Covert Communication Gains From Adversary's Ignorance of Transmission Time

نویسندگان

  • Boulat A. Bash
  • Dennis Goeckel
  • Donald F. Towsley
چکیده

Unlike standard security methods (e.g. encryption), low probability of detection (LPD) communication does not merely protect the information contained in a transmission from unauthorized access, but prevents the detection of a transmission in the first place. In this work we study the impact of secretly prearranging the time of communication. We prove that if Alice has AWGN channels to Bob and the warden, and if she and Bob can choose a single n symbol period slot out of T (n) such slots, keeping the selection secret from the warden (and, thus, forcing him to monitor all T (n) slots), then Alice can reliably transmit O(min{ √ n log T (n), n}) bits to Bob while keeping the warden’s detector ineffective. The result indicates that only an additional log T (n) secret bits need to be exchanged between Alice and Bob prior to communication to produce a multiplicative gain of √ log T (n) in the amount of transmitted covert information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Communication Achieved by A Greedy Relay in Wireless Networks

Covert communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding th...

متن کامل

Study on Airspace Covert Communication Algorithm of Covert Communication System

Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...

متن کامل

Time-Division Transmission is Optimal for Covert Communication over Broadcast Channels

We consider a covert communication scenario where a legitimate transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, also called the warden. The legitimate receivers and the adversary observe the transmission from the legitimate transmitter via a three-user discrete or Gaussian memoryless broadcast cha...

متن کامل

A VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence

Steganography over real-time streaming media is a novel and promising research subject. This paper performs steganography over a typical streaming media, Voice over IP (VoIP), and suggests a new covert communication scheme for interactive secret messages. To resist the statistical detection, a sophisticated compounded pseudorandom sequence, produced by a compounded pseudorandom number generator...

متن کامل

Multi-Hop Routing in Covert Wireless Networks

In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Wireless Communications

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2016