Covert Communication Gains From Adversary's Ignorance of Transmission Time
نویسندگان
چکیده
Unlike standard security methods (e.g. encryption), low probability of detection (LPD) communication does not merely protect the information contained in a transmission from unauthorized access, but prevents the detection of a transmission in the first place. In this work we study the impact of secretly prearranging the time of communication. We prove that if Alice has AWGN channels to Bob and the warden, and if she and Bob can choose a single n symbol period slot out of T (n) such slots, keeping the selection secret from the warden (and, thus, forcing him to monitor all T (n) slots), then Alice can reliably transmit O(min{ √ n log T (n), n}) bits to Bob while keeping the warden’s detector ineffective. The result indicates that only an additional log T (n) secret bits need to be exchanged between Alice and Bob prior to communication to produce a multiplicative gain of √ log T (n) in the amount of transmitted covert information.
منابع مشابه
Covert Communication Achieved by A Greedy Relay in Wireless Networks
Covert communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding th...
متن کاملStudy on Airspace Covert Communication Algorithm of Covert Communication System
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...
متن کاملTime-Division Transmission is Optimal for Covert Communication over Broadcast Channels
We consider a covert communication scenario where a legitimate transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, also called the warden. The legitimate receivers and the adversary observe the transmission from the legitimate transmitter via a three-user discrete or Gaussian memoryless broadcast cha...
متن کاملA VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence
Steganography over real-time streaming media is a novel and promising research subject. This paper performs steganography over a typical streaming media, Voice over IP (VoIP), and suggests a new covert communication scheme for interactive secret messages. To resist the statistical detection, a sophisticated compounded pseudorandom sequence, produced by a compounded pseudorandom number generator...
متن کاملMulti-Hop Routing in Covert Wireless Networks
In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. Wireless Communications
دوره 15 شماره
صفحات -
تاریخ انتشار 2016