73 research outputs found
Covert Wireless Communication with a Poisson Field of Interferers
In this paper, we study covert communication in wireless networks consisting
of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a
Poisson field of interferers. Bob and Willie are subject to uncertain shot
noise due to the ambient signals from interferers in the network. With the aid
of stochastic geometry, we analyze the throughput of the covert communication
between Alice and Bob subject to given requirements on the covertness against
Willie and the reliability of decoding at Bob. We consider non-fading and
fading channels. We analytically obtain interesting findings on the impacts of
the density and the transmit power of the concurrent interferers on the covert
throughput. That is, the density and the transmit power of the interferers have
no impact on the covert throughput as long as the network stays in the
interference-limited regime, for both the non-fading and the fading cases. When
the interference is sufficiently small and comparable with the receiver noise,
the covert throughput increases as the density or the transmit power of the
concurrent interferers increases
Privacy Rate
In some situations, a user would like to communicate without detection. It has been shown that it is impossible to achieve positive rate while remaining undetectable to a third party. However, that work assumes that the detector is certain about their own noise power, which inherently has uncertainty because that knowledge is based on a measurement. By exploiting this uncertainty the transmitter can achieve a positive rate while remaining undetectable to a third party. This positive rate is quantified in numerous scenarios: Single Input Single Output (SISO) Additive White Gaussian Noise (AWGN) and Rayleigh channels (with channel state information (CSI) and channel distribution information (CDI)), and Multiple Input Multiple Output (MIMO) Rayleigh channels. Finally, building on previous work, it is shown that for a detector to lower their maximum possibility of an error, they should not take as many samples as possible–a counterintuitive result. This is explained in more detail in the last chapter.M.S
Recommended from our members
COVERT COMMUNICATIONS IN CONTINUOUS-TIME SYSTEMS
This dissertation studies covert wireless communications where a transmitter (Alice) intends to transmit messages to a legitimate receiver (Bob) such that the presence of the message is hidden from an attentive warden (Willie). Here we consider pertinent aspects of covert communications that focus on moving such systems closer to implementation. For example, previous studies use the standard discrete-time communication model when analyzing covert communications, since this is commonly assumed without loss of generality in standard communication theory. However, it is not clear that such a model captures the salient aspects of the continuous-time covert communications problem. A power detector that is optimal for the warden in a discrete-time covert communications scenario may not be optimal on a continuous- time model. Thus, it is of interest to consider this more realistic model for physical channels. After analyzing a power optimization problem using the standard discrete-time model, we move to the key part of system implementation: the instantiation in true continuous-time systems of the discrete-time models studied to this point in the literature. A key goal is to examine Willie’s detection capability on a continuous-time model and study how the limits of covert communications change from the discrete-time case. In particular, we show that detectors for Willie can benefit from the continuous-time setting and outperform detectors based on the discrete-time model; not surprisingly, this has a significant impact on the true covert throughput of the system. Nevertheless, we establish constructions such that efficient covert communications can still be achieved in a continuous-time model, and prove the fundamental limit on the covert communication rate. After considering the continuous-time problem in detail, we then turn to addressing another limitation of previous work - the requirement for an intentional jammer to facilitate efficient covert communication. Instead, we consider how to exploit a pre-existing interference source – a radar - to achieve covert communication. We establish a covert communication scheme in such an environment, and analyze the corresponding covert rate. Finally, we consider the use of a detection technique similar to that in the covert communications problem, in the area of quantized signal detection
Achieving Covert Wireless Communications Using a Full-Duplex Receiver
Covert communications hide the transmission of a message from a watchful
adversary while ensuring a certain decoding performance at the receiver. In
this work, a wireless communication system under fading channels is considered
where covertness is achieved by using a full-duplex (FD) receiver. More
precisely, the receiver of covert information generates artificial noise with a
varying power causing uncertainty at the adversary, Willie, regarding the
statistics of the received signals. Given that Willie's optimal detector is a
threshold test on the received power, we derive a closed-form expression for
the optimal detection performance of Willie averaged over the fading channel
realizations. Furthermore, we provide guidelines for the optimal choice of
artificial noise power range, and the optimal transmission probability of
covert information to maximize the detection errors at Willie. Our analysis
shows that the transmission of artificial noise, although causes
self-interference, provides the opportunity of achieving covertness but its
transmit power levels need to be managed carefully. We also demonstrate that
the prior transmission probability of 0.5 is not always the best choice for
achieving the maximum possible covertness, when the covert transmission
probability and artificial noise power can be jointly optimized.Comment: 13 pages, 11 figures, Accepted for publication in IEEE Transactions
on Wireless Communication
- …