Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying

05/06/2019
by   Salvatore D'Oro, et al.
0

Undetectable wireless transmissions are fundamental to avoid eavesdroppers. To address this issue, wireless steganography hides covert information inside primary information by slightly modifying the transmitted waveform such that primary information will still be decodable, while covert information will be seen as noise by agnostic receivers. Since the addition of covert information inevitably decreases the SNR of the primary transmission, key challenges in wireless steganography are: i) to assess the impact of the covert channel on the primary channel as a function of different channel conditions; and ii) to make sure that the covert channel is undetectable. Existing approaches are protocol-specific, also we notice that existing wireless technologies rely on phase-keying modulations that in most cases do not use the channel up to its Shannon capacity. Therefore, the residual capacity can be leveraged to implement a wireless system based on a pseudo-noise asymmetric shift keying (PN-ASK) modulation, where covert symbols are mapped by shifting the amplitude of primary symbols. This way, covert information will be undetectable, since a receiver expecting phase-modulated symbols will see their shift in amplitude as an effect of channel/path loss degradation. We first investigate the SER of PN-ASK as a function of the channel; then, we find the optimal PN-ASK parameters that optimize primary and covert throughput under different channel condition. We evaluate the throughput performance and undetectability of PN-ASK through extensive simulations and on an experimental testbed based on USRP N210 software-defined radios. We show that PN-ASK improves the throughput by more than 8x with respect to prior art. Finally, we demonstrate through experiments that PN-ASK is able to transmit covert data on top of IEEE 802.11g frames, which are correctly decoded by an off-the-shelf laptop WiFi.

READ FULL TEXT

page 1

page 7

research
02/10/2020

Implementation of ASK, FSK and PSK with BER vs. SNR comparison over AWGN channel

This paper mainly discusses about three basic digital modulation process...
research
05/12/2022

On the Capacity-Achieving Input of the Gaussian Channel with Polar Quantization

The polar receiver architecture is a receiver design that captures the e...
research
07/01/2019

Online Primary Channel Selection for Dynamic Channel Bonding in High-Density WLANs

In order to dynamically adapt the transmission bandwidth in wireless loc...
research
03/01/2018

A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks

We propose a new scheme to enhance the physical-layer security of wirele...
research
07/09/2019

Fundamental limits of quantum-secure covert communication over bosonic channels

We investigate the fundamental limit of quantum-secure covert communicat...
research
03/15/2019

Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels

We investigate the probability that the peak age of information in a poi...
research
11/28/2017

Phase Noise Compensation with Limited Reference Symbols

Phase noise (PN) can cause severe link performance degradation in orthog...

Please sign up or login with your details

Forgot password? Click here to reset