TY - GEN
T1 - Covert communications on continuous-time channels in the presence of jamming
AU - Sobers, Tamara V.
AU - Bash, Boulat A.
AU - Guha, Saikat
AU - Towsley, Don
AU - Goeckel, Dennis
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/2
Y1 - 2017/7/2
N2 - Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.
AB - Covert communication is achieved if the transmitter (Alice) sends messages to a legitimate receiver (Bob) without detection by an attentive warden (Willie). Recently, there has been significant work on establishing the limits of such covert communication, including our work demonstrating that a cooperative jammer can greatly improve the throughput of covert communication systems. However, this previous work has considered a discrete-time model, with the implicit implication that the results will be similar on the true continuous-time model of the physical channel. In this paper, we consider covert communication over the continuous-time channel model to understand the throughput scaling for large blocklengths. For the Alice-Bob-Willie scenario, the results from the discrete-time channel generally follow. However, when a jammer is added to the environment, we demonstrate that timing offsets between Alice's signal and that of the jammer allow for the application of co-channel interference mitigation techniques at Willie's detector, which call into question whether our previous results suggesting an improvement in the covert throughput with the help of the jammer will be obtained in practice. Finally, we consider initial approaches to thwart such a detector and achieve improved throughput scaling in the presence of the jammer.
UR - http://www.scopus.com/inward/record.url?scp=85050994249&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050994249&partnerID=8YFLogxK
U2 - 10.1109/ACSSC.2017.8335649
DO - 10.1109/ACSSC.2017.8335649
M3 - Conference contribution
AN - SCOPUS:85050994249
T3 - Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
SP - 1697
EP - 1701
BT - Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
A2 - Matthews, Michael B.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Y2 - 29 October 2017 through 1 November 2017
ER -