Covert Communication Achieved by a Greedy Relay in Wireless Networks

Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this paper, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source’s message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power and spectrum) allocated only for the purpose of forwarding the source’s information. We propose two strategies for the relay to transmit its covert information, namely rate-control and power-control transmission schemes, for which the source’s detection limits are analyzed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the power-control transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source’s message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmits power).

[1]  Mayank Bakshi,et al.  Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[2]  George K. Karagiannidis,et al.  Full-duplex spectrum sharing in cooperative single carrier systems , 2015, WCNC.

[3]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[4]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[5]  Norbert Goertz,et al.  An Analytical Approach to the Outage Probability of Amplify-and-Forward Relaying with an MRC Receiver , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[6]  ElkashlanMaged,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2017 .

[7]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Jun Li,et al.  Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.

[10]  Chintha Tellambura,et al.  Power delay profile and noise variance estimation for OFDM , 2006, IEEE Communications Letters.

[11]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[12]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[13]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[14]  Shihao Yan,et al.  Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.

[15]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[16]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[17]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[18]  Robert J. Baxley,et al.  Achieving positive rate with undetectable communication Over MIMO rayleigh channels , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[19]  Dominic J. A. Welsh,et al.  Complexity and cryptography - an introduction , 2006 .

[20]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[21]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[22]  Donald F. Towsley,et al.  LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.

[23]  Amr Abdelaziz,et al.  Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[24]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[25]  Donald F. Towsley,et al.  Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[26]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[27]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[28]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[29]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[30]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[31]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[32]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.