Fundamental Limits of Covert Bit Insertion in Packets

10/08/2018
by   Ramin Soltani, et al.
0

Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve. Covert transmitter Alice wishes to alter the packet stream in some way to send information to covert receiver Bob without watchful and capable adversary Willie being able to detect the presence of the message. In our previous works, we addressed two techniques for such covert transmission from Alice to Bob: packet insertion and packet timing. In this paper, we consider covert communication via bit insertion in packets with available space (e.g., with size less than the maximum transmission unit). We consider three scenarios: 1) packet sizes are independent and identically distributed (i.i.d.) with a probability mass function (pmf) whose support is a set of one bit spaced values; 2) packet sizes are i.i.d. with a pmf whose support is arbitrary; 3) packet sizes may be dependent. For the first and second assumptions, we show that Alice can covertly insert O(√(n)) bits of information in a flow of n packets; conversely, if she inserts ω(√(n)) bits of information, Willie can detect her with arbitrarily small error probability. For the third assumption, we prove Alice can covertly insert on average O(c(n)/√(n)) bits in a sequence of n packets, where c(n) is the average number of conditional pmf of packet sizes given the history, with a support of at least size two.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2019

Fundamental Limits of Covert Packet Insertion

Covert communication conceals the existence of the transmission from a w...
research
01/12/2022

The Information Velocity of Packet-Erasure Links

We consider the problem of in-order packet transmission over a cascade o...
research
07/07/2020

PINT: Probabilistic In-band Network Telemetry

Commodity network devices support adding in-band telemetry measurements ...
research
10/16/2016

Power Control for Packet Streaming with Head-of-Line Deadlines

We consider a mathematical model for streaming media packets (as the mot...
research
04/28/2022

Weighted Packet Selection for Rechargeable Links: Complexity and Approximation

We consider a natural problem dealing with weighted packet selection acr...

Please sign up or login with your details

Forgot password? Click here to reset