This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Covert Communication in Continuous-Time Systems

Ke Li Electrical and Computer
Engineering, UMass Amherst
Email: [email protected]
   Don Towsley College of Information and
Computer Science (CICS), UMass Amherst
Email: [email protected]
   Dennis Goeckel This work was supported by the National Science Foundation under grant CNS-1564067. Electrical and Computer
Engineergin, UMass Amherst
Email: [email protected]
Abstract

Recent works have considered the ability of transmitter Alice to communicate reliably to receiver Bob without being detected by warden Willie. These works generally assume a standard discrete-time model. But the assumption of a discrete-time model in standard communication scenarios is often predicated on its equivalence to a continuous-time model, which has not been established for the covert communications problem. Here, we consider the continuous-time channel directly and study if efficient covert communication can still be achieved. We assume that an uninformed jammer is present to assist Alice, and we consider additive white Gaussian noise (AWGN) channels between all parties. For a channel with approximate bandwidth WW, we establish constructions such that 𝒪(WT)\mathcal{O}(WT) information bits can be transmitted covertly and reliably from Alice to Bob in TT seconds for two separate scenarios: 1) when the path-loss between Alice and Willie is known; and 2) when the path-loss between Alice and Willie is unknown.

I Introduction

Security is a major concern in modern wireless communications, where it is often obtained by encryption. However, this is not sufficient in applications where the very existence of the transmission arouses suspicion. For example, in military communications, the detection of a transmission may reveal activity in the region. Thus, it is important to study covert communication: hides the existence of the transmission, i.e., a transmitter (Alice) can reliably send messages to a legitimate receiver (Bob) without being detected by an attentive warden (Willie). Recent work studied the limits of reliable covert communications. Bash et al. first studied such limits over discrete-time AWGN channels in [1], where a square-root law (SRL) is provided: Alice can transmit at most 𝒪(n)\mathcal{O}(\sqrt{n}) covert bits to Bob in nn channel uses of a discrete-time AWGN channel. This SRL was then established in successive work by Che et al. in [2] over binary symetric channels (BSCs) and by Wang et al. in [3] over arbitrary discrete memoryless channels (DMCs). The length of the secret key needed to achieve the SRL in covert communications over DMCs was established in [4]. The work in [3] and [4] also established the scaling constants for the covert throughput. These works provide a thorough study in common discrete-time channel models when Willie has an accurate statistical characterization of the channel from Alice to him.

Refer to caption
Figure 1: Receiver operating characteristic curves of the interference cancellation detector and the standard power detector (implemented in a continuous-time covert communication system). The simulation is described in detail in Appendix A.

In covert communications, Willie is attempting to determine whether he is just observing the background environment or a signal from Alice in that environment. Hence, uncertainty about that environment helps Alice to hide her transmission. Lee et al., [5] and Che et al., [6] show that 𝒪(n)\mathcal{O}(n) covert bits in nn channel uses can be reliably transmitted from Alice to Bob if Willie is unsure of the variance of the noise at his receiver. However, Goeckel et al., [7] shows that Willie’s lack of knowledge of his noise statistics can be compensated for by estimation through a collection of channel observations when Alice does not transmit. Thus, the limit of covert communications in this case goes back to the SRL. Sobers et al. in [8] then introduced another model to achieve positive covert rate: introducing an uninformed jammer to the system that randomly generates interference, hence providing the required uncertainty at Willie. In [8], it is proved that the optimal detector for Willie in the discrete-time model is a power detector. And, with Willie employing this optimal detector, Alice can covertly transmit 𝒪(n)\mathcal{O}(n) bits in nn channel uses over both AWGN and block fading channels.

The works mentioned above are all based on a discrete-time model and thus implicitly assume that analogous results can be obtained on the corresponding continuous-time model. Bash et al. first mentioned the potential fragility of such an assumption from [1]: ideal sinc()\text{sinc}(\cdot) pulse shapes are not feasible for implementation, perfect symbol synchronization might not always hold true, and sampling at higher rates sometimes has utility for signal detection at Willie even if the Nyquist ISI criterion is satisfied. In addition, continuous-time signals for transmission contain periodic features that can be extracted by the receiver to help it differentiate the signal from Gaussian noise. Thus, a power detector that is optimal at Willie [8] in the discrete-time model may not be optimal in the continuous-time case.

