First- and Second-Order Asymptotics in Covert Communication

被引:78
作者
Tahmasbi, Mehrdad [1 ]
Bloch, Matthieu R. [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
Physical-layer security; covert communications; low probability of detection; Shannon theory;
D O I
10.1109/TIT.2018.2878526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the first- and second-order asymptotics of covert communication over binary-input discrete memory-less channels for three different covertness metrics and under maximum probability of error constraint. When covertness is measured in terms of the relative entropy between the channel output distributions induced with and without communication, we characterize the exact first- and second-order asymptotics of the number of bits that can be reliably transmitted with a maximum probability of error less than epsilon and a relative entropy less than delta. When covertness is measured in terms of the variational distance between the channel output distributions or in terms of the probability of missed detection for fixed probability of false alarm, we establish the exact first-order asymptotics and bound the second-order asymptotics. Pulse position modulation achieves the optimal first-order asymptotics for all three metrics, as well as the optimal second-order asymptotics for relative entropy. The main conceptual contribution of this paper is to clarify how the choice of a covertness metric impacts the information-theoretic limits of covert communications. The main technical contribution underlying our results is a detailed expurgation argument to show the existence of a code satisfying the reliability and covertness criteria.
引用
收藏
页码:2190 / 2212
页数:23
相关论文
共 23 条
[1]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[2]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[3]  
Arumugam KSK, 2016, IEEE INT SYMP INFO, P2229, DOI 10.1109/ISIT.2016.7541695
[4]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[5]  
Bloch M.R., 2017, P IEEE INT S INF THE, P2835
[6]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[7]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[8]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[9]  
Cuff P., 2015, STRONGER SOFT COVERI
[10]   Secure space-time communication [J].
Hero, AO .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) :3235-3249