Covert Communications in Packet Collision Channels
Title | Covert Communications in Packet Collision Channels |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Sheikholeslami, Azadeh, Ghaderi, Majid, Goeckel, Dennis |
Conference Name | 2019 IEEE Wireless Communications and Networking Conference (WCNC) |
Date Published | April 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-7646-2 |
Keywords | access protocols, achievable covert rates, channel capacity, channel coding, composability, compositionality, Conferences, covert channels, covert communications, covert rate, covert systems, decision theory, Detectors, Measurement, medium-access control layer, Monitoring, packet collision channels, Physical layer, physical layer environment, physical-layer models, pubcrawl, random access MAC, random access system, Receivers, resilience, Resiliency, Scalability, security, slotted ALOHA, sophisticated receiver, telecommunication channels, telecommunication security, transmitted signal, transmitter Alice, unauthorized users, watchful adversary Willie, Willie's receiver, wireless system security |
Abstract | Covert communications, where a transmitter Alice wishes to hide the presence of her transmitted signal from a watchful adversary Willie, has been considered extensively in recent years. Those investigations have generally considered physical-layer models, where the adversary has access to a sophisticated (often optimal) receiver to determine whether a transmission has taken place, and have addressed the question of what rate can information be communicated covertly. More recent investigations have begun to consider the change in covert rate when Willie has uncertainty about the physical layer environment. Here, we move up the protocol stack to consider the covert rate when Willie is watching the medium-access control (MAC) layer in a network employing a random access MAC such as slotted ALOHA. Based on the rate of collisions and potentially the number of users involved in those collisions, Willie attempts to determine whether unauthorized (covert) users are accessing the channel. In particular, we assume different levels of sophistication in Willie's receiver, ranging from a receiver that only can detect whether there was a collision or not, to one that can always tell exactly how many packets were on the channel in the random access system. In each case, we derive closed-form expressions for the achievable covert rates in the system. The achievable rates exhibit significantly different behavior than that observed in the study of covert systems at the physical layer. |
URL | https://ieeexplore.ieee.org/document/8886068 |
DOI | 10.1109/WCNC.2019.8886068 |
Citation Key | sheikholeslami_covert_2019 |
- sophisticated receiver
- pubcrawl
- random access MAC
- random access system
- Receivers
- resilience
- Resiliency
- Scalability
- security
- slotted ALOHA
- physical-layer models
- telecommunication channels
- telecommunication security
- transmitted signal
- transmitter Alice
- unauthorized users
- watchful adversary Willie
- Willie's receiver
- wireless system security
- covert systems
- achievable covert rates
- channel capacity
- channel coding
- composability
- Compositionality
- Conferences
- covert channels
- covert communications
- covert rate
- access protocols
- decision theory
- Detectors
- Measurement
- medium-access control layer
- Monitoring
- packet collision channels
- Physical layer
- physical layer environment