In [9], Sobers et al. introduced a linear detector for the warden Willie that outperforms the standard power detector implemented in the continuous-time system in some limited scenarios. For general scenarios, we have developed an interference cancellation detector (inspired by co-channel interference cancellation techniques in cellular networks[10]), and show in Fig. 1 that this detector outperforms the standard power detector; hence, a major tenet of [8] that facilitated the establishment of positive rate covert communications in the discrete-time case does not hold in the continuous-time case. Rather, Willie’s detection capability benefits from the continuous-time setting, and hence raises questions on the covert limits in true continuous-time channels. In this paper we will establish constructions for Alice such that positive covert rate is achievable. The reader will note how the constructions provided here are quite different from those in [8].

II System Model and Metrics

II-A System Model

Consider a scenario shown in Fig. 2 where transmitter Alice (“a”) wants to transmit a message to intended recipient Bob (“b”) reliably without being detected by a warden Willie (“w”). A jammer (“j”) assists the communication by actively sending jamming signals, but without any coordination with Alice.

Refer to caption
Figure 2: System model: With help from a jammer, Alice attempts to transmit reliably and covertly to Bob in the presence of a warden Willie.

For t[0,T]t\in[0,T], we consider continuous-time channels where Alice and the jammer send symbols using pulse-shaped waveforms. Since Alice can send pulses at any time in the continuous time interval [0,T][0,T], she and Bob share an infinite length key [4] encoding those locations unknown to Willie. If Alice decides to transmit, she maps her message to waveform xa(t)x_{a}(t) restricted to approximate bandwidth 111See Appendix B for a discussion of the bandwidth of the constructions WW under an average power constraint of σa2\sigma_{a}^{2}. The jammer transmits regardless if Alice transmitted or not. It sends waveform xj(t)x_{j}(t) that is also restricted to approximate bandwidth WW under an average power constraint of σj2\sigma_{j}^{2}. The channels between each transmitter and receiver pair are assumed to be AWGN, and thus the signal observed by Willie is given by:

z(t)=\displaystyle z(t)= {xa(tτa)dawr/2+xj(tτj)djwr/2+N(w)(t),Alice transmitsxj(tτj)djwr/2+N(w)(t),Alice does not transmit\displaystyle\left\{\begin{array}[]{lr}\frac{x_{a}(t-\tau_{a})}{d_{aw}^{r/2}}+\frac{x_{j}(t-\tau_{j})}{d_{jw}^{r/2}}+N^{(w)}(t),\,\text{Alice transmits}\\ \frac{x_{j}(t-\tau_{j})}{d_{jw}^{r/2}}+N^{(w)}(t),\,\text{Alice does not transmit}\end{array}\right. (3)

where dxyd_{xy} is the distance between a transmitter xx and a receiver yy, rr is the path-loss exponent, τa\tau_{a} and τj\tau_{j} are time delays of Alice’s and the jammer’s signal, respectively, and N(w)(t)N^{(w)}(t) is the noise observed at Willie’s receiver, which is a zero-mean stationary Gaussian random process with power spectral density N0(w)/2N_{0}^{(w)}/2. Bob observes the channel output y(t)y(t) at time tt, which is analogous to z(t)z(t) but with the substitution of the noise N(b)(t)N^{(b)}(t) for N(w)(t)N^{(w)}(t), and N(b)(t)N^{(b)}(t) is a zero-mean stationary Gaussian random process with power spectral density of N0(b)/2N_{0}^{(b)}/2.

We consider two scenarios: 1) the path-loss dawrd_{aw}^{r} between Alice and Willie is known; and 2) the path-loss dawrd_{aw}^{r} is unknown. In both scenarios, if not specified, we assume the path-loss between any transmitter and receiver pair is one, without loss of generality.

