Sorry, you need to enable JavaScript to visit this website.

facebooktwittermailshare

Covert Communications in a Dynamic Interference Environment

Abstract: 

Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of ``covert'' communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the presence of the message. Willie detects Alice's transmission by looking for deviations from the background environment; hence, covert throughput can be increased if Willie has uncertainty about that background environment, as might be caused by user mobility or time-varying jamming. Here, we consider how the dynamics of the background environment impact the throughput of covert communications. Our previous work has shown that a background environment varying a constant number of times per codeword duration can greatly increase the covert throughput. In this paper, we consider the covert throughput for all potential rates of variation of the background. Neither extreme of variation is favorable to Alice: (1) when the background environment varies too quickly relative to the codeword length, Willie can average out the variation and hence limit Alice's covert throughput; (2) when the background environment varies too slowly, Willie can estimate the current environment and again limit Alice's covert throughput. We analyze a detector at Willie that provides an upper bound (converse) to the covert throughput of Alice for all potential rates of variation. Next, we provide an explicit construction for a scheme for Alice that provides a lower bound (achievability) on the covert throughput at each rate of variation.

up
0 users have voted:

Paper Details

Authors:
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha
Submitted On:
22 June 2018 - 1:33pm
Short Link:
Type:
Poster
Event:
Presenter's Name:
Dennis Goeckel
Paper Code:
WA-S1.1
Document Year:
2018
Cite

Document Files

SPAWC_poster_goeckel.pdf

(149)

Subscribe

[1] Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, "Covert Communications in a Dynamic Interference Environment", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3297. Accessed: Apr. 20, 2019.
@article{3297-18,
url = {http://sigport.org/3297},
author = {Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha },
publisher = {IEEE SigPort},
title = {Covert Communications in a Dynamic Interference Environment},
year = {2018} }
TY - EJOUR
T1 - Covert Communications in a Dynamic Interference Environment
AU - Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3297
ER -
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). Covert Communications in a Dynamic Interference Environment. IEEE SigPort. http://sigport.org/3297
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, 2018. Covert Communications in a Dynamic Interference Environment. Available at: http://sigport.org/3297.
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). "Covert Communications in a Dynamic Interference Environment." Web.
1. Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. Covert Communications in a Dynamic Interference Environment [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3297