1,228 research outputs found
Multi-User Cooperation for Covert Communication Under Quasi-Static Fading
This work studies a covert communication scheme for an uplink multi-user
scenario in which some users are opportunistically selected to help a covert
user. In particular, the selected users emit interfering signals via an
orthogonal resource dedicated to the covert user together with signals for
their own communications using orthogonal resources allocated to the selected
users, which helps the covert user hide the presence of the covert
communication. For the covert communication scheme, we carry out extensive
analysis and find system parameters in closed forms. The analytic derivation
for the system parameters allow one to find the optimal combination of system
parameters by performing a simple one-dimensional search. In addition, the
analytic results elucidate relations among the system parameters. In
particular, it will be proved that the optimal strategy for the non-covert
users is an on-off scheme with equal transmit power. The theoretical results
derived in this work are confirmed by comparing them with numerical results
obtained with exhaustive searches. Finally, we demonstrate that the results of
work can be utilized in versatile ways by demonstrating a design of covert
communication with energy efficiency into account.Comment: 13 pages, 8 figures, This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessibl
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
This paper investigates reliable and covert transmission strategies in a
multiple-input multiple-output (MIMO) wiretap channel with a transmitter,
receiver and an adversarial wiretapper, each equipped with multiple antennas.
In a departure from existing work, the wiretapper possesses a novel capability
to act either as a passive eavesdropper or as an active jammer, under a
half-duplex constraint. The transmitter therefore faces a choice between
allocating all of its power for data, or broadcasting artificial interference
along with the information signal in an attempt to jam the eavesdropper
(assuming its instantaneous channel state is unknown). To examine the resulting
trade-offs for the legitimate transmitter and the adversary, we model their
interactions as a two-person zero-sum game with the ergodic MIMO secrecy rate
as the payoff function. We first examine conditions for the existence of
pure-strategy Nash equilibria (NE) and the structure of mixed-strategy NE for
the strategic form of the game.We then derive equilibrium strategies for the
extensive form of the game where players move sequentially under scenarios of
perfect and imperfect information. Finally, numerical simulations are presented
to examine the equilibrium outcomes of the various scenarios considered.Comment: 27 pages, 8 figures. To appear, IEEE Transactions on Signal
Processin
Insertion d'Information Furtive dans un Code Broadcast Donné
International audienceGiven a code used to send a message to two receivers through a degraded discrete memoryless broadcast channel (DM-BC), the sender wishes to alter the codewords to achieve the following goals: (i) the original broadcast communication continues to take place, possibly at the expense of a tolerable increase of the decoding error probability; and (ii) an additional covert message can be transmitted to the stronger receiver such that the weaker receiver cannot detect the existence of this message. The main results are: (a) feasibility of covert communications is proven by using a random coding argument for general DM-BCs; and (b) necessary conditions for establishing covert communications are described and an impossibility (converse) result is presented for a particular class of DM-BCs. Together, these results characterize the asymptotic fundamental limits of covert communications for this particular class of DM-BCs within an arbitrarily small gap.Etant donné un code utilisé pour transmettre un message à deux récepteurs à travers un canal broadcast discret sans mémoire (BC-DM), le transmetteur a pour but d'altérer les mots-code pour répondre à deux objectifs: (i) la transmission du message original continue, possiblement au prix d'une augmentation tolérable de la probabilité d'erreur de décodage; et (ii) un message furtif additionel peut être transmis au récepteur le plus fort de sorte que le récepteur le plus faible ne puisse détecter l'existence de ce message. Les résultats principaux sont: (a) la faisabilité de la communication furtive est prouvée en utilisant un argument de codage aléatoire pour des canaux BC-DM généraux; et (b) les conditions nécessaires pour établir la communication furtive sont décrites et un résultat d'impossibilité est présenté pour une classe particulière de BC-DM. Ces résultats caractérisent la limite fondamentale pour les communications furtives pour une classe particulière de BC-DM
Encrypted CDMA audio network
We present a secure LAN using sound as the physical layer for low speed applications. In particular, we show a real implementation of a point-to-point or point-to-multipoint secure acoustic network, having a short range, consuming a negligible amount of power, and requiring no specific hardware on mobile clients. The present acoustic network provides VPN-like private channels to multiple users sharing the same medium. It is based on Time-hopping CDMA, and makes use of an encrypted Bloom filter. An asymmetrical error-correction is used to supply data integrity, even in the presence of strong interference. Simulations and real experiments show its feasibility. We also provide some theoretical analysis on the principle of operation.Fil: Ortega, Alfredo A.. Instituto Tecnológico de Buenos Aires; ArgentinaFil: Bettachini, Victor. Instituto Tecnológico de Buenos Aires; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Fierens, Pablo Ignacio. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina. Instituto Tecnológico de Buenos Aires; ArgentinaFil: Alvarez Hamelin, Jose Ignacio. Instituto Tecnológico de Buenos Aires; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentin
- …