II-B Metrics

II-B1 Willie

Based on his observations over the time interval, Willie attempts to determine whether Alice transmitted or not. We define the null hypothesis (H0H_{0}) as that Alice did not transmit during the time interval and the alternative hypothesis (H1H_{1}) as that Alice transmitted a message. We denote P(H0)P(H_{0}) and P(H1)P(H_{1}) as the probability that hypothesis H0H_{0} or H1H_{1} is true, respectively. Willie tries to minimize his probability of error Pe,w=P(H0)PFA+P(H1)PMDP_{e,w}=P(H_{0})P_{FA}+P(H_{1})P_{MD}, where PFAP_{FA} and PMDP_{MD} are the probabilities of false alarm and missed detection at Willie, respectively. We assume that P(H0)P(H_{0}) and P(H1)P(H_{1}) are known to Willie. Since Pe,wmin(P(H0),P(H1))(PFA+PMD)P_{e,w}\geq\min(P(H_{0}),P(H_{1}))(P_{FA}+P_{MD}) [1], we say that Alice achieves covert communication if, for a given ϵ>0\epsilon>0, PFA+PMD1ϵP_{FA}+P_{MD}\geq 1-\epsilon [1].

We assume that Willie has full knowledge of the statistical model: the time interval [0,T][0,T], the parameters for Alice’s random codebook generation, the parameters for the jammer’s random interference generation, and the noise variance of his channel. Willie does not know the secret key shared between Alice and Bob, or the instantiation of the random jamming.

II-B2 Bob

Bob should be able to reliably decode Alice’s message. This is characterized by the probability 1Pe,b1-P_{e,b} where Pe,bP_{e,b} is the probability of error at Bob. We say that Alice achieves reliable communication if, for a given δ>0\delta>0, Pe,b<δP_{e,b}<\delta [1].

III Achievable Covert Communications: Known Path-Loss

In this section, we consider the case that the path-loss between each transmitter and receiver pair is known, which we assume is one without loss of generality. We provide a construction for Alice and the jammer that consists of them sending randomly located pulses, and then demonstrate that the optimal detector for Willie, under this construction, is a threshold test on the number of pulses he observes. The ability for Alice to covertly send 𝒪(WT)\mathcal{O}(WT) bits is then established. This shows that covert communications with a positive rate can be achieved in continuous-time systems with equal path-loss.

III-A Construction

We employ random coding arguments and generate codewords by independently drawing symbols from a zero-mean complex Gaussian distribution with variance σa2\sigma_{a}^{2}. If Alice decides to transmit, she selects the codeword corresponding to her message, sets fif_{i} to the ithi^{th} symbol of that codeword, and transmits the symbol sequence 𝕗={f1,f2,}\mathbb{f}=\{f_{1},f_{2},\ldots\}. The jammer transmits zero-mean complex Gaussian symbol sequence 𝕧={v1.v2,}\mathbb{v}=\{v_{1}.v_{2},\ldots\}, with variance σj2\sigma_{j}^{2}. Here we choose σj2=σa2\sigma_{j}^{2}=\sigma_{a}^{2}, i.e., Alice and the jammer use this same average transmit power, so that Alice can possibly hide her signal in the jammer’s interference.

Let n=WTn=\lfloor WT\rfloor be an integer. Over the time interval [0,T][0,T], Alice sends MaM_{a} symbol pulses, where MaM_{a} follows a binomial distribution with mean αn\alpha n, i.e., MaB(n,α)M_{a}\sim B(n,\alpha), with constant 0α<10\leq\alpha<1. Alice’s codeword length is chosen to be an integer close to αnϵcn\alpha n-\epsilon_{c}n (ϵc\epsilon_{c} is a small positive constant), such that as nn\to\infty, there are enough pulses over [0,T][0,T] for all of Alice’s codeword symbols. The jammer sends MjM_{j} pulses, where MjM_{j} follows a binomial distribution with mean βn\beta n, i.e., MjB(n,β)M_{j}\sim B(n,\beta), with β\beta is uniformly distributed over [μ,μ+Δ][\mu,\mu+\Delta], 0μ<μ+Δ10\leq\mu<\mu+\Delta\leq 1 and Δα\Delta\geq\alpha. Let τk,k=1,2,,Ma\tau_{k},k=1,2,\ldots,M_{a} and τk,k=1,2,,Mj\tau_{k}^{\prime},k=1,2,\ldots,M_{j} be be independent and identically distributed (i.i.d.) sequences of pulse delays of Alice and the jammer, respectively. The delays are drawn uniformly over [0,T][0,T]. Alice’s waveform within interval [0,T][0,T] is then given by:

