Covert Communication Over Adversarially Jammed Channels

نویسندگان

چکیده

Suppose that a transmitter Alice potentially wishes to communicate with receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication symmetric channel (BSC( q)), and may maliciously flip (up to) certain fraction p of transmitted bits based his observations. We consider setting where the must be simultaneously covert as well reliable, i.e., should unable accurately distinguish whether or not is communicating, while able correctly recover Alice's message high probability regardless adversarial jamming strategy. show that, unlike passive adversaries, against adversaries requires have shared key (of length at least Ω(logn)) even when has better than James. present lower upper bounds information-theoretically optimal throughput function parameters, desired level covertness, amount available. These match for wide range parameters interest. also develop computationally efficient coding scheme (based concatenated codes) available Ω(√n logn), further this can implemented much less assumed bounded.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication over the Internet using Covert Channels

A covert channel is a mechanism that can be used to communicate data across network or between processes within the system by violating the networks/ systems security policy and in a manner that goes unnoticed. An effective covert channel is the one that is undetectable by the adversary and can provide high degree of privacy. The goal of the covert channel is to communicate data from one host t...

متن کامل

Quantum-secure covert communication on bosonic channels.

Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and ...

متن کامل

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication

This paper argues the need for providing a covert backchannel communication mechanism in authentication protocols, discusses various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate one. The communication would need t...

متن کامل

Covert Communication over Slotted ALOHA Systems

This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...

متن کامل

Time-Division Transmission is Optimal for Covert Communication over Broadcast Channels

We consider a covert communication scenario where a legitimate transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, also called the warden. The legitimate receivers and the adversary observe the transmission from the legitimate transmitter via a three-user discrete or Gaussian memoryless broadcast cha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2021

ISSN: ['0018-9448', '1557-9654']

DOI: https://doi.org/10.1109/tit.2021.3096176