Jamming strategies in covert communication

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations

    Abstract

    Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be transmitted covertly and reliably in n independent channel uses is (formula presented) (a.k.a the square-root law). Thus, the resulting rate is (formula presented) which goes to zero as (formula presented). However, when a jammer is present and assists Alice by creating uncertainty in Willie’s decoder, this transmission may have a strictly positive rate. In this work, we consider the case where the jammer is equipped with multiple antennas. We analyze this case and present transmission strategies for the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie’s and Bob’s noise variances. Specifically, the analysis is performed for the cases were Bob is equipped with multiple antennas and employs a linear receiver. Our results indicate that the jammer’s transmission strategy is to perform beamforming towards a single direction which depends on the channel coefficients of both the legitimate receiver and the adversary. However, in case Bob is able to cancel the jammer’s interference completely, then the jammer’s strategy becomes independent and may be set according to the channel coefficients of the adversary alone.

    Original languageEnglish
    Title of host publicationCyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings
    EditorsShlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
    PublisherSpringer Verlag
    Pages1-15
    Number of pages15
    ISBN (Print)9783030209506
    DOIs
    StatePublished - 1 Jan 2019
    Event3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 - Beer Sheva, Israel
    Duration: 27 Jun 201928 Jun 2019

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume11527 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019
    Country/TerritoryIsrael
    CityBeer Sheva
    Period27/06/1928/06/19

    Keywords

    • Covert communication
    • Jamming
    • MIMO

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Jamming strategies in covert communication'. Together they form a unique fingerprint.

    Cite this