2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2015
DOI: 10.1109/allerton.2015.7447124
|View full text |Cite
|
Sign up to set email alerts
|

Covert communications on Poisson packet channels

Abstract: Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T . Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenario, we assume that warden Willie cannot look at packet contents but rather can only observe packet timings, and Alice m… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

3
33
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 18 publications
(36 citation statements)
references
References 37 publications
3
33
0
Order By: Relevance
“…In this paper, we presented the fundamental limits of a third technique for the transmission of covert information on network links, covert insertion of bits in the payload of packets with available space, where the first and second schemes were packet insertion and timing channel presented in [23], [24].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we presented the fundamental limits of a third technique for the transmission of covert information on network links, covert insertion of bits in the payload of packets with available space, where the first and second schemes were packet insertion and timing channel presented in [23], [24].…”
Section: Discussionmentioning
confidence: 99%
“…System configuration: Authorized user Jack sends packets through the network to authorized user Steve. Alice adds her information packet timings are governed by a Poisson process [23] or a renewal process [24]. If Willie can verify the sources of the packets, then Alice can transmit O(n) bits to Bob via timing if the timing channel between Alice and Bob has non-zero capacity.…”
mentioning
confidence: 99%
“…Similar to the definition of covertness in [1], [2], [16]- [18], [67], [68], and invisibility in [69], [70], we define covertness: We present results under the assumption that P(H 0 ) = P(H 1 ) = 1/2. However, this results in covertness for the general case [71, Appendix A].…”
Section: B Definitionsmentioning
confidence: 99%
“…If we assume Alice and Bob can share a codebook and the altering of timings in the channel can be modeled by a queue, sending information via packet timing is studied for Poisson packet channels in [1,Theorem 2] and for renewal channels in [2,Theorem 5].…”
Section: Higher Throughput Via Timing Channel and Bit Insertionmentioning
confidence: 99%
See 1 more Smart Citation