TY - GEN
T1 - Multi-Antenna Jamming in Covert Communication
AU - Shmuel, Ori
AU - Cohen, Asaf
AU - Gurewitz, Omer
AU - Cohen, Alejandro
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7/1
Y1 - 2019/7/1
N2 - Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, which tries to determine if a transmission took place or not. While covert communication in a basic, vanilla settings where all variables are known to Willie results in the well known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, this transmission may have a positive rate.In this work, we analyze the case where the jammer is equipped with multiple antennas and obtain the optimal transmission strategy of the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie's and Bob's noise variance. We show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie.
AB - Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, which tries to determine if a transmission took place or not. While covert communication in a basic, vanilla settings where all variables are known to Willie results in the well known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, this transmission may have a positive rate.In this work, we analyze the case where the jammer is equipped with multiple antennas and obtain the optimal transmission strategy of the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie's and Bob's noise variance. We show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie.
UR - http://www.scopus.com/inward/record.url?scp=85073152129&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2019.8849607
DO - 10.1109/ISIT.2019.8849607
M3 - Conference contribution
AN - SCOPUS:85073152129
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 987
EP - 991
BT - 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PB - Institute of Electrical and Electronics Engineers
T2 - 2019 IEEE International Symposium on Information Theory, ISIT 2019
Y2 - 7 July 2019 through 12 July 2019
ER -