Is Gaussian Signalling Optimal for Covert Communications?

While Gaussian signalling is assumed in many studies on covert communications, its optimality has not been carefully investigated. In this work, we examine this optimality by considering the approach of upper bounding D(p<sub>0</sub> (y)‖p<sub>1</sub> (y)) as the covert communication constraint, where D(p<sub>0</sub>(y)‖p<sub>1</sub>(y)) is the Kullback-Leibler divergence from p<sub>0</sub> (y) to p<sub>1</sub>(y), p<sub>0</sub>(y) and p<sub>1</sub> (y) are the likelihood functions of the observation y at the warden under the null hypothesis (no covert transmission) and alternative hypothesis (a covert transmission occurs), respectively. Considering additive white Gaussian noise at both the receiver and the warden, we prove that Gaussian signalling is not optimal in terms of maximizing the mutual information of transmitted and received signals for covert communications with D(p<sub>0</sub>(y)‖p<sub>1</sub> (y)) ≤ 2∊<sup>2</sup> as the constraint. We also explicitly show a skew-normal signalling can outperform Gaussian signalling in terms of achieving higher mutual information subject to the same covertness constraint D(p<sub>0</sub>(y)‖p<sub>1</sub> (y)) ≤ 2∊<sup>2</sup>.

[1]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[2]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[3]  Jinhong Yuan,et al.  Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels , 2018, IEEE Transactions on Vehicular Technology.

[4]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[5]  R. Bellman Calculus of Variations (L. E. Elsgolc) , 1963 .

[6]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[7]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[8]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[9]  Adelchi Azzalini,et al.  The Skew-Normal and Related Families , 2018 .

[10]  Jun Li,et al.  Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).

[11]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[12]  Xiaohong Jiang,et al.  Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[13]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[14]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[15]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[16]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[17]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.

[18]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[19]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[20]  Feng Shu,et al.  Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.

[21]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[22]  Donald F. Towsley,et al.  Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.