Covert Communication Over the Poisson Channel
نویسندگان
چکیده
We consider the problem of communication over a continuous-time Poisson channel subject to covertness constraint: The relative entropy between output distributions when message is transmitted and no input provided must be small. In absence both bandwidth peak-power constraints, we show covert capacity this channel, in nats per second, infinity. When constraint imposed on input, becomes zero, “square-root scaling law” applies. but imposed, again shown have not determined whether square-root law holds or not.
منابع مشابه
Covert Communication over a K-User Multiple Access Channel
We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself ...
متن کاملCommunication over the Internet using Covert Channels
A covert channel is a mechanism that can be used to communicate data across network or between processes within the system by violating the networks/ systems security policy and in a manner that goes unnoticed. An effective covert channel is the one that is undetectable by the adversary and can provide high degree of privacy. The goal of the covert channel is to communicate data from one host t...
متن کاملCovert Channel Communication by Betterment Steganography
This paper is presenting a betterment steganographic method for covert channel communication. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonzero AC coefficients from S JPEG block, and changes the magnitude values of the first n nonzero AC coefficients from T JPEG blocks. S and T blocks are det...
متن کاملCovert Communication over Slotted ALOHA Systems
This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...
متن کاملCovert Wireless Communication with a Poisson Field of Interferers
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers. Bob and Willie are subject to uncertain shot noise due to the ambient signals from interferers in the network. With the aid of stochastic geometry, we analyze the throughput of the covert communication between Alic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2021
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2021.3053126