Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band

被引:47
作者
Liu, Zhihong [1 ]
Liu, Jiajia [2 ]
Zeng, Yong [1 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 04期
基金
中国国家自然科学基金;
关键词
AWGN channel; covert communication; Internet of Things (IoT); physical-layer security; terahertz (THz) band; LIMITS;
D O I
10.1109/JIOT.2020.2968153
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication can prevent an adversary from knowing that a transmission has occurred between two users. In this article, we consider covert wireless communications in an Internet-of-Things (IoT) network with dense deployment, where an IoT device experiences not only the background noise but also the aggregates interference from other Tx devices. Our results show that in a dense IoT network with lower frequency AWGN channels, when the distance between Alice and the adversary Willie d(a,w) = omega(n(1/(2 alpha))), Alice can reliably and covertly transmit O(log(2) root n) bits to Bob in n channel uses. In an IoT network with terahertz (THz) band, covert communication is more difficult because Willie can simply place a receiver in the narrow beam between Alice and Bob in order to detect or block their line-of-sight communications. We demonstrated that covert communication is still possible in this occasion by utilizing the reflection or diffuse scattering from a rough surface. From the physical-layer security perspective, covert communication can enhance the security of IoT network from the bottom layer.
引用
收藏
页码:3378 / 3388
页数:11
相关论文
共 30 条
  • [1] Terahertz band: Next frontier for wireless communications
    Akyildiz, Ian F.
    Jornet, Josep Miquel
    Han, Chong
    [J]. PHYSICAL COMMUNICATION, 2014, 12 : 16 - 32
  • [2] Covert Communication Gains From Adversary's Ignorance of Transmission Time
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8394 - 8405
  • [3] Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 26 - +
  • [4] Bash BA, 2013, IEEE INT SYMP INFO, P1715, DOI 10.1109/ISIT.2013.6620520
  • [5] Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1921 - 1930
  • [6] Beckmann P., 1987, SCATTERING ELECTROMA
  • [7] Classen J, 2015, IEEE CONF COMM NETW, P209, DOI 10.1109/CNS.2015.7346830
  • [8] D'Oro S, 2019, IEEE INFOCOM SER, P1585, DOI [10.1109/infocom.2019.8737581, 10.1109/INFOCOM.2019.8737581]
  • [9] On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation
    Fang, Xiaojie
    Zhang, Ning
    Zhang, Shan
    Chen, Dajiang
    Sha, Xuejun
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (08) : 5498 - 5510
  • [10] Evaluating Critical Security Issues of the IoT World: Present and Future Challenges
    Frustaci, Mario
    Pace, Pasquale
    Aloi, Gianluca
    Fortino, Giancarlo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2483 - 2495