On Likelihood Functions to Minimize KL Divergence in Binary Hypothesis Testing

Kullback-Leibler (KL) divergence is widely used to determine lower bounds on detection error probability for binary hypothesis testing in covert communications and location verification systems. For a Gaussian likelihood function under the null hypothesis ${\mathcal{H}_0}$, it has been proved that it is a Gaussian likelihood function under the alternative hypothesis ${\mathcal{H}_1}$ that minimizes the KL divergence from ${\mathcal{H}_1}$ to ${\mathcal{H}_0}$. Due to the asymmetry of KL divergence, it is still unclear what is the optimal likelihood function under ${\mathcal{H}_1}$ that minimizes the KL divergence from ${\mathcal{H}_0}$ to ${\mathcal{H}_1}$. Surprisingly, in this work we prove that this optimal likelihood function is unachievable.

[1]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[2]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[3]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[4]  Lawrence Wai-Choong Wong,et al.  Geo-Spatial Location Spoofing Detection for Internet of Things , 2016, IEEE Internet of Things Journal.

[5]  S. Brendle,et al.  Calculus of Variations , 1927, Nature.

[6]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[7]  Xiaobo Zhou,et al.  Covert Communications Without Channel State Information at Receiver in IoT systems , 2020, IEEE Internet of Things Journal.

[8]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[9]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[10]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[11]  Shihao Yan,et al.  Location Verification for Emerging Wireless Vehicular Networks , 2019, IEEE Internet of Things Journal.

[12]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[14]  Jianfeng Ma,et al.  On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).

[15]  Xiaohong Jiang,et al.  Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[16]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[17]  Ido Nevat,et al.  Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things , 2017, IEEE Internet of Things Journal.

[18]  C. Ren,et al.  Closed‐form approximations to the error and complementary error functions and their applications in atmospheric science , 2007 .

[19]  Shihao Yan,et al.  Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.