Jamming strategies in covert communication

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be transmitted covertly and reliably in n independent channel uses is (formula presented) (a.k.a the square-root law). Thus, the resulting rate is (formula presented) which goes to zero as (formula presented). However, when a jammer is present and assists Alice by creating uncertainty in Willie’s decoder, this transmission may have a strictly positive rate. In this work, we consider the case where the jammer is equipped with multiple antennas. We analyze this case and present transmission strategies for the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie’s and Bob’s noise variances. Specifically, the analysis is performed for the cases were Bob is equipped with multiple antennas and employs a linear receiver. Our results indicate that the jammer’s transmission strategy is to perform beamforming towards a single direction which depends on the channel coefficients of both the legitimate receiver and the adversary. However, in case Bob is able to cancel the jammer’s interference completely, then the jammer’s strategy becomes independent and may be set according to the channel coefficients of the adversary alone.

Original languageEnglish
Title of host publicationCyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings
EditorsShlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
PublisherSpringer Verlag
Pages1-15
Number of pages15
ISBN (Print)9783030209506
DOIs
StatePublished - 1 Jan 2019
Event3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 - Beer Sheva, Israel
Duration: 27 Jun 201928 Jun 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11527 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019
Country/TerritoryIsrael
CityBeer Sheva
Period27/06/1928/06/19

Keywords

  • Covert communication
  • Jamming
  • MIMO

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Jamming strategies in covert communication'. Together they form a unique fingerprint.

Cite this