2018 IEEE Information Theory Workshop (ITW) 2018
DOI: 10.1109/itw.2018.8613405
|View full text |Cite
|
Sign up to set email alerts
|

Covert Communication over Adversarially Jammed Channels

Abstract: We consider a situation in which a transmitter Alice may wish to communicate with a receiver Bob over an adversarial channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits. The communication should be both covert and reliable. Covertness requires that the adversary James should be unable to estimate whether or not Alice is communicating based on his noisy observations, while r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…By combining (10), (13), and the fact that n = T / T * 0 (S W , T ), we have the following Lemma, which establishes a bridge connecting the continuous-time channel (characterized by the time T and the spectral mask S W ) and the discrete-time channel (characterized by the blocklength n).…”
Section: A Optimal Effective Blocklengthmentioning
confidence: 96%
See 3 more Smart Citations
“…By combining (10), (13), and the fact that n = T / T * 0 (S W , T ), we have the following Lemma, which establishes a bridge connecting the continuous-time channel (characterized by the time T and the spectral mask S W ) and the discrete-time channel (characterized by the blocklength n).…”
Section: A Optimal Effective Blocklengthmentioning
confidence: 96%
“…Proof: Equations (10) and (13) imply that for every ξ ′ > 0, there exists a T ′ (ξ ′ ) such that for all T > T ′ (ξ ′ ), 1 W min…”
Section: A Optimal Effective Blocklengthmentioning
confidence: 99%
See 2 more Smart Citations
“…Another relevant work is [13], in which the warden's uncertainty about the channel is shown to allows the circumvention of the square root law. Finally, covert communication over adversarial channels, in which the warden flips a certain fraction of the transmitted bits, has been investigated in [14]; covert communication is shown to be possible for all warden's states if the legitimate users have access to enough shared secret key, which again prompts the question of how to covertly generate such a secret key.Our work partially addresses the question by showing that, under conditions that we shall precisely specify, covert and secret key generation is possible even with an active warden. Specifically, the results reported here extend our preliminary results restricted to a passive warden [15] to a model with an active warden who can arbitrarily vary the channel state, except when no information is sent on the main channel.…”
mentioning
confidence: 99%