Covert Communication over Asynchronous Channels with Timing Advantage

Vidyalaxmi Dani, Venkatesh Ramaiyan, D. Jalihal
{"title":"Covert Communication over Asynchronous Channels with Timing Advantage","authors":"Vidyalaxmi Dani, Venkatesh Ramaiyan, D. Jalihal","doi":"10.1109/ITW48936.2021.9611511","DOIUrl":null,"url":null,"abstract":"We study a problem of covert communication over binary symmetric channels (BSC) in an asynchronous setup. Here, Alice seeks to communicate to Bob over a BSC while trying to be covert with respect to Willie, who observes any communication through possibly a different BSC. When Alice communicates, she transmits a message (using a codeword of length n) at a random time uniformly distributed in a window of size Aw slots. We assume that Bob has side information about the time of transmission leading to a reduced uncertainty of Ab slots for Bob, where $A_{b}\\lt A_{w}$. In this setup, we seek to characterize the limits of covert communication as a function of the timing advantage. When Aw is increasing exponentially in n, we characterize the covert capacity as a function of Aw and Ab. When Aw is increasing sub-exponentially in n, we characterize lower and upper bounds on achievable covert bits and show that positive covert rates are not feasible irrespective of timing advantage. Using numerical work, we illustrate our results for different network scenarios, and also highlight a tradeoff between timing advantage and channel advantage (between Bob and Willie).","PeriodicalId":325229,"journal":{"name":"2021 IEEE Information Theory Workshop (ITW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW48936.2021.9611511","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We study a problem of covert communication over binary symmetric channels (BSC) in an asynchronous setup. Here, Alice seeks to communicate to Bob over a BSC while trying to be covert with respect to Willie, who observes any communication through possibly a different BSC. When Alice communicates, she transmits a message (using a codeword of length n) at a random time uniformly distributed in a window of size Aw slots. We assume that Bob has side information about the time of transmission leading to a reduced uncertainty of Ab slots for Bob, where $A_{b}\lt A_{w}$. In this setup, we seek to characterize the limits of covert communication as a function of the timing advantage. When Aw is increasing exponentially in n, we characterize the covert capacity as a function of Aw and Ab. When Aw is increasing sub-exponentially in n, we characterize lower and upper bounds on achievable covert bits and show that positive covert rates are not feasible irrespective of timing advantage. Using numerical work, we illustrate our results for different network scenarios, and also highlight a tradeoff between timing advantage and channel advantage (between Bob and Willie).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有时序优势的异步信道隐蔽通信
研究了异步设置下二进制对称信道(BSC)上的隐蔽通信问题。在这里,爱丽丝试图通过BSC与鲍勃通信,同时试图对威利保密,威利可能通过不同的BSC观察任何通信。当Alice通信时,她在随机时间发送一条消息(使用长度为n的码字),该消息均匀分布在大小为Aw的窗口槽中。我们假设Bob有关于传输时间的侧信息,导致Bob的Ab个槽的不确定性降低,其中$A_{b}\lt A_{w}$。在这种设置中,我们试图将隐蔽通信的限制描述为时间优势的函数。当Aw随n呈指数增长时,我们将隐蔽容量表征为Aw和Ab的函数。当Aw随n呈次指数增长时,我们表征了可实现隐蔽位的下界和上界,并表明无论时间优势如何,正隐蔽率都是不可实现的。使用数值工作,我们说明了不同网络场景下的结果,并强调了时序优势和信道优势(在Bob和Willie之间)之间的权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Amplitude Constrained Poisson Noise Channel: Properties of the Capacity-Achieving Input Distribution Identification under Effective Secrecy Exact Recovery in the Balanced Stochastic Block Model with Side Information Coding Theorems on Digital Fingerprinting Coding under Informed and Uninformed Setups Two-dimensional Lee-Error-Correcting Codes on Hexagonal Signal Constellations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1