Covert communication conceals the existence of the transmission from a watchful adversary. We consider the fundamental limits for covert communications via packet insertion over packet channels whose packet timings are governed by a renewal process of rate λ. Authorized transmitter Jack sends packets to authorized receiver Steve, and covert transmitter Alice wishes to transmit packets to covert receiver Bob without being detected by watchful adversary Willie. Willie cannot authenticate the source of the packets. Hence, he looks for statistical anomalies in the packet stream from Jack to Steve to attempt detection of unauthorized packet insertion. First, we consider a special case where the packet timings are governed by a Poisson process and we show that Alice can covertly insert O( √ λT ) packets for Bob in a time interval of length T ; conversely, if Alice inserts ω( √ λT ), she will be detected by Willie with high probability. Then, we extend our results to general renewal channels and show that in a stream of N packets transmitted by Jack, Alice can covertly insert O( √ N ) packets; if she inserts ω( √ N ) packets, she will be detected by Willie with high probability. [56]-[62] by leveraging information-theoretic analysis and the use of various coding techniques [40], [63], [64]. In particular, Anantharam and Verdu [65] derived the Shannon capacity of the timing channel with a single-server queue, and Dunn [66] analyzed the secrecy capacity of such a system. Per above, here we take a fundamental approach analogous to [12]-[23], but turn our attention to covert communication over wired channels in which communication takes place through packet transmissions.Specifically, we consider the scenario shown in Fig. 1. Authorized transmitter Jack sends packets to authorized receiver Steve. Assume that Alice wishes to transmit data covertly to Bob on this channel in the presence of an adversary, Willie, who is monitoring the channel. Willie can be in one of the two locations, either between Alice and Bob (Setting 1), or between Bob and Steve (Setting 2). Alice and Bob know that Willie is located at one or the other of these two places; however, they do not know which place he is located at. We assume Willie cannot authenticate the source of the packets (e.g., whether they are sent by Jack or not). However, he knows the statistical model of the timings of the packets transmitted by Jack. Alice can buffer and release Jack's packets and insert her own packets.Also, Bob can authenticate packets, remove the ones originally inserted by Alice, and buffer and release Jack's packets. We assume Alice can only send information to Bob by inserting her own packets into the channel, since she is not allowed to share a secret codebook with Bob and thus she is not able to send covert messages to Bob via packet timings; i.e., altering the timing of the packets according to a shared codebook, to embed information in inter-packet delays (IPDs) [65]. In addition, transmission of information through packet timings is sensitive to natural ...