We consider the problem of covert communication over continuous-time additive white Gaussian noise (AWGN) channels under spectral mask constraints, wherein two legitimate parties attempt to communicate reliably in the presence of an eavesdropper that should be unable to estimate if communication takes place. The spectral mask constraint is imposed to restrict excessive radiation beyond the bandwidth of interest. We develop a communication scheme with theoretical reliability and covertness guarantees based on pulse amplitude modulation (PAM) with Binary Phase Shift Keying (BPSK) and root raised cosine (RRC) carrier pulses. Given a fixed transmission duration T and a spectral mask with bandwidth parameter W , we show that one can reliably and covertly transmit O( √ W T ) bits of information. We characterize the constant behind the O and show that it is tight under some conditions.
Index TermsCovert communication, Low probability of detection, Continuous-time channels, Binary Phase Shift Keying.Remark 1. The WGN at any time t is a Gaussian variable with infinite variance; that is, the WGN is not a well-defined random process. However, as discussed in [18, Chapter 7.7], "WGN is not viewed in terms of random variables at each epoch of time. Rather, it is viewed as a generalized zero-mean random process (in the same sense as δ(t) is viewed as a generalized function) for which the properties (a) and (b) in Definition 1 are satisfied."If {g i (t)} is a set of orthonormal functions, we have E(V i V j ) = N0 2 ½{i = j} and each V i is a Gaussian random variable with zero mean and variance N 0 /2. Hence, the linear functionals {V i } are independent and identically distributed (i.i.d.). This property is critical in our achievability scheme -we construct the transmitted signals in terms of an orthonormal basis (e.g., time-shifted RRC pulses), thus we can represent the WGN in terms of the same orthonormal basis, and the resulting "noise variables" are i.i.d. Gaussian variables.
D. System Model1) Shared key: Prior to communication, Alice and Bob share a secret key S, which is uniformly distributed in 1, K and unknown to Willie.2) Encoder: Given a fixed and publicly known T > 0, Alice uses her encoder Ψ(·) to encode the transmission status Λ ∈ {0, 1}, the message 2 M ∈ {0} ∪ 1, M , and the shared key S ∈ 1, K into a continuous-time signal X(t), t ∈ [0, T ]. When Alice is silent (Λ = 0), her message is required to be 0 and her transmission must satisfyWhen Alice is active (Λ = 1), her message is uniformly distributed in 1, M . For each message m and key s, she encodes the message-key pair (m, s) into a codeword X ms (t). The sub-codebook index by s is the collection of codewords C s {X ms (t)} M m=1 . The codebook C is the union of all the sub-codebooks, i.e., C = ∪ s∈ 1,K C s . 2 With a small abuse of notation, we denote the size of the message by M as well.