Covert wireless communication with artificial noise generation

Ramin Soltani, Dennis Goeckel, Don Towsley, Boulat A. Bash, Saikat Guha

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Abstract

Covert communication conceals the transmission of the message from an attentive adversary. Recent work on the limits of covert communication in additive white Gaussian noise channels has demonstrated that a covert transmitter (Alice) can reliably transmit a maximum of O(√n) bits to a covert receiver (Bob) without being detected by an adversary (Warden Willie) in n channel uses. This paper focuses on the scenario where other 'friendly' nodes distributed according to a two-dimensional Poisson point process with density m are present. We propose a strategy where the friendly node closest to the adversary, without close coordination with Alice, produces artificial noise. We show that this method allows Alice to reliably and covertly send O(min {{n,mgamma/2√n) bits to Bob in n channel uses, where γ is the path-loss exponent. We also consider a setting where there are Nw collaborating adversaries uniformly and randomly located in the environment and show that in n channel uses, Alice can reliably and covertly send O(min n,(mgamma/2} √n/Nw γ) bits to Bob when γ >2 , and O(min {n,(m√n/Nw 2log2 Nw)) when γ = 2. Conversely, we demonstrate that no higher covert throughput is possible for γ >2.

Original languageEnglish (US)
Article number8445707
Pages (from-to)7252-7267
Number of pages16
JournalIEEE Transactions on Wireless Communications
Volume17
Issue number11
DOIs
StatePublished - Nov 2018

Keywords

  • Covert communication
  • additive white Gaussian noise
  • artificial noise generation
  • jamming
  • low probability of detection
  • security and privacy
  • wireless communication

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Covert wireless communication with artificial noise generation'. Together they form a unique fingerprint.

Cite this