Covert communications on renewal packet channels

In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful adversary Willie, has been of great interest. Our recent work introduced the information-theoretic limits for communication by covert users Alice and Bob, over packet channels where the packet timings of legitimate users Jack and Steve are governed by a Poisson point process. Here we consider the extension to timing channels characterized by more general renewal processes of rate λ. We consider two scenarios. In the first scenario, the source of the packets on the channel cannot be authenticated by Willie, and therefore Alice can insert packets into the channel. We show that if the total number of transmitted packets by Jack is N, Alice can covertly insert O(√N)packets and, if she transmits more, she will be detected by Willie. In the second scenario, packets are authenticated by Willie but we assume that Alice and Bob share a secret key; hence, Alice alters the timings of the packets according to a pre-shared codebook with Bob to send information to him over a G/M/1 queue with service rate µ > λ. We show that Alice can covertly and reliably transmit O(N) bits to Bob when the total number of packets sent from Jack to Steve is N.

[1]  Solomon Kullback,et al.  Information Theory and Statistics , 1970, The Mathematical Gazette.

[2]  J. Grandell Aspects of Risk Theory , 1991 .

[3]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[4]  Sergio Verdú,et al.  A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.

[5]  Sergio Verdú,et al.  Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[6]  R. N. Pillai,et al.  On Geometric Infinite Divisibility , 2014, 1409.4022.

[7]  Guillermo Morales-Luna,et al.  On the Existence of Perfect Stegosystems , 2005, IWDW.

[8]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[9]  Evgueni A. Haroutunian,et al.  Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.

[10]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[11]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[12]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Donald F. Towsley,et al.  Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  Donald F. Towsley,et al.  LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.

[15]  On Geometric Infinite Divisibility p-thinning and Cox Processes , 2014, 1409.5948.

[16]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[17]  Donald F. Towsley,et al.  Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[18]  Lizhong Zheng,et al.  Limits of low-probability-of-detection communication over a discrete memoryless channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[19]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[20]  Donald F. Towsley,et al.  Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.