Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band

Covert communication can prevent an adversary from knowing that a transmission has occurred between two users. In this article, we consider covert wireless communications in an Internet-of-Things (IoT) network with dense deployment, where an IoT device experiences not only the background noise but also the aggregates interference from other Tx devices. Our results show that in a dense IoT network with lower frequency AWGN channels, when the distance between Alice and the adversary Willie <inline-formula> <tex-math notation="LaTeX">$d_{a,w}=\omega (n^{1/(2\alpha)})$ </tex-math></inline-formula>, Alice can reliably and covertly transmit <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(\log _{2}\sqrt {n})$ </tex-math></inline-formula> bits to Bob in <inline-formula> <tex-math notation="LaTeX">$n$ </tex-math></inline-formula> channel uses. In an IoT network with terahertz (THz) band, covert communication is more difficult because Willie can simply place a receiver in the narrow beam between Alice and Bob in order to detect or block their line-of-sight communications. We demonstrated that covert communication is still possible in this occasion by utilizing the reflection or diffuse scattering from a rough surface. From the physical-layer security perspective, covert communication can enhance the security of IoT network from the bottom layer.

[1]  Chuang Lin,et al.  Relationship Privacy Leakage in Network Traffics , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[2]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[3]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[4]  M. Haenggi,et al.  Interference in Large Wireless Networks , 2009, Found. Trends Netw..

[5]  Yevgeni Koucheryavy,et al.  Wideband Terahertz Band Reflection and Diffuse Scattering Measurements for Beyond 5G Indoor Wireless Networks , 2016 .

[6]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[7]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[8]  Jeffrey G. Andrews,et al.  The Effect of Fading, Channel Inversion, and Threshold Scheduling on Ad Hoc Networks , 2007, IEEE Transactions on Information Theory.

[9]  Tommaso Melodia,et al.  Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[10]  Ning Zhang,et al.  Fast mmwave Beam Alignment via Correlated Bandit Learning , 2019, IEEE Transactions on Wireless Communications.

[11]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[12]  Robert H. Deng,et al.  Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything , 2019, IEEE Internet of Things Journal.

[13]  Matthias Hollick,et al.  Practical covert channels for WiFi systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[14]  Yuan Zhang,et al.  Applications of Stochastic Ordering to Wireless Communications , 2011, IEEE Transactions on Wireless Communications.

[15]  Donald F. Towsley,et al.  Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.

[16]  Jianjun Ma,et al.  Security and eavesdropping in terahertz wireless links , 2018, Nature.

[17]  Ian F. Akyildiz,et al.  Terahertz band: Next frontier for wireless communications , 2014, Phys. Commun..

[18]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[19]  Yang Lu,et al.  Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics , 2019, IEEE Internet of Things Journal.

[20]  Xuejun Sha,et al.  On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.

[21]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[22]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[23]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[24]  Jianfeng Ma,et al.  On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).

[25]  Donald F. Towsley,et al.  Quantum noise limited optical communication with low probability of detection , 2013, 2013 IEEE International Symposium on Information Theory.

[26]  P. Beckmann,et al.  The scattering of electromagnetic waves from rough surfaces , 1963 .

[27]  T. Kurner,et al.  Diffuse Scattering From Rough Surfaces in THz Communication Channels , 2011, IEEE Transactions on Terahertz Science and Technology.

[28]  Krzysztof Szczypiorski,et al.  Steganography in OFDM Symbols of Fast IEEE 802.11n Networks , 2013, 2013 IEEE Security and Privacy Workshops.

[29]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[30]  Yevgeni Koucheryavy,et al.  Interference and SINR in Millimeter Wave and Terahertz Communication Systems With Blocking and Directional Antennas , 2017, IEEE Transactions on Wireless Communications.