Second-Order Asymptotics in Covert Communication

نویسندگان

  • Mehrdad Tahmasbi
  • Matthieu R. Bloch
چکیده

We study the firstand second-order asymptotics of covert communication with Pulse-Position Modulation (PPM) over binary-input Discrete Memoryless Channels (DMCs) for three different metrics of covertness. When covertness is measured in terms of the relative entropy between the channel output distributions induced with and without communication, we characterize the exact PPM second-order asymptotics of the number of bits that can be reliably transmitted with a probability of error less than and a relative entropy less than δ. When covertness is measured in terms of the variational distance between the channel output distributions or in terms of the probability of missed detection for fixed probability of false alarm, we establish bounds on the PPM second-order asymptotics. For all three metrics, we show that PPM achieves the optimal first-order asymptotics among all codes; for relative entropy, we show that PPM also achieves the optimal second-order asymptotics among all constant composition codes. The main conceptual contribution of this paper is to clarify how the choice of a covertness metric impacts the information-theoretic limits of the number of covert and reliable bits. The main technical contribution underlying our results is a detailed analysis of the probability of existence of a code satisfying the reliability and covertness criteria.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Developments in Covert Acoustical Communications

The topic of covert acoustical communication in air has produced public attention, lately. In 2013, we presented the fact that infected drones (e.g. laptops) might form covert acoustical mesh networks in air, only utilizing the built-in speakers and microphones. In this article, we aim to present the current state of covert acoustical communication in air. We discuss future forms of covert acou...

متن کامل

Study on Airspace Covert Communication Algorithm of Covert Communication System

Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...

متن کامل

Covert Communications Versus Physical Layer Security

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

متن کامل

Second-order asymptotics in channel coding

BASED on the channel coding theorem, there exists a sequence of codes for the given channel W such that the average error probability goes to 0 when the transmission rate R is less than CW . That is, if the number n of applications of the channel W is sufficiently large, the average error probability of a good code goes to 0. In order to evaluate the average error probability with finite n, we ...

متن کامل

Covert Communication Achieved by A Greedy Relay in Wireless Networks

Covert communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1703.01362  شماره 

صفحات  -

تاریخ انتشار 2017