Covert Communication over Adversarially Jammed Channels

by   Qiaosheng Zhang, et al.

We consider a situation in which a transmitter Alice may wish to communicate with a receiver Bob over an adversarial channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits. The communication should be both covert and reliable. Covertness requires that the adversary James should be unable to estimate whether or not Alice is communicating based on his noisy observations, while reliability requires that the receiver Bob should be able to correctly recover Alice's message with high probability. Unlike the setting with passive adversaries considered thus far in the literature, we show that reliable covert communication in the presence of actively jamming adversaries requires Alice and Bob to have a shared key (unknown to James). The optimal throughput obtainable depends critically on the size of this key: 1) When Alice and Bob's shared key is less than 0.5log(n) bits, no communication that is simultaneously covert and reliable is possible. Conversely, when the shared key is larger than 6log(n), the optimal throughput scales as O(√(n)) --- we explicitly characterize even the constant factor (with matching inner and outer bounds) for a wide range of parameters of interest. 2) When Alice and Bob have a large amount (ω(√(n)) bits) of shared key, we present a tight covert capacity characterization for all parameters of interest. 3) When the size of the shared key is moderate (belongs to (Ω(log(n)), O(√(n)))), we show an achievable coding scheme as well as an outer bound on the information-theoretically optimal throughput. 4) When Alice and Bob's shared key is O(√(n)log(n)) bits, we develop a computationally efficient coding scheme for Alice/Bob whose throughput is only a constant factor smaller than information-theoretically optimal.


page 1

page 2

page 3

page 4


Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate co...

Multipath Stealth Communication with Jammers

We consider the problem of stealth communication over a multipath networ...

Stochastic-Adversarial Channels : Online Adversaries With Feedback Snooping

The growing need for reliable communication over untrusted networks has ...

Network Coding with Myopic Adversaries

We consider the problem of reliable communication over a network contain...

Efficient Multiparty Interactive Coding for Insertions, Deletions and Substitutions

In the field of interactive coding, two or more parties wish to carry ou...

Keyless authentication in the presence of a simultaneously transmitting adversary

If Alice must communicate with Bob over a channel shared with the advers...

Reliability and Latency Analysis for Wireless Communication Systems with a Secret-Key Budget

We consider a wireless communication system with a passive eavesdropper,...

Please sign up or login with your details

Forgot password? Click here to reset