xa(t)=k=1Mafkp(tτk)\displaystyle x_{a}(t)=\sum_{k=1}^{M_{a}}f_{k}p(t-\tau_{k}) (4)

where p(t)p(t) is a unit-energy pulse shaping filter with bandwidth WW. Obviously, a waveform restricted to [0,T][0,T] cannot have a finite bandwidth, we provide a brief discussion on this issue in Appendix B. The jammer’s waveform within interval [0,T][0,T] is given by:

xj(t)=k=1Mjvkp(tτk).\displaystyle x_{j}(t)=\sum_{k=1}^{M_{j}}v_{k}p(t-\tau^{\prime}_{k}). (5)

For an AWGN channel, Willie observes the signal z(t)z(t) given in (3).

III-B Analysis

To obtain an achievability result for covert communications, Willie should be assumed to employ an optimal detector. We will find an upper bound to the performance of that optimal detector by assuming a genie provides Willie additional information; in particular, we assume that Willie not only knows how the system is constructed (including α\alpha, the distribution of β\beta and the transmission power σa2\sigma_{a}^{2} and σj2\sigma_{j}^{2} of the symbols), but also knows the number of pulses and the exact locations (timing) of each pulse on the channel in [0,T][0,T]. The only thing he does not know is from whom each pulse is sent. In the next section, we will prove that the optimal test for Willie is a threshold test on the number of pulses he observed.

III-C Optimal Hypothesis Test

Given the construction above, Willie’s test is between the two hypotheses H0H_{0} and H1H_{1} where he has complete statistical knowledge of his observations when either hypothesis is true. We denote: Alice’s decision on transmission as DD (which corresponds to hypothesis H0H_{0} when Alice decides to transmit, or H1H_{1} when she decides not to); the total number of pulses sent during time TT as MM; the locations (over [0,T])[0,T]) of the pulses as a vector 𝕃\mathbb{L}; and the height (square root of the power) of the pulses as a vector 𝕊\mathbb{S}, i.e., 𝕊\mathbb{S} is the vector of the original symbols sent. We want to first show that MM is a sufficient statistic for Willie’s detection. The random variables DD, MM, 𝕃\mathbb{L} and 𝕊\mathbb{S} form a Markov chain shown in Fig. 3, which illustrates the transition from Alice’s state DD to Willie’s received signal z(t)z(t). The transitions of the Markov chain are:

  • DMD\longrightarrow M: The conditional distribution of MM, given DD, is binomial with mean βn\beta n when Alice does not transmit, and binomial with mean βn+αn\beta n+\alpha n when Alice transmits.

  • M𝕃,𝕊M\longrightarrow\mathbb{L},\mathbb{S}: Given MM, the distribution of LmL_{m} for m=1,2,,Mm=1,2,\ldots,M is uniform over [0,T][0,T]. The distribution of SmS_{m} for m=1,2,,Mm=1,2,\ldots,M is zero-mean Gaussian with variance σa2=σj2\sigma_{a}^{2}=\sigma_{j}^{2}.

Refer to caption
Figure 3: Markov chain illustrating the transition from Alice’s decision DD on transmission, to Willie’s observed signal z(t)z(t).

Given the pulse locations and the height of the pulses, the signal z(t)z(t) observed at Willie’s receiver can be constructed from the pulse-shaping function p(t)p(t) and the AWGN of Willie’s channel. From the Markov chain shown in Fig. 3, we see that z(t)z(t) conditioned on MM is independent of DD. Thus, MM is a sufficient statistic for Willie to make an optimal decision on Alice’s presence. Therefore, by applying the Neyman-Pearson criterion, the optimal test for Willie to minimize his probability of error is the likelihood ratio test (LRT) [11]:

