Multi-Antenna Jamming in Covert Communication

Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, which tries to determine if a transmission took place or not. While covert communication in a basic, vanilla settings where all variables are known to Willie results in the well known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie’s decoder, this transmission may have a positive rate.In this work, we analyze the case where the jammer is equipped with multiple antennas and obtain the optimal transmission strategy of the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie’s and Bob’s noise variance. We show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie.

[1]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[2]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[3]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[4]  R. Pavur,et al.  Quadratic forms involving the complex Gaussian , 1980 .

[5]  Mayank Bakshi,et al.  Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[6]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  A. M. Mathai,et al.  Quadratic forms in random variables : theory and applications , 1992 .

[9]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[10]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[11]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[13]  Amr Abdelaziz,et al.  Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[14]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[15]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[16]  Athina P. Petropulu,et al.  Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Xiaoming Chen,et al.  On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI , 2016, IEEE Transactions on Vehicular Technology.

[18]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[19]  L. Godara Application of antenna arrays to mobile communications. II. Beam-forming and direction-of-arrival considerations , 1997, Proc. IEEE.

[20]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[21]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[22]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[23]  Dennis Goeckel,et al.  Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information , 2019, IEEE Transactions on Vehicular Technology.

[24]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[25]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[26]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[27]  Matthieu R. Bloch,et al.  Keyless covert communication over Multiple-Access Channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[28]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[29]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.