Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3643833.3656117acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper
Open access

Covert Communications with Simultaneous Multi-Modal Transmission

Published: 27 May 2024 Publication History

Abstract

In this paper, we develop an approach to exploit multiple disparate wireless communication technologies simultaneously to enhance covertness of a communication link. Specifically, given two available communication modalities between a pair of friendly nodes (Alice and Bob), the goal is to evade detection by an adversary (Willie) who is equipped with a radiometer covering the frequency bands of both modalities. We propose a joint detection threshold optimization technique from Willie's point of view. We also develop a joint transmit power optimization strategy for Alice to maximize covertness while meeting the throughput requirement at Bob. Through numerical simulations we show that the proposed scheme matches the performance of exhaustive search method while reducing the computational time by 98% and also improves the covertness by 56% compared to a naïve benchmark scheme.

References

[1]
Keerthi Suria Kumar Arumugam and Matthieu R. Bloch. 2016. Keyless covert communication over Multiple-Access Channels. In 2016 IEEE International Symposium on Information Theory (ISIT). 2229--2233. https://doi.org/10.1109/ISIT.2016.7541695
[2]
Boulat A. Bash, Dennis Goeckel, and Don Towsley. 2013. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE Journal on Selected Areas in Communications, Vol. 31, 9 (2013), 1921--1930. https://doi.org/10.1109/JSAC.2013.130923
[3]
Pak Hou Che, Mayank Bakshi, and Sidharth Jaggi. 2013. Reliable deniable communication: Hiding messages in noise. In 2013 IEEE International Symposium on Information Theory. 2945--2949. https://doi.org/10.1109/ISIT.2013.6620765
[4]
Jihun Choi and Fikadu T. Dagefu. 2023. A Compact Three-Port Antenna With Enhanced Inter-Port Isolation for Polarization and Pattern Diversity. IEEE Access, Vol. 11 (2023), 111402--111409. https://doi.org/10.1109/ACCESS.2023.3322979
[5]
EMAG Technologies Inc. [n.,d.]. EM.Cube. https://emagtech.com/em-cube/ [Online; accessed 15-October-2023].
[6]
Biao He, Shihao Yan, Xiangyun Zhou, and Vincent K. N. Lau. 2017. On Covert Communication With Noise Uncertainty. IEEE Communications Letters, Vol. 21, 4 (2017), 941--944. https://doi.org/10.1109/LCOMM.2016.2647716
[7]
Alfred O. Hero. 2003. Secure space-time communication. IEEE Trans. Inf. Theory, Vol. 49, 12 (Dec. 2003), 3235--3249.
[8]
Justin Kong, Fikadu T. Dagefu, Jihun Choi, Rahul Aggarwal, and Predrag Spasojevic. 2023. Covert Communication in Intelligent Reflecting Surface Assisted Networks With a Friendly Jammer. IEEE Transactions on Vehicular Technology (2023), 1--6. https://doi.org/10.1109/TVT.2023.3310917
[9]
Justin Kong, Fikadu T. Dagefu, Jihun Choi, and Predrag Spasojevic. 2021. Intelligent reflecting surface assisted covert communication with transmission probability optimization. IEEE Wireless Commun. Lett., Vol. 10 (Aug. 2021), 1825--1829.
[10]
Justin Kong, Fikadu T. Dagefu, Jihun Choi, Predrag Spasojevic, and Chryssalenia Koumpouzi. 2022. Covert Communications in Low-VHF/Microwave Heterogeneous Networks. In 2022 IEEE Wireless Communications and Networking Conference (WCNC). 1970--1975. https://doi.org/10.1109/WCNC51071.2022.9771821
[11]
Chryssalenia Koumpouzi, Fikadu T. Dagefu, Jihun Choi, Justin Kong, and Predrag Spasojevic. 2023. Exploiting Polarization Diversity to Improve Cyclostationary-Based LPD Properties of CDMA. IEEE Wireless Communications Letters, Vol. 12, 1 (2023), 6--10. https://doi.org/10.1109/LWC.2022.3213974
[12]
Tiejun Lv, Hui Gao, and Shaoshi Yang. 2015. Secrecy Transmit Beamforming for Heterogeneous Networks. IEEE Journal on Selected Areas in Communications, Vol. 33, 6 (2015), 1154--1170. https://doi.org/10.1109/JSAC.2015.2416984
[13]
Ruiqian Ma, Xiaoqin Yang, Gaofeng Pan, Xinrong Guan, Yu Zhang, and Weiwei Yang. 2021. Covert communications with channel inversion power control in the finite blocklength regime. IEEE Wireless Commun. Lett., Vol. 10 (Apr. 2021), 835--839.
[14]
Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, and Dennis Goeckel. 2018. Multi-Hop Routing in Covert Wireless Networks. IEEE Transactions on Wireless Communications, Vol. 17, 6 (2018), 3656--3669. https://doi.org/10.1109/TWC.2018.2812881
[15]
Ligong Wang, Gregory W. Wornell, and Lizhong Zheng. 2016. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory, Vol. 62 (Jun. 2016), 3493--3503.
[16]
Shihao Yan, Biao He, Xiangyun Zhou, Yirui Cong, and A Lee Swindlehurst. 2018. Delay-intolerant covert communications with either fixed or random transmit power. IEEE Transactions on Information Forensics and Security, Vol. 14, 1 (2018), 129--140.
[17]
Shihao Yan, Xiangyun Zhou, Jinsong Hu, and Stephen V. Hanly. 2019. Low probability of detection communication: Opportunities and challenges. IEEE Wireless Commun., Vol. 26 (Oct. 2019), 19--25.

Index Terms

  1. Covert Communications with Simultaneous Multi-Modal Transmission

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
      May 2024
      312 pages
      ISBN:9798400705823
      DOI:10.1145/3643833
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 May 2024

      Check for updates

      Author Tags

      1. covert communications
      2. detection error probability
      3. heterogeneous networks
      4. joint power allocation
      5. low probability of detection

      Qualifiers

      • Short-paper

      Conference

      WiSec '24

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 150
        Total Downloads
      • Downloads (Last 12 months)150
      • Downloads (Last 6 weeks)45
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media