{"title":"基于深度学习的窃听和干扰效果下的及时秘密通信","authors":"Maice Costa;Yalin E. Sagduyu","doi":"10.23919/JCN.2023.000034","DOIUrl":null,"url":null,"abstract":"This paper explores the concept of timeliness in covert communications when faced with eavesdropping and jamming. Time-sensitive information is to be transmitted through a wireless channel between a transmitter and a receiver, while an adversary seeks to detect the communication attempts with a deep learning-based classifier (using feedforward or convolutional neural networks). The adversary jams any detected transmission, subject to an average power budget. When the transmit power is set at a high level, the outage probability decreases, resulting in more reliable communication. However, this also increases the accuracy of the adversary's detection, making it more likely for the jammer to successfully identify and jam the communication. On the other hand, using a low transmit power leads to a higher outage probability for communication but decreases the accuracy of the adversary in detecting and disrupting a transmission. The trade-off between reliability, timeliness, and stealthiness in wireless communications is analyzed in this paper by characterizing the Age of Information and its behavior under the influence of eavesdropping and jamming effects. Results indicate novel operation modes for timely and covert communications under eavesdropping and jamming effects.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"25 5","pages":"621-630"},"PeriodicalIF":2.9000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10323425","citationCount":"0","resultStr":"{\"title\":\"Timely and covert communications under deep learning-based eavesdropping and jamming effects\",\"authors\":\"Maice Costa;Yalin E. Sagduyu\",\"doi\":\"10.23919/JCN.2023.000034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explores the concept of timeliness in covert communications when faced with eavesdropping and jamming. Time-sensitive information is to be transmitted through a wireless channel between a transmitter and a receiver, while an adversary seeks to detect the communication attempts with a deep learning-based classifier (using feedforward or convolutional neural networks). The adversary jams any detected transmission, subject to an average power budget. When the transmit power is set at a high level, the outage probability decreases, resulting in more reliable communication. However, this also increases the accuracy of the adversary's detection, making it more likely for the jammer to successfully identify and jam the communication. On the other hand, using a low transmit power leads to a higher outage probability for communication but decreases the accuracy of the adversary in detecting and disrupting a transmission. The trade-off between reliability, timeliness, and stealthiness in wireless communications is analyzed in this paper by characterizing the Age of Information and its behavior under the influence of eavesdropping and jamming effects. Results indicate novel operation modes for timely and covert communications under eavesdropping and jamming effects.\",\"PeriodicalId\":54864,\"journal\":{\"name\":\"Journal of Communications and Networks\",\"volume\":\"25 5\",\"pages\":\"621-630\"},\"PeriodicalIF\":2.9000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10323425\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications and Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10323425/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10323425/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Timely and covert communications under deep learning-based eavesdropping and jamming effects
This paper explores the concept of timeliness in covert communications when faced with eavesdropping and jamming. Time-sensitive information is to be transmitted through a wireless channel between a transmitter and a receiver, while an adversary seeks to detect the communication attempts with a deep learning-based classifier (using feedforward or convolutional neural networks). The adversary jams any detected transmission, subject to an average power budget. When the transmit power is set at a high level, the outage probability decreases, resulting in more reliable communication. However, this also increases the accuracy of the adversary's detection, making it more likely for the jammer to successfully identify and jam the communication. On the other hand, using a low transmit power leads to a higher outage probability for communication but decreases the accuracy of the adversary in detecting and disrupting a transmission. The trade-off between reliability, timeliness, and stealthiness in wireless communications is analyzed in this paper by characterizing the Age of Information and its behavior under the influence of eavesdropping and jamming effects. Results indicate novel operation modes for timely and covert communications under eavesdropping and jamming effects.
期刊介绍:
The JOURNAL OF COMMUNICATIONS AND NETWORKS is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks. Theoretical research contributions presenting new techniques, concepts, or analyses, applied contributions reporting on experiences and experiments, and tutorial expositions of permanent reference value are welcome. The subjects covered by this journal include all topics in communication theory and techniques, communication systems, and information networks. COMMUNICATION THEORY AND SYSTEMS WIRELESS COMMUNICATIONS NETWORKS AND SERVICES.