Covert Communication With Gaussian Noise: From Random Access Channel to Point-to-Point Channel

被引:0
|
作者
Hayashi, Masahito [1 ,2 ,3 ]
Vazquez-Castro, Angeles [4 ]
机构
[1] Chinese Univ Hong Kong Shenzhen, Sch Data Sci, Shenzhen 518172, Peoples R China
[2] Int Quantum Acad SIQA, Shenzhen 518048, Peoples R China
[3] Nagoya Univ, Grad Sch Math, Chikusa Ku, Nagoya 4648602, Japan
[4] Autonomous Univ Barcelona, Inst Estudis Espacials Catalunya IEEC UAB, Ctr Space Res CERES, Barcelona 08193, Spain
基金
中国国家自然科学基金;
关键词
Receivers; Protocols; Codes; AWGN channels; Uncertainty; Symbols; Channel models; Covert communication; information hiding; additive white Gaussian noise; random access channel; central limit theorem; universal code; WIRELESS COMMUNICATION; INEQUALITIES; PROBABILITY; MULTIPLE;
D O I
10.1109/TCOMM.2023.3332861
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK)modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and adversary receivers, which is a realistic assumption in the low power regime.Also, our method assumes that the legitimate users share secret variables in a similar way as the preceding studies. Although several studies investigated the covert communication for the point-to-point communication, no existing paper considers the covert communication under the above uncertainty assumption even for point-to-point communication. Our protocol under the above uncertainty assumption allows O(n)legitimate senders andO(n/logn)active legitimate senders. Furthermore, our protocol can be converted to a protocol for point-to-point communication that works under the above uncertainty assumption
引用
收藏
页码:1516 / 1531
页数:16
相关论文
共 50 条
  • [1] Polarization of a Point-to-Point Channel by a Multiple Access Channel: A New Method for Different Channel Polarization
    Tavakoli, Hassan
    [J]. IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2017, 41 (02) : 115 - 122
  • [2] Polarization of a Point-to-Point Channel by a Multiple Access Channel: A New Method for Different Channel Polarization
    Hassan Tavakoli
    [J]. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 2017, 41 : 115 - 122
  • [3] Modeling the point-to-point wireless communication channel under the adverse weather conditions
    Jaruwatanadilok, S
    Ketprom, U
    Kuga, Y
    Ishimaru, A
    [J]. IEICE TRANSACTIONS ON ELECTRONICS, 2004, E87C (09): : 1455 - 1462
  • [4] Capacity and Channel Coding for Wireless Point-to-Point Z2 Channel
    Hassan Tavakoli
    [J]. Wireless Personal Communications, 2018, 98 : 1785 - 1798
  • [5] Turbo Autoencoder: Deep learning based channel codes for point-to-point communication channels
    Jiang, Yihan
    Kim, Hyeji
    Asnani, Himanshu
    Kannan, Sreeram
    Oh, Sewoong
    Viswanath, Pramod
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [6] Capacity and Channel Coding for Wireless Point-to-Point Z2 Channel
    Tavakoli, Hassan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) : 1785 - 1798
  • [7] A rate region for the interference channel with point-to-point codes
    Li, Yong
    Song, Xiaoxia
    Bai, Baoming
    [J]. International Journal of Applied Mathematics and Statistics, 2013, 51 (24): : 556 - 565
  • [8] Covert communication with noise and channel uncertainties
    Hien Q. Ta
    Quoc-Viet Pham
    Khuong Ho-Van
    Sang W. Kim
    [J]. Wireless Networks, 2022, 28 : 161 - 172
  • [9] Covert communication with noise and channel uncertainties
    Hien Q Ta
    Quoc-Viet Pham
    Khuong Ho-Van
    Kim, Sang W.
    [J]. WIRELESS NETWORKS, 2022, 28 (01) : 161 - 172
  • [10] Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios
    Chen, Shuqing
    Effros, Michelle
    Kostina, Victoria
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (11) : 6688 - 6722