2020
DOI: 10.1109/tcomm.2020.2980788
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental Limits of Covert Packet Insertion

Abstract: Covert communication conceals the existence of the transmission from a watchful adversary. We consider the fundamental limits for covert communications via packet insertion over packet channels whose packet timings are governed by a renewal process of rate λ. Authorized transmitter Jack sends packets to authorized receiver Steve, and covert transmitter Alice wishes to transmit packets to covert receiver Bob without being detected by watchful adversary Willie. Willie cannot authenticate the source of the packet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 63 publications
0
4
0
Order By: Relevance
“…By using the bound in (D.1) we obtain Under the second condition in ( 16), the coefficients of x 2 in the various exponentials in (E.3) are always strictly negative, which shows that the integral in (E.3) is finite for every r and n. We conclude from that and conditions in ( 10)- (11) and in ( 16) that sup 1≤r≤n 1 n n r=1 σ 2 0,r + q(n)σ 2 1 (n) + q(n)(1 − q(n))µ 2 1 (n)   = φ(−∞) = 0, (G.9) by continuity of the mapping φ.…”
Section: Discussionmentioning
confidence: 67%
See 2 more Smart Citations
“…By using the bound in (D.1) we obtain Under the second condition in ( 16), the coefficients of x 2 in the various exponentials in (E.3) are always strictly negative, which shows that the integral in (E.3) is finite for every r and n. We conclude from that and conditions in ( 10)- (11) and in ( 16) that sup 1≤r≤n 1 n n r=1 σ 2 0,r + q(n)σ 2 1 (n) + q(n)(1 − q(n))µ 2 1 (n)   = φ(−∞) = 0, (G.9) by continuity of the mapping φ.…”
Section: Discussionmentioning
confidence: 67%
“…Our work is related to recent work on low probability of detection (LPD) communications, which has been mostly studied in the realm of wireless com-munications [11,12,13,10]. The LPD problem focuses on determining the maximum amount of information that a party, Alice, can reliably transmit to a receiver, Bob, subject to a constraint on the detection probability by a warden, Willy [14].…”
Section: Covertnessmentioning
confidence: 99%
See 1 more Smart Citation
“…An abrupt change in the intensity of the Poisson process may reveal a significant health phenomenon when the process models epidemiological data (see [100] for a review), malicious activity or intrusion attempt when it models packet or session arrival processes in internet traffic (see [88], [20], [67], [106] or [99]), or a change of attack pattern when it models the occurrences of cyber attacks against a cyber system (see [33] and [61]). Another cyber security problem, considered in [97], [98] and [108], concerns communication over Poisson packet channels. In such a channel, an authorised transmitter sends packets to an authorised receiver according to a Poisson process, and a covert transmitter wishes to communicate some informations to a covert receiver on the same channel without being detected by a watchful adversary.…”
Section: Introductionmentioning
confidence: 99%