TY - GEN
T1 - LPD communication when the warden does not know when
AU - Bash, Boulat A.
AU - Goeckel, Dennis
AU - Towsley, Don
PY - 2014
Y1 - 2014
N2 - Unlike standard security methods (e.g. encryption), low probability of detection (LPD) communication does not merely protect the information contained in a transmission from unauthorized access, but prevents the detection of a transmission in the first place. In this work we study the impact of secretly pre-arranging the time of communication. We prove that if Alice has AWGN channels to Bob and the warden, and if she and Bob can choose a single n symbol period slot out of T(n) such slots, keeping the selection secret from the warden (and, thus, forcing him to monitor all T(n) slots), then Alice can reliably transmit O(min[√n log T(n),n]) bits to Bob while keeping the warden's detector ineffective. The result indicates that only an additional log T(n) secret bits need to be exchanged between Alice and Bpob prior to communication to produce a multiplicative gain of √log T(n) in the amount of transmitted covert information.
AB - Unlike standard security methods (e.g. encryption), low probability of detection (LPD) communication does not merely protect the information contained in a transmission from unauthorized access, but prevents the detection of a transmission in the first place. In this work we study the impact of secretly pre-arranging the time of communication. We prove that if Alice has AWGN channels to Bob and the warden, and if she and Bob can choose a single n symbol period slot out of T(n) such slots, keeping the selection secret from the warden (and, thus, forcing him to monitor all T(n) slots), then Alice can reliably transmit O(min[√n log T(n),n]) bits to Bob while keeping the warden's detector ineffective. The result indicates that only an additional log T(n) secret bits need to be exchanged between Alice and Bpob prior to communication to produce a multiplicative gain of √log T(n) in the amount of transmitted covert information.
UR - http://www.scopus.com/inward/record.url?scp=84906542935&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906542935&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2014.6874904
DO - 10.1109/ISIT.2014.6874904
M3 - Conference contribution
SN - 9781479951864
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 606
EP - 610
BT - 2014 IEEE International Symposium on Information Theory, ISIT 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE International Symposium on Information Theory, ISIT 2014
Y2 - 29 June 2014 through 4 July 2014
ER -