Covert Communications on Renewal Packet Channels

被引:0
|
作者
Soltani, Ramin [1 ]
Goeckel, Dennis [1 ]
Towsley, Don [2 ]
Houmansadr, Amir [2 ]
机构
[1] Univ Massachusetts, Elect & Comp Engn Dept, Amherst, MA 01003 USA
[2] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
LOW PROBABILITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful adversary Willie, has been of great interest. Our recent work introduced the information-theoretic limits for communication by covert users Alice and Bob, over packet channels where the packet timings of legitimate users Jack and Steve are governed by a Poisson point process. Here we consider the extension to timing channels characterized by more general renewal processes of rate lambda. We consider two scenarios. In the first scenario, the source of the packets on the channel cannot be authenticated by Willie, and therefore Alice can insert packets into the channel. We show that if the total number of transmitted packets by Jack is N, Alice can covertly insert O (root N) packets and, if she transmits more, she will be detected by Willie. In the second scenario, packets are authenticated by Willie but we assume that Alice and Bob share a secret key; hence, Alice alters the timings of the packets according to a pre-shared codebook with Bob to send information to him over a G/M/1 queue with service rate mu > lambda. We show that Alice can covertly and reliably transmit O (N) bits to Bob when the total number of packets sent from Jack to Steve is N.
引用
收藏
页码:548 / 555
页数:8
相关论文
共 50 条
  • [1] Covert Communications in Packet Collision Channels
    Sheikholeslami, Azadeh
    Ghaderi, Majid
    Goeckel, Dennis
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [2] Covert Communications on Poisson Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1046 - 1052
  • [3] Modeling Packet Rate Covert Timing Channels
    Shrestha, Pradhumna L.
    Hempel, Michael
    Alahmad, Mahmoud
    Sharif, Hamid
    2013 9TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2013,
  • [4] Covert communications through mobile voice channels
    Kazemi, Reza
    Rezaei, Roohollah
    Akhaee, Mohammad A.
    Behnia, Fereidoon
    IET INFORMATION SECURITY, 2016, 10 (03) : 156 - 164
  • [5] Covert Communications Over Multiple Overt Channels
    Kim, Sang Wu
    Ta, Hien Q.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (02) : 1112 - 1124
  • [6] A Traffic Padding to Limit Packet Size Covert Channels
    Epishkina, Anna
    Kogos, Konstantin
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 519 - 525
  • [7] Stealthier Inter-packet Timing Covert Channels
    Zander, Sebastian
    Armitage, Grenville
    Branch, Philip
    NETWORKING 2011, PT I, 2011, 6640 : 458 - 470
  • [8] Building Covert Channels over the Packet Reordering Phenomenon
    El-Atawy, Adel
    Al-Shaer, Ehab
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2186 - 2194
  • [9] Covert and Reliable Short-Packet Communications Over Fading Channels Against a Proactive Warder: Analysis and Optimization
    Wang, Manlin
    Yao, Yao
    Xia, Bin
    Chen, Zhiyong
    Wang, Jiangzhou
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (05) : 3932 - 3945
  • [10] A Random Traffic Padding to Limit Packet Size Covert Channels
    Epishkina, Anna
    Kogos, Konstantin
    PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 : 1107 - 1111