Covert Communications With Constrained Age of Information

نویسندگان

چکیده

In this letter, we consider the requirement of information freshness in covert communications for first time. With artificial noise (AN) generated from a full-duplex (FD) receiver, formulate covertness maximization problem under average age (AoI) constraint to optimize transmit probability signal. particular, not only represents generation rate signal but also prior alternative hypothesis communications, which builds up bridge between and communication covertness. Our analysis shows that best is always 0.5, differs equal probabilities assumption most related works on communications. Furthermore, limitation AoI enlarges at cost reduction leads positive lower bound power non-zero

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert underwater acoustic communications.

Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique. For scenarios that lack a sufficiently low SNR to maintain ...

متن کامل

Covert Communications Employing Wavelet Technology

1 Atlantic Aerospace and Aware are developing a novel class of spread spectrum system architectures for covert communications based on the theory of wavelets. We describe a class of spread spectrum waveforms that are: (1) highly efficient in their use of signal energy; ( 2 ) indistinguishable in appearance from bandpass Gaussian noise; (3) devoid of secondand fourth-order cyclostationary featur...

متن کامل

Covert Communications Versus Physical Layer Security

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

متن کامل

Covert communications through network configuration messages

Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of conc...

متن کامل

Covert Communications Despite Traffic Data Retention

Abstract. We show that Alice and Bob can communicate covertly and anonymously, despite Eve having access to the traffic data of most machines on the Internet. Our protocols take advantage of small amounts of shared state that exist in many TCP/IP stacks, and use them to construct a covert channel. Techniques inspired from Direct Sequence Spread Spectrum (DSSS) are used to make sure that the com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Wireless Communications Letters

سال: 2021

ISSN: ['2162-2337', '2162-2345']

DOI: https://doi.org/10.1109/lwc.2020.3031492