Covert Communication via Action-Dependent States

IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Hassan ZivariFard;Xiaodong Wang
{"title":"Covert Communication via Action-Dependent States","authors":"Hassan ZivariFard;Xiaodong Wang","doi":"10.1109/TIT.2025.3534067","DOIUrl":null,"url":null,"abstract":"This paper studies covert communication over channels with Action-Dependent State Information (ADSI) when the state is available either non-causally or causally at the transmitter. Covert communication refers to reliable communication between a transmitter and a receiver while ensuring a low probability of detection by an adversary, which we refer to as “warden”. It is well known that in a point-to-point Discrete Memoryless Channel (DMC), it is possible to communicate on the order of <inline-formula> <tex-math>$\\sqrt {N}$ </tex-math></inline-formula> bits reliably and covertly over N channel uses while the transmitter and the receiver are required to share a secret key on the order of <inline-formula> <tex-math>$\\sqrt {N}$ </tex-math></inline-formula> bits. This paper studies achieving reliable and covert communication of positive rate, i.e., reliable and covert communication on the order of N bits in N channel uses, over a channel with ADSI while the transmitter has non-causal or causal access to the ADSI, and the transmitter and the receiver share a secret key of negligible rate. We derive achievable rates for both the non-causal and causal scenarios by using block-Markov encoding and secret key generation from the ADSI, which subsumes the best achievable rates for channels with random states. We also derive upper bounds, for both non-causal and causal scenarios, that meet our achievable rates for some special cases. As an application of our problem setup, we study covert communication over channels with rewrite options, which are closely related to recording covert information on memory, and show that a positive covert rate can be achieved in such channels. As a special case of our problem, we study the Additive White Gaussian Noise (AWGN) channels and provide lower and upper bounds on the covert capacity that meet when the transmitter and the receiver share a secret key of sufficient rate and when the warden’s channel is noisier than the legitimate receiver channel. As another application of our problem setup, we show that cooperation can lead to a positive covert rate in Gaussian channels. A few other examples are also worked out in detail.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"3100-3128"},"PeriodicalIF":2.2000,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10852271/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper studies covert communication over channels with Action-Dependent State Information (ADSI) when the state is available either non-causally or causally at the transmitter. Covert communication refers to reliable communication between a transmitter and a receiver while ensuring a low probability of detection by an adversary, which we refer to as “warden”. It is well known that in a point-to-point Discrete Memoryless Channel (DMC), it is possible to communicate on the order of $\sqrt {N}$ bits reliably and covertly over N channel uses while the transmitter and the receiver are required to share a secret key on the order of $\sqrt {N}$ bits. This paper studies achieving reliable and covert communication of positive rate, i.e., reliable and covert communication on the order of N bits in N channel uses, over a channel with ADSI while the transmitter has non-causal or causal access to the ADSI, and the transmitter and the receiver share a secret key of negligible rate. We derive achievable rates for both the non-causal and causal scenarios by using block-Markov encoding and secret key generation from the ADSI, which subsumes the best achievable rates for channels with random states. We also derive upper bounds, for both non-causal and causal scenarios, that meet our achievable rates for some special cases. As an application of our problem setup, we study covert communication over channels with rewrite options, which are closely related to recording covert information on memory, and show that a positive covert rate can be achieved in such channels. As a special case of our problem, we study the Additive White Gaussian Noise (AWGN) channels and provide lower and upper bounds on the covert capacity that meet when the transmitter and the receiver share a secret key of sufficient rate and when the warden’s channel is noisier than the legitimate receiver channel. As another application of our problem setup, we show that cooperation can lead to a positive covert rate in Gaussian channels. A few other examples are also worked out in detail.
通过依赖行动的国家进行秘密通信
本文研究了具有动作相关状态信息(ADSI)的信道在发送端非因果或因果状态可用时的隐蔽通信。隐蔽通信是指发射器和接收器之间的可靠通信,同时确保被对手发现的可能性很低,我们称之为“监狱长”。众所周知,在点对点离散无记忆信道(DMC)中,可以在N个信道上可靠地、秘密地以$\sqrt {N}$比特的顺序进行通信,而发送方和接收方则需要共享$\sqrt {N}$比特的顺序的密钥。本文研究在一个具有ADSI的信道上实现正速率的可靠隐蔽通信,即在发送端对ADSI具有非因果或因果访问的情况下,在一个信道上实现N个信道中N位的可靠隐蔽通信,并且发送端和接收端共享一个速率可忽略的密钥。我们通过使用块马尔可夫编码和ADSI中的密钥生成来推导非因果和因果场景的可实现速率,其中包含了具有随机状态的信道的最佳可实现速率。我们还推导了非因果和因果情形的上界,在某些特殊情况下满足我们的可达到速率。作为我们的问题设置的一个应用,我们研究了具有重写选项的信道上的隐蔽通信,这与在存储器上记录隐蔽信息密切相关,并表明在这样的信道中可以实现正的隐蔽率。作为该问题的一个特例,我们研究了加性高斯白噪声(AWGN)信道,并给出了当发送方和接收方共享足够速率的密钥以及监护人信道比合法接收方信道噪声更大时满足的隐蔽容量的下界和上界。作为我们的问题设置的另一个应用,我们表明合作可以导致高斯信道中的正隐蔽率。本文还详细列举了其他几个例子。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory 工程技术-工程:电子与电气
CiteScore
5.70
自引率
20.00%
发文量
514
审稿时长
12 months
期刊介绍: The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信