Multi-Antenna Jamming in Covert Communication

Ori Shmuel, Asaf Cohen, Omer Gurewitz, Alejandro Cohen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations


Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, which tries to determine if a transmission took place or not. While covert communication in a basic, vanilla settings where all variables are known to Willie results in the well known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, this transmission may have a positive rate.In this work, we analyze the case where the jammer is equipped with multiple antennas and obtain the optimal transmission strategy of the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie's and Bob's noise variance. We show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie.

Original languageEnglish
Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers
Number of pages5
ISBN (Electronic)9781538692912
StatePublished - 1 Jul 2019
Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
Duration: 7 Jul 201912 Jul 2019

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095


Conference2019 IEEE International Symposium on Information Theory, ISIT 2019

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics


Dive into the research topics of 'Multi-Antenna Jamming in Covert Communication'. Together they form a unique fingerprint.

Cite this