Gaussian Signalling for Covert Communications

In this paper, we examine the optimality of Gaussian signalling for covert communications with an upper bound on <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{1}}||p_{_{0}})$ </tex-math></inline-formula> or <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{0}}||p_{_{1}})$ </tex-math></inline-formula> as the covertness constraint, where <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{1}}||p_{_{0}})$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{0}}||p_{_{1}})$ </tex-math></inline-formula> are different due to the asymmetry of Kullback–Leibler divergence, <inline-formula> <tex-math notation="LaTeX">$p_{_{0}}(y)$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$p_{_{1}}(y)$ </tex-math></inline-formula> are the likelihood functions of the observation <inline-formula> <tex-math notation="LaTeX">${y}$ </tex-math></inline-formula> at the warden under the null hypothesis (no covert transmission) and alternative hypothesis (a covert transmission occurs), respectively. Considering additive white Gaussian noise at both the receiver and the warden, we prove that the Gaussian signalling is optimal in terms of maximizing the mutual information of transmitted and received signals for covert communications with an upper bound on <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{1}}||p_{_{0}})$ </tex-math></inline-formula> as the constraint. More interestingly, we also prove that the Gaussian signalling is not optimal for covert communications with an upper bound on <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{0}}||p_{_{1}})$ </tex-math></inline-formula> as the constraint, for which as we explicitly show skew-normal signalling can outperform the Gaussian signalling in terms of achieving higher mutual information. Finally, we prove that, for Gaussian signalling, an upper bound on <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{1}}||p_{_{0}})$ </tex-math></inline-formula> is a tighter covertness constraint in that it leads to lower mutual information than the same upper bound on <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{0}}||p_{_{1}})$ </tex-math></inline-formula>, by proving <inline-formula> <tex-math notation="LaTeX">$\mathcal {D}(p_{_{0}}||p_{_{1}}) \leq \mathcal {D}(p_{_{1}}||p_{_{0}})$ </tex-math></inline-formula>.

[1]  Matthieu R. Bloch,et al.  Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[2]  Matthieu R. Bloch,et al.  Error exponent for covert communications over discrete memoryless channels , 2017, 2017 IEEE Information Theory Workshop (ITW).

[3]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[4]  Donald F. Towsley,et al.  Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  M. Bloch,et al.  Second-Order Asymptotics in Covert Communication. , 2017 .

[6]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[7]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[8]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[9]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[10]  Trung Q. Duong Keynote talk #1: Trusted communications with physical layer security for 5G and beyond , 2017, 2017 International Conference on Advanced Technologies for Communications (ATC).

[11]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[13]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[14]  Mayank Bakshi,et al.  Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[15]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[16]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[17]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[18]  Sidharth Jaggi,et al.  Multipath Stealth Communication with Jammers , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[19]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[20]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[21]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[22]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[23]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[24]  Bernard C. Levy,et al.  Principles of Signal Detection and Parameter Estimation , 2008 .

[25]  Xiaohong Jiang,et al.  Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[26]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[27]  Matthieu R. Bloch,et al.  Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.

[28]  Matthieu R. Bloch,et al.  Second-order asymptotics of covert communications over noisy channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[29]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[30]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[31]  Matthieu R. Bloch,et al.  Keyless covert communication over Multiple-Access Channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[32]  Shihao Yan,et al.  Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.

[33]  Adelchi Azzalini,et al.  The Skew-Normal and Related Families , 2018 .

[34]  Matthieu R. Bloch,et al.  Covert communication over broadcast channels , 2017, 2017 IEEE Information Theory Workshop (ITW).

[35]  S. Brendle,et al.  Calculus of Variations , 1927, Nature.

[36]  Marvin K. Simon,et al.  Spread Spectrum Communications Handbook , 1994 .

[37]  Donald F. Towsley,et al.  Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.

[38]  Matthieu R. Bloch,et al.  First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.

[39]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.

[40]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[41]  Matthieu R. Bloch,et al.  Optimal covert communications using pulse-position modulation , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).