Covert Communications in a Dynamic Interference Environment

Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of “covert” communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the presence of the message. Willie detects Alice's transmission by looking for deviations from the background environment; hence, covert throughput can be increased if Willie has uncertainty about that background environment, as might be caused by user mobility or time-varying jamming. Here, we consider how the dynamics of the background environment impact the throughput of covert communications. Our previous work has shown that a background environment varying a constant number of times per codeword duration can greatly increase the covert throughput. In this paper, we consider the covert throughput for all potential rates of variation of the background. Neither extreme of variation is favorable to Alice: (1) when the background environment varies too quickly relative to the codeword length, Willie can average out the variation and hence limit Alice's covert throughput; (2) when the background environment varies too slowly, Willie can estimate the current environment and again limit Alice's covert throughput. We analyze a detector at Willie that provides an upper bound (converse) to the covert throughput of Alice for all potential rates of variation. Next, we provide an explicit construction for a scheme for Alice that provides a lower bound (achievability) on the covert throughput at each rate of variation.

[1]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[2]  Donald F. Towsley,et al.  Covert communication over classical-quantum channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[3]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[4]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[5]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[6]  Nick Letzepis Optimal power allocation for parallel Gaussian channels with LPD constraints , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[7]  Donald F. Towsley,et al.  Quantum noise limited optical communication with low probability of detection , 2013, 2013 IEEE International Symposium on Information Theory.

[8]  Matthieu R. Bloch,et al.  Second-order asymptotics of covert communications over noisy channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[9]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[10]  Donald F. Towsley,et al.  Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[11]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[13]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[14]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[15]  Mayank Bakshi,et al.  Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[16]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[17]  Donald F. Towsley,et al.  Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[19]  Victor S. Frost,et al.  Quantifying Covertness in the Presence of Primary Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[20]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[21]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[22]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[23]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[24]  Donald F. Towsley,et al.  Covert communications on continuous-time channels in the presence of jamming , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.

[25]  Robert J. Baxley,et al.  Achieving positive rate with undetectable communication over AWGN and Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[26]  Saikat Guha,et al.  Quantum-secure covert communication on bosonic channels , 2015, Nature Communications.