Λ(M=m)=PM|H1(m)PM|H0(m)H0H1γ\displaystyle\Lambda(M=m)=\frac{P_{M|H_{1}}(m)}{P_{M|H_{0}}(m)}\overset{H_{1}}{\underset{H_{0}}{\gtrless}}\gamma (6)

where γ=P(H0)/P(H1)\gamma=P(H_{0})/P(H_{1}), and PM|H1(m)P_{M|H_{1}(m)} and PM|H0(m)P_{M|H_{0}(m)} are the probability mass functions (pmfs) of the number of pulses given that Alice transmitted or did not transmit, respectively. Given the LRT above, we want to show that this is equivalent to a threshold test on the number of pulses Willie observes at his receiver, which is true if the LRT exhibits monotonicity in MM. We employ the concept of stochastic ordering [12] to derive the desired monotonicity result. We say that XX is smaller than YY in the likelihood ratio order (written as XlrYX\leq_{lr}Y) when fY(x)fX(x)\frac{f_{Y}(x)}{f_{X}(x)} is non-decreasing over the union of their supports, where fY(x)f_{Y}(x) and fX(x)f_{X}(x) are pmfs or probability density functions (pdfs) of YY and XX, respectively [8].

Lemma 1.

(Th. 1.C.11 in [12] adapted to pmfs): Consider a family of pmfs {gb(),b𝒳g_{b}(\cdot),b\in\mathcal{X}} where 𝒳\mathcal{X} is a subset of the real line. Let M(b)M(b) denote a random variable with pmf gb()g_{b}({\cdot}). For ρ=0,1\rho=0,1, let BρB_{\rho} denote a random variable with support 𝒳\mathcal{X} and pdf hBρ()h_{B_{\rho}}(\cdot), and let Wρ=dM(Bρ)W_{\rho}=_{d}M(B_{\rho}) (where =d=_{d} is defined as equality in distribution or law) denote a random variable with pmf given by:

pWρ(w)=b𝒳gb(w)𝑑hBρ(b),w=0,1,.\displaystyle p_{W_{\rho}}(w)=\int_{b\in\mathcal{X}}g_{b}(w)\,d\,h_{B_{\rho}}(b),\,\,\,\,w=0,1,\ldots\,.

If M(b)lrM(b)M(b)\leq_{lr}M(b^{\prime}) whenever bbb\leq b^{\prime}, and if B0lrB1B_{0}\leq_{lr}B_{1}, then:

W0lrW1.\displaystyle W_{0}\leq_{lr}W_{1}.

We let:

b=Δ{βn,when Alice does not transmitβn+αn,when Alice transmits\displaystyle b\overset{\Delta}{=}\left\{\begin{array}[]{lr}\beta n,\,\text{when Alice does not transmit}\\ \beta n+\alpha n,\,\text{when Alice transmits}\end{array}\right. (9)

and introduce two random variables B0B_{0} and B1B_{1} with pdfs given by:

fBρ(b)=\displaystyle f_{B_{\rho}}(b)= {1Δ,μn<bμn+Δn,ρ=01Δ,μn+αn<bμn+αn+Δn,ρ=10,else\displaystyle\left\{\begin{array}[]{lr}\frac{1}{\Delta},\,\mu n<b\leq\mu n+\Delta n,\,\rho=0\\ \frac{1}{\Delta},\,\mu n+\alpha n<b\leq\mu n+\alpha n+\Delta n,\,\rho=1\\ 0,\,\text{else}\end{array}\right. (13)

The LRT in (6) can be written as:

Λ(M=m)=EB1[PM(b)(m)]EB0[PM(b)(m)]\displaystyle\Lambda(M=m)=\frac{E_{B_{1}}\left[P_{M(b)}(m)\right]}{E_{B_{0}}\left[P_{M(b)}(m)\right]}

where M(b)M(b) follows a binomial distribution, i.e., M(b)B(n,bn)M(b)\sim B(n,\frac{b}{n}).

Theorem 1.

Given the construction in the previous section, Willie’s optimal detector compares the number of pulses he observes to a threshold.

Proof.

