Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty

Covert communications enable a transmitter to send information reliably in the presence of an adversary, who looks to detect whether the transmission took place or not. We consider covert communications over quasi-static block fading channels, where users suffer from channel uncertainty. We investigate the adversary Willie’s optimal detection performance in two extreme cases, i.e., the case of perfect channel state information (CSI) and the case of channel distribution information (CDI) only. It is shown that in the large detection error regime, Willie’s detection performances of these two cases are essentially indistinguishable, which implies that the quality of CSI does not help Willie in improving his detection performance. This result enables us to study the covert transmission design without the need to factor in the exact amount of channel uncertainty at Willie. We then obtain the optimal and suboptimal closed-form solution to the covert transmission design. Our result reveals fundamental difference in the design between the case of quasi-static fading channel and the previously studied case of non-fading AWGN channel.

[1]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[2]  Mohamed-Slim Alouini,et al.  Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information , 2012, IEEE Transactions on Vehicular Technology.

[3]  Ligong Wang On Covert Communication Over Infinite-Bandwidth Gaussian Channels , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[4]  H. Vincent Poor,et al.  Finite Blocklength Information Theory: What Is the Practical Impact on Wireless Communications? , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[5]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[6]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[8]  Mustafa Cenk Gursoy,et al.  On the Capacity and Energy Efficiency of Training-Based Transmissions Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[9]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[10]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[11]  Daniel J. Costello,et al.  Low Latency Coding: Convolutional Codes vs. LDPC Codes , 2012, IEEE Transactions on Communications.

[12]  Giuseppe Durisi,et al.  Quasi-static SIMO fading channels at finite blocklength , 2013, 2013 IEEE International Symposium on Information Theory.

[13]  Matthieu R. Bloch,et al.  Covert Secret Key Generation With an Active Warden , 2019, IEEE Transactions on Information Forensics and Security.

[14]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[15]  Jintao Wang,et al.  Covert communications with extremely low power under finite block length over slow fading , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[16]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[17]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[18]  Feng Shu,et al.  Pilot-Based Channel Estimation Design in Covert Wireless Communication , 2019, ArXiv.

[19]  Jiangzhou Wang,et al.  Effect of channel-estimation error on QAM systems with antenna diversity , 2005, IEEE Trans. Commun..

[20]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[21]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[22]  Ligong Wang The Continuous-Time Poisson Channel Has Infinite Covert Communication Capacity , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[23]  Shihao Yan,et al.  Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints , 2019, IEEE Transactions on Vehicular Technology.

[24]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[25]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[26]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[27]  Steven C. Chapra,et al.  Numerical Methods for Engineers , 1986 .

[28]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[29]  Matthieu R. Bloch,et al.  First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.

[30]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[31]  Mayank Bakshi,et al.  Undetectable Radios: Covert Communication under Spectral Mask Constraints , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[32]  Giuseppe Durisi,et al.  Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength , 2013, IEEE Transactions on Information Theory.

[33]  Branka Vucetic,et al.  Short Block-Length Codes for Ultra-Reliable Low Latency Communications , 2019, IEEE Communications Magazine.

[34]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[35]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[36]  Petar Popovski,et al.  Towards Massive, Ultra-Reliable, and Low-Latency Wireless Communication with Short Packets , 2015 .

[37]  Arumugam Nallanathan,et al.  Resource Allocation for URLLC in 5G Mission-Critical IoT Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[38]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[39]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[40]  Andrea J. Goldsmith,et al.  Capacity and power allocation for fading MIMO channels with channel estimation error , 2006, IEEE Trans. Inf. Theory.

[41]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[42]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[43]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[44]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[45]  Giuseppe Durisi,et al.  Block-Fading Channels at Finite Blocklength , 2013, ISWCS.

[46]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[47]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[48]  Babak Hassibi,et al.  The Effect of Channel Estimation Error on the Throughput of Broadcast Channels , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[49]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[50]  J. Cavers An analysis of pilot symbol assisted modulation for Rayleigh fading channels (mobile radio) , 1991 .

[51]  Matthieu R. Bloch,et al.  Keyless covert communication over Multiple-Access Channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).