2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2018
DOI: 10.1109/allerton.2018.8635975
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental Limits of Covert Bit Insertion in Packets

Abstract: Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve.Covert transmitter Alice wishes to alter the packet stream in some way to send information to covert receiver Bob without watchful and capable adversary Willie being able to detect the presence of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…Consequently, by (4), (32) and (33), P f ≤ ζ for all ζ > 0, and thus Alice and Bob's fingerprinting is reliable.…”
Section: Extension To Arbitrary Ratesmentioning
confidence: 94%
See 1 more Smart Citation
“…Consequently, by (4), (32) and (33), P f ≤ ζ for all ζ > 0, and thus Alice and Bob's fingerprinting is reliable.…”
Section: Extension To Arbitrary Ratesmentioning
confidence: 94%
“…Similar to the definition of covertness [28]- [32], we define invisibility [1]: the probability of the failure event satisfies P f ≤ ζ as T → ∞. We term ζ the reliability parameter.…”
Section: B Definitionsmentioning
confidence: 99%
“…Similar to the definition of covertness in [1], [2], [16]- [18], [67], [68], and invisibility in [69], [70], we define covertness: We present results under the assumption that P(H 0 ) = P(H 1 ) = 1/2. However, this results in covertness for the general case [71, Appendix A].…”
Section: B Definitionsmentioning
confidence: 99%
“…Another way to communicate covertly on a packet channel is bit insertion, where Alice inserts bits in a subset of the packets [71]. This technique requires that packets have available space in their payload and a minimum of one bit in their header.…”
Section: Higher Throughput Via Timing Channel and Bit Insertionmentioning
confidence: 99%
See 1 more Smart Citation