Covert communications on continuous-time channels in the presence of jamming

Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.

Original languageEnglish (US)
Title of host publicationConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
EditorsMichael B. Matthews
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1697-1701
Number of pages5
ISBN (Electronic)9781538618233
DOIs
StatePublished - Apr 10 2018
Event51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 - Pacific Grove, United States
Duration: Oct 29 2017Nov 1 2017

Publication series

NameConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Volume2017-October

Conference

Conference51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
CountryUnited States
CityPacific Grove
Period10/29/1711/1/17

Fingerprint

jammers
jamming
Jamming
Continuous Time
Throughput
communication
Continuous-time Model
Communication
Detector
Scaling
Detectors
Co-channel Interference
Discrete-time Model
Channel Model
scaling
Transmitter
Communication Systems
detectors
Timing
Transmitters

ASJC Scopus subject areas

  • Control and Optimization
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Biomedical Engineering
  • Instrumentation

Cite this

Sobers, T. V., Bash, B. A., Guha, S., Towsley, D., & Goeckel, D. (2018). Covert communications on continuous-time channels in the presence of jamming. In M. B. Matthews (Ed.), Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 (pp. 1697-1701). (Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017; Vol. 2017-October). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ACSSC.2017.8335649

Covert communications on continuous-time channels in the presence of jamming. / Sobers, Tamara V.; Bash, Boulat A.; Guha, Saikat; Towsley, Don; Goeckel, Dennis.

Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017. ed. / Michael B. Matthews. Institute of Electrical and Electronics Engineers Inc., 2018. p. 1697-1701 (Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017; Vol. 2017-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sobers, TV, Bash, BA, Guha, S, Towsley, D & Goeckel, D 2018, Covert communications on continuous-time channels in the presence of jamming. in MB Matthews (ed.), Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017. Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017, vol. 2017-October, Institute of Electrical and Electronics Engineers Inc., pp. 1697-1701, 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017, Pacific Grove, United States, 10/29/17. https://doi.org/10.1109/ACSSC.2017.8335649
Sobers TV, Bash BA, Guha S, Towsley D, Goeckel D. Covert communications on continuous-time channels in the presence of jamming. In Matthews MB, editor, Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017. Institute of Electrical and Electronics Engineers Inc. 2018. p. 1697-1701. (Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017). https://doi.org/10.1109/ACSSC.2017.8335649
Sobers, Tamara V. ; Bash, Boulat A. ; Guha, Saikat ; Towsley, Don ; Goeckel, Dennis. / Covert communications on continuous-time channels in the presence of jamming. Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017. editor / Michael B. Matthews. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 1697-1701 (Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017).
@inproceedings{237c2df282224668a46179653f531d9d,
title = "Covert communications on continuous-time channels in the presence of jamming",
abstract = "Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.",
author = "Sobers, {Tamara V.} and Bash, {Boulat A.} and Saikat Guha and Don Towsley and Dennis Goeckel",
year = "2018",
month = "4",
day = "10",
doi = "10.1109/ACSSC.2017.8335649",
language = "English (US)",
series = "Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1697--1701",
editor = "Matthews, {Michael B.}",
booktitle = "Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017",

}

TY - GEN

T1 - Covert communications on continuous-time channels in the presence of jamming

AU - Sobers, Tamara V.

AU - Bash, Boulat A.

AU - Guha, Saikat

AU - Towsley, Don

AU - Goeckel, Dennis

PY - 2018/4/10

Y1 - 2018/4/10

N2 - Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.

AB - Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.

UR - http://www.scopus.com/inward/record.url?scp=85050994249&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85050994249&partnerID=8YFLogxK

U2 - 10.1109/ACSSC.2017.8335649

DO - 10.1109/ACSSC.2017.8335649

M3 - Conference contribution

AN - SCOPUS:85050994249

T3 - Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017

SP - 1697

EP - 1701

BT - Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017

A2 - Matthews, Michael B.

PB - Institute of Electrical and Electronics Engineers Inc.

ER -