Covert Communication in the Presence of an Uninformed Jammer

被引:326
作者
Sobers, Tamara V. [1 ,2 ]
Bash, Boulat A. [3 ]
Guha, Saikat [3 ,4 ]
Towsley, Don [5 ]
Goeckel, Dennis [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
[2] Mitre Corp, Burlington Rd, Bedford, MA 01730 USA
[3] Raytheon BBN, Cambridge, MA 02138 USA
[4] Univ Arizona, Coll Opt Sci, Tucson, AZ 85721 USA
[5] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
Low probability of detection communication; wireless covert communication; physical layer security; LOW PROBABILITY; AWGN CHANNELS; NOISE;
D O I
10.1109/TWC.2017.2720736
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent work has established that when transmitter Alice wishes to communicate reliably to recipient Bob without detection by warden Willie, with additive white Gaussian noise (AWGN) channels between all parties, communication is limited to O(root n) bits in n channel uses. However, this assumes that Willie has an accurate statistical characterization of the channel. When Willie has uncertainty about such and his receiver is limited to a threshold test on the received power, Alice can transmit covertly with a power that does not decrease with n, thus conveying O(n) bits covertly and reliably in n uses of an AWGN channel. Here, we consider covert communication of O(n) bits in n channel uses while generalizing the environment and removing any restrictions on Willie's receiver. We assume that an uninformed "jammer" is present to help Alice, and we consider AWGN and block fading channels. In some scenarios, Willie's optimal detector is a threshold test on the received power. When the channel between the jammer and Willie has multiple fading blocks per codeword, a threshold test on the received power is not optimal. However, we establish that Alice can remain covert with a transmit power that does not decrease with n even when Willie employs an optimal detector.
引用
收藏
页码:6193 / 6206
页数:14
相关论文
共 19 条
[1]   Covert Communication Gains From Adversary's Ignorance of Transmission Time [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) :8394-8405
[2]   Quantum-secure covert communication on bosonic channels [J].
Bash, Boulat A. ;
Gheorghe, Andrei H. ;
Patel, Monika ;
Habif, Jonathan L. ;
Goeckel, Dennis ;
Towsley, Don ;
Guha, Saikat .
NATURE COMMUNICATIONS, 2015, 6
[3]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[4]  
Bash BA, 2012, IEEE INT SYMP INFO, P448, DOI 10.1109/ISIT.2012.6284228
[5]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[6]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[7]  
Che PH, 2014, INFO THEOR WORKSH, P30, DOI 10.1109/ITW.2014.6970786
[8]  
Craver S., 2010, P SOC PHOTO-OPT INS, V7541
[9]  
Fridrich J., 2009, INFORM HIDING
[10]   Covert Communications When the Warden Does Not Know the Background Noise Power [J].
Goeckel, Dennis ;
Bash, Boulat ;
Guha, Saikat ;
Towsley, Don .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (02) :236-239