Legitimate monitor by proactive guarding for counter covert communications

IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Manlin Wang, Bin Xia, Jiangzhou Wang
{"title":"Legitimate monitor by proactive guarding for counter covert communications","authors":"Manlin Wang, Bin Xia, Jiangzhou Wang","doi":"10.1007/s11432-023-4025-2","DOIUrl":null,"url":null,"abstract":"<p>Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder. However, covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies, which leads to great challenges to information security. To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes, a novel paradigm, called legitimate monitor, is proposed for counter covert communications. In the preceding covert communication system, the covert transmission rate is the focus. Differently, the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes, which should be maximized to interrupt the potential but undetectable transmission. To achieve these goals effectively, a proactive guarding approach is proposed, where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission, simultaneously. In particular, the jamming power at the warder is optimized under cases where the instantaneous/statistical channel state information is available. Besides, the corresponding outage probability is derived to evaluate the system performance, which can also be simplified to scenarios with a passive warder. Numerical results demonstrate that proactive guarding outperforms the passive one, especially when the warder is not proximal to the unauthorized transmitter. In addition, the proposed jamming power allocation scheme also outperforms other benchmark schemes.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"46 1","pages":""},"PeriodicalIF":7.3000,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science China Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11432-023-4025-2","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder. However, covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies, which leads to great challenges to information security. To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes, a novel paradigm, called legitimate monitor, is proposed for counter covert communications. In the preceding covert communication system, the covert transmission rate is the focus. Differently, the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes, which should be maximized to interrupt the potential but undetectable transmission. To achieve these goals effectively, a proactive guarding approach is proposed, where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission, simultaneously. In particular, the jamming power at the warder is optimized under cases where the instantaneous/statistical channel state information is available. Besides, the corresponding outage probability is derived to evaluate the system performance, which can also be simplified to scenarios with a passive warder. Numerical results demonstrate that proactive guarding outperforms the passive one, especially when the warder is not proximal to the unauthorized transmitter. In addition, the proposed jamming power allocation scheme also outperforms other benchmark schemes.

通过主动防范反隐蔽通信进行合法监控
为了避免传输行为被狱警窃听,人们对隐蔽通信进行了广泛研究。然而,隐蔽通信可能被未授权方非法利用,以逃避授权机构的监管,这给信息安全带来了巨大挑战。为了满足授权方监控和防止非授权节点之间非法传输的需求,我们提出了一种新型的反隐蔽通信范式,即合法监控器。在以往的隐蔽通信系统中,隐蔽传输速率是重点。不同的是,合法监控系统的核心关注点是未经授权节点之间传输的中断概率,应最大限度地提高该概率,以中断潜在但无法检测的传输。为了有效地实现这些目标,我们提出了一种主动防护方法,即授权看守者在检测传输行为的同时,发射干扰信号来干扰潜在的传输。特别是在可获得瞬时/统计信道状态信息的情况下,狱警的干扰功率将得到优化。此外,还得出了相应的中断概率,以评估系统性能,这也可简化为具有被动式看守器的情况。数值结果表明,主动防护优于被动防护,尤其是当防护员不靠近未经授权的发射机时。此外,所提出的干扰功率分配方案也优于其他基准方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Science China Information Sciences
Science China Information Sciences COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
12.60
自引率
5.70%
发文量
224
审稿时长
8.3 months
期刊介绍: Science China Information Sciences is a dedicated journal that showcases high-quality, original research across various domains of information sciences. It encompasses Computer Science & Technologies, Control Science & Engineering, Information & Communication Engineering, Microelectronics & Solid-State Electronics, and Quantum Information, providing a platform for the dissemination of significant contributions in these fields.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信