Covert Communications With Constrained Age of Information
نویسندگان
چکیده
In this letter, we consider the requirement of information freshness in covert communications for first time. With artificial noise (AN) generated from a full-duplex (FD) receiver, formulate covertness maximization problem under average age (AoI) constraint to optimize transmit probability signal. particular, not only represents generation rate signal but also prior alternative hypothesis communications, which builds up bridge between and communication covertness. Our analysis shows that best is always 0.5, differs equal probabilities assumption most related works on communications. Furthermore, limitation AoI enlarges at cost reduction leads positive lower bound power non-zero
منابع مشابه
Covert underwater acoustic communications.
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique. For scenarios that lack a sufficiently low SNR to maintain ...
متن کاملCovert Communications Employing Wavelet Technology
1 Atlantic Aerospace and Aware are developing a novel class of spread spectrum system architectures for covert communications based on the theory of wavelets. We describe a class of spread spectrum waveforms that are: (1) highly efficient in their use of signal energy; ( 2 ) indistinguishable in appearance from bandpass Gaussian noise; (3) devoid of secondand fourth-order cyclostationary featur...
متن کاملCovert Communications Versus Physical Layer Security
This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...
متن کاملCovert communications through network configuration messages
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of conc...
متن کاملCovert Communications Despite Traffic Data Retention
Abstract. We show that Alice and Bob can communicate covertly and anonymously, despite Eve having access to the traffic data of most machines on the Internet. Our protocols take advantage of small amounts of shared state that exist in many TCP/IP stacks, and use them to construct a covert channel. Techniques inspired from Direct Sequence Spread Spectrum (DSSS) are used to make sure that the com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Wireless Communications Letters
سال: 2021
ISSN: ['2162-2337', '2162-2345']
DOI: https://doi.org/10.1109/lwc.2020.3031492