P 3 INT WORKSH INF H, P419
[4]   An information-theoretic and game-theoretic study of timing channels [J].
Giles, J ;
Hajek, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (09) :2455-2477
[5]  
GOLOMB SW, 1980, IEEE T INF THEOR MAY, P372
[6]   SHARED RESOURCE MATRIX METHODOLOGY - AN APPROACH TO IDENTIFYING STORAGE AND TIMING CHANNELS [J].
KEMMERER, RA .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :256-277
[7]  
MOSKOWITZ S, 1994, P COMPASS 94 NEW YOR, P235
[8]   CAPACITY AND CODING FOR THE GILBERT-ELLIOTT CHANNELS [J].
MUSHKIN, M ;
BARDAVID, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (06) :1277-1290
[9]  
SHARMA V, 2001, P INT S INF THEOR WA
[10]  
VERDU S, 1994, IEEE T INF THEORY, V40