Covert Communication Over the Poisson Channel

نویسندگان

چکیده

We consider the problem of communication over a continuous-time Poisson channel subject to covertness constraint: The relative entropy between output distributions when message is transmitted and no input provided must be small. In absence both bandwidth peak-power constraints, we show covert capacity this channel, in nats per second, infinity. When constraint imposed on input, becomes zero, “square-root scaling law” applies. but imposed, again shown have not determined whether square-root law holds or not.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself ...

متن کامل

Communication over the Internet using Covert Channels

A covert channel is a mechanism that can be used to communicate data across network or between processes within the system by violating the networks/ systems security policy and in a manner that goes unnoticed. An effective covert channel is the one that is undetectable by the adversary and can provide high degree of privacy. The goal of the covert channel is to communicate data from one host t...

متن کامل

Covert Channel Communication by Betterment Steganography

This paper is presenting a betterment steganographic method for covert channel communication. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonzero AC coefficients from S JPEG block, and changes the magnitude values of the first n nonzero AC coefficients from T JPEG blocks. S and T blocks are det...

متن کامل

Covert Communication over Slotted ALOHA Systems

This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...

متن کامل

Covert Wireless Communication with a Poisson Field of Interferers

In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers. Bob and Willie are subject to uncertain shot noise due to the ambient signals from interferers in the network. With the aid of stochastic geometry, we analyze the throughput of the covert communication between Alic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal on selected areas in information theory

سال: 2021

ISSN: ['2641-8770']

DOI: https://doi.org/10.1109/jsait.2021.3053126