Multi-Antenna Jamming in Covert Communication

Ori Shmuel, Asaf Cohen, Omer Gurewitz, Alejandro Cohen

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations

    Abstract

    Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, which tries to determine if a transmission took place or not. While covert communication in a basic, vanilla settings where all variables are known to Willie results in the well known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, this transmission may have a positive rate.In this work, we analyze the case where the jammer is equipped with multiple antennas and obtain the optimal transmission strategy of the jammer in order to maximize his assistance to Alice, in terms of maximizing a ratio between Willie's and Bob's noise variance. We show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie.

    Original languageEnglish
    Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
    PublisherInstitute of Electrical and Electronics Engineers
    Pages987-991
    Number of pages5
    ISBN (Electronic)9781538692912
    DOIs
    StatePublished - 1 Jul 2019
    Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
    Duration: 7 Jul 201912 Jul 2019

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    Volume2019-July
    ISSN (Print)2157-8095

    Conference

    Conference2019 IEEE International Symposium on Information Theory, ISIT 2019
    Country/TerritoryFrance
    CityParis
    Period7/07/1912/07/19

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Multi-Antenna Jamming in Covert Communication'. Together they form a unique fingerprint.

    Cite this