Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power

被引:208
作者
Yan, Shihao [1 ]
He, Biao [2 ]
Zhou, Xiangyun [3 ]
Cong, Yirui [4 ]
Swindlehurst, A. Lee [2 ]
机构
[1] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
[2] Univ Calif Irvine, Ctr Pervas Commun & Comp, Irvine, CA 92697 USA
[3] Australian Natl Univ, Res Sch Engn, Canberra, ACT 2601, Australia
[4] Natl Univ Def Technol, Coll Intelligence Sci & Technol, Changsha 410073, Hunan, Peoples R China
基金
澳大利亚研究理事会;
关键词
Covert communications; delay-intolerant; finite blocklength; covertness; random transmit power; LIMITS; AWGN;
D O I
10.1109/TIFS.2018.2846257
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we study delay-intolerant covert communications in additive white Gaussian noise (AWGN) channels with a finite block length, i.e., a finite number of channel uses. Considering the maximum allowable number of channel uses to be N, it is not immediately clear whether the actual number of channel uses, denoted by n, should be as large as N or smaller for covert communications. This is because a smaller n reduces a warden's chance to detect the communications due to fewer observations, but also reduces the chance to transmit information. We show that n = N is indeed optimal to maximize the amount of information bits that can be transmitted, subject to any covert communication constraint in terms of the warden's detection error probability. To better make use of the warden's uncertainty due to the finite block length, we also propose to use uniformly distributed random transmit power to enhance covert communications. Our examination shows that the amount of information that can be covertly transmitted logarithmically increases with the number of random power levels, which indicates that most of the benefit of using random transmit power is achieved with just a few different power levels.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 32 条
[1]  
[Anonymous], 2005, SPRINGER TEXTS STAT, DOI DOI 10.1007/978-3-030-70578-7
[2]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[3]  
[Anonymous], 2011, Probability and Statistics
[4]  
Arumugam KSK, 2016, IEEE INT SYMP INFO, P2229, DOI 10.1109/ISIT.2016.7541695
[5]   Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don ;
Guha, Saikat .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :26-+
[6]  
Bash BA, 2014, IEEE INT SYMP INFO, P606, DOI 10.1109/ISIT.2014.6874904
[7]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[8]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[9]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[10]  
Che PH, 2014, INFO THEOR WORKSH, P227, DOI 10.1109/ITW.2014.6970826