Keyless Covert Communication in the Presence of Channel State Information

We consider the problem of covert communication when Channel State Information (CSI) is available non-causally, causally, and strictly causally at both transmitter and receiver, as well as the case when channel state information is only available at the transmitter. Covert communication with respect to an adversary referred to as the "warden", is one in which the distribution induced during communication at the channel output observed by the warden is identical to the output distribution conditioned on an innocent channel-input symbol. In contrast to previous work, we do not assume the availability of a shared key at the transmitter and legitimate receiver; instead shared randomness is extracted from the channel state, in a manner that keeps it secret from the warden despite the influence of the channel state on the warden’s output. When CSI is available at both transmitter and receiver, we derive the covert capacity region; when CSI is only available at the transmitter, we derive inner and outer bounds on the covert capacity. We also derive the covert capacity when the warden’s channel is less noisy with respect to the legitimate receiver. We provide examples for which covert capacity is zero without channel state information, but is positive in the presence of channel state information.

[1]  Aria Nosratinia,et al.  Keyless Covert Communication via Channel State Information , 2020, ArXiv.

[2]  Matthieu R. Bloch,et al.  Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[3]  Matthieu R. Bloch,et al.  First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.

[4]  Gregory W. Wornell,et al.  Covert Communication With Channel-State Information at the Transmitter , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Haim H. Permuter,et al.  Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).

[6]  Hachiro Fujita On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[8]  Eduard A. Jorswieck,et al.  Stealthy keyless secret key generation from degraded sources , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.

[9]  Abbas El Gamal,et al.  Wiretap Channel With Causal State Information , 2012, IEEE Transactions on Information Theory.

[10]  Haim H. Permuter,et al.  Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[11]  Ghosheh Abed Hodtani,et al.  Wiretap channel with strictly causal side information at encoder , 2014, 2014 Iran Workshop on Communication and Information Theory (IWCIT).

[12]  Suhas N. Diggavi,et al.  Secret key agreement using asymmetry in channel state knowledge , 2009, 2009 IEEE International Symposium on Information Theory.

[13]  Aria Nosratinia,et al.  Keyless Covert Communication in the Presence of Non-causal Channel State Information , 2019, 2019 IEEE Information Theory Workshop (ITW).

[14]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[15]  Bin Dai,et al.  Wiretap Channel With Side Information , 2006, ArXiv.

[16]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[17]  Eduard A. Jorswieck,et al.  Stealthy Secret Key Generation , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[18]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[19]  H. Vincent Poor,et al.  The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.

[20]  Masahide Sasaki,et al.  Wiretap Channels With Causal State Information: Strong Secrecy , 2019, IEEE Transactions on Information Theory.

[21]  Vincent Y. F. Tan,et al.  Covert Communication Over a Compound Channel , 2019, ArXiv.

[22]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.