Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver. We show that each of the K transmitters can transmit on the order of √(n) reliable and covert bits per n channel uses, exceeding which, the warden will be able to detect the communication. We identify the optimal pre-constants of the scaling, which leads to a complete characterization of the covert capacity region of the K-user binary-input MAC. We show that, asymptotically, all sum-rate constraints are inactive unlike the traditional MAC capacity region. We also characterize the channel conditions that have to be satisfied for the transmitters to operate without a secret key.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2022

Byzantine Multiple Access Channels – Part I: Reliable Communication

We study communication over a Multiple Access Channel (MAC) where users ...
research
09/29/2016

Keyless authentication in the presence of a simultaneously transmitting adversary

If Alice must communicate with Bob over a channel shared with the advers...
research
05/07/2018

Covert Communication over Adversarially Jammed Channels

We consider a situation in which a transmitter Alice may wish to communi...
research
05/22/2021

AOT: Anonymization by Oblivious Transfer

We introduce AOT, an anonymous communication system based on mix network...
research
09/20/2023

Byzantine Multiple Access Channels – Part II: Communication With Adversary Identification

We introduce the problem of determining the identity of a byzantine user...
research
05/23/2019

Simple Bounds for the Symmetric Capacity of the Rayleigh Fading Multiple Access Channel

Communication over the i.i.d. Rayleigh slow-fading MAC is considered, wh...
research
05/08/2018

Multipath Stealth Communication with Jammers

We consider the problem of stealth communication over a multipath networ...

Please sign up or login with your details

Forgot password? Click here to reset