Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-24 DOI:10.1109/TIFS.2025.3544957
Bichen Kang;Neng Ye;Jianping An
{"title":"Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users","authors":"Bichen Kang;Neng Ye;Jianping An","doi":"10.1109/TIFS.2025.3544957","DOIUrl":null,"url":null,"abstract":"This paper studies the fundamental limits of covert communications covered by randomly activated overt users in both single-frame and multi-frame transmission scenarios. While traditional covert communications mainly consider concealing signal power characteristics, the existence of overt users provides opportunities such that covert communications can be achieved through the confusion between the users. This benefit is first revealed in single-frame transmission scenario. The major obstacle in analyzing performance limits is that the conventional Kullback-Leibler divergence based covertness measurement becomes infinite. To overcome the intractability, a tighter upper bound of the total variation distance (TVD) is then developed using a novel recursive-iterative approximation. On this basis, the collapse effect of the TVD is derived, which shows that the TVD is strictly less than 1 if the covert user sets the transmit power to be an integer multiple of that of the overt users. Then, we find that <inline-formula> <tex-math>$\\mathcal {O}(N)$ </tex-math></inline-formula>-bit information can be transmitted over N channel uses under the above setting, which breaks the well-known square root law. If the above setting is violated, the TVD instantly approaches 1 as <inline-formula> <tex-math>$N\\rightarrow \\infty $ </tex-math></inline-formula>, and only <inline-formula> <tex-math>$\\mathcal {O}(\\sqrt {N})$ </tex-math></inline-formula>-bit information can be covertly transmitted. To prove this, the detection method of the warden is modified to cope with the random activation of overt users. These conclusions also hold for the transmission with uncertain powers or in fading channels, which resembles realistic wireless transmissions. In multi-frame transmission scenario, however, the access characteristics of overt users can be exposed from a statistical perspective, such that the rate gain disappears and the covert transmission rate drops to <inline-formula> <tex-math>$\\mathcal {O}(\\sqrt {N})$ </tex-math></inline-formula> bits per frame. To obtain a positive covert transmission rate, we propose a rate-splitting based covert transmission scheme that introduces an opportunistic access branch to bring randomness, through which the covert user can transmit up to <inline-formula> <tex-math>$\\mathcal {O}(NL)$ </tex-math></inline-formula>-bit information over L frames.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"2480-2495"},"PeriodicalIF":8.0000,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10900397/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper studies the fundamental limits of covert communications covered by randomly activated overt users in both single-frame and multi-frame transmission scenarios. While traditional covert communications mainly consider concealing signal power characteristics, the existence of overt users provides opportunities such that covert communications can be achieved through the confusion between the users. This benefit is first revealed in single-frame transmission scenario. The major obstacle in analyzing performance limits is that the conventional Kullback-Leibler divergence based covertness measurement becomes infinite. To overcome the intractability, a tighter upper bound of the total variation distance (TVD) is then developed using a novel recursive-iterative approximation. On this basis, the collapse effect of the TVD is derived, which shows that the TVD is strictly less than 1 if the covert user sets the transmit power to be an integer multiple of that of the overt users. Then, we find that $\mathcal {O}(N)$ -bit information can be transmitted over N channel uses under the above setting, which breaks the well-known square root law. If the above setting is violated, the TVD instantly approaches 1 as $N\rightarrow \infty $ , and only $\mathcal {O}(\sqrt {N})$ -bit information can be covertly transmitted. To prove this, the detection method of the warden is modified to cope with the random activation of overt users. These conclusions also hold for the transmission with uncertain powers or in fading channels, which resembles realistic wireless transmissions. In multi-frame transmission scenario, however, the access characteristics of overt users can be exposed from a statistical perspective, such that the rate gain disappears and the covert transmission rate drops to $\mathcal {O}(\sqrt {N})$ bits per frame. To obtain a positive covert transmission rate, we propose a rate-splitting based covert transmission scheme that introduces an opportunistic access branch to bring randomness, through which the covert user can transmit up to $\mathcal {O}(NL)$ -bit information over L frames.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
实现随机激活的公开用户覆盖的秘密通信的正率
本文研究了随机激活的公开用户在单帧和多帧传输场景下隐蔽通信的基本限制。传统的隐蔽通信主要考虑隐藏信号功率特性,而公开用户的存在为隐蔽通信的实现提供了机会,通过用户之间的混淆实现隐蔽通信。这种好处首先在单帧传输场景中显示出来。分析性能极限的主要障碍是传统的基于Kullback-Leibler散度的隐度测量变得无限。为了克服这一困难,利用一种新的递归迭代近似,建立了更严格的总变差距离上界。在此基础上,推导了TVD的坍缩效应,表明当隐蔽用户将发射功率设置为公开用户发射功率的整数倍时,TVD严格小于1。然后,我们发现在上述设置下,$\mathcal {O}(N)$ -bit的信息可以通过N个通道传输,这打破了众所周知的平方根定律。如果违反上述设置,TVD立即趋近于1为$N\rightarrow \infty $,只能隐蔽传输$\mathcal {O}(\sqrt {N})$位信息。为了证明这一点,修改了监狱长的检测方法,以应对公开用户的随机激活。这些结论同样适用于功率不确定或在衰落信道中的传输,这与实际的无线传输相似。然而,在多帧传输场景中,可以从统计的角度暴露出显性用户的接入特征,从而使速率增益消失,隐蔽传输速率降至$\mathcal {O}(\sqrt {N})$位/帧。为了获得正的隐蔽传输速率,我们提出了一种基于速率分裂的隐蔽传输方案,该方案引入了机会访问分支来带来随机性,通过该方案,隐蔽用户可以在L帧内传输高达$\mathcal {O}(NL)$ -bit的信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design Frequency Hopping Waveform Design for Secure Integrated Sensing and Communications AtomXross: Towards General Cross-Chain Transaction Neural Architecture Search based Global-local Vision Mamba for Palm-Vein Recognition Differentially Private Zeroth-Order Methods for Scalable Large Language Model Fine-tuning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1