First, applying the definition of lr\leq_{lr} to the densities of B0B_{0} and B1B_{1} yields that B0lrB1B_{0}\leq_{lr}B_{1}. Then, let R(m)=ΔPM(b)(m)PM(b)(m)R(m)\overset{\Delta}{=}\frac{P_{M(b^{\prime})}(m)}{P_{M(b)}(m)}, we write:

R(m)\displaystyle R(m) =(nm)(bn)m(1bn)nm(nm)(bn)m(1bn)nm\displaystyle=\frac{\begin{pmatrix}n\\ m\end{pmatrix}\left(\frac{b^{\prime}}{n}\right)^{m}\left(1-\frac{b^{\prime}}{n}\right)^{n-m}}{\begin{pmatrix}n\\ m\end{pmatrix}\left(\frac{b}{n}\right)^{m}\left(1-\frac{b}{n}\right)^{n-m}}
=(bb)m(nbnb)nm\displaystyle=\left(\frac{b^{\prime}}{b}\right)^{m}\left(\frac{n-b^{\prime}}{n-b}\right)^{n-m}

which monotonically increases as mm increases for bbb\leq b^{\prime}. Thus, M(b)lrM(b)M(b)\leq_{lr}M(b^{\prime}) whenever bbb\leq b^{\prime}. The application of Lemma 1 then yields that Λ()\Lambda(\cdot) is non-decreasing in mm. Therefore, the LRT is equivalent to the test:

MH0H1γ\displaystyle M\overset{H_{1}}{\underset{H_{0}}{\gtrless}}\gamma^{\prime} (14)

corresponding to a threshold test on the number of pulses observed by Willie. ∎

Dividing both sides of (14) by nn yields the equivalent test:

MnH0H1γn\displaystyle\frac{M}{n}\overset{H_{1}}{\underset{H_{0}}{\gtrless}}\gamma_{n}

where γn=γ/n\gamma_{n}=\gamma^{\prime}/n. For any finite nn, there is an optimal threshold γn\gamma_{n} such that it minimizes Willie’s probability of error in detecting Alice’s existence. However, we will show that for any γn\gamma_{n} Willie chooses, he will not be able to detect Alice as nn\to\infty; that is, for any ϵ>0\epsilon>0, there exists a construction such that PFA+PMD>1ϵP_{FA}+P_{MD}>1-\epsilon for nn large enough.

III-D Covert Limit

Recall that β\beta is a uniform random variable on [μ,μ+Δ][\mu,\mu+\Delta], with 0μ<μ+Δ10\leq\mu<\mu+\Delta\leq 1 and constant Δα\Delta\geq\alpha. Let PFA(u)P_{FA}(u) and PMD(u)P_{MD}(u) be Willie’s probability of false alarm and missed detection conditioned on β=u\beta=u, respectively. Then:

PFA(u)\displaystyle P_{FA}(u) =P(MnγnH0)=P(1ni=1nRiγnH0)\displaystyle=P\left(\frac{M}{n}\geq\gamma_{n}\mid H_{0}\right)=P\left(\frac{1}{n}\sum_{i=1}^{n}R_{i}\geq\gamma_{n}\mid H_{0}\right)

where, under H0H_{0}, RiR_{i} is a Bernoulli random variable that takes value one with probability uu. By the weak law of large numbers, 1ni=1nRi\frac{1}{n}\sum_{i=1}^{n}R_{i} converges in probability to uu. Thus, for any η>0\eta>0, there exists N0N_{0} such that, for nN0n\geq N_{0}, we have:

P(1ni=1nRi(uη,u+η)H0)>1ϵ2.\displaystyle P\left(\frac{1}{n}\sum_{i=1}^{n}R_{i}\in\left(u-\eta,u+\eta\right)\mid H_{0}\right)>1-\frac{\epsilon}{2}\,.

Therefore, for n>N0n>N_{0}, PFA(u)>1ϵ2P_{FA}(u)>1-\frac{\epsilon}{2} for any γn<uη\gamma_{n}<u-\eta. Analogously, we write:

PMD\displaystyle P_{MD} =P(MnγnH1)=P(1ni=1nRiγnH1)\displaystyle=P\left(\frac{M}{n}\leq\gamma_{n}\mid H_{1}\right)=P\left(\frac{1}{n}\sum_{i=1}^{n}R_{i}\leq\gamma_{n}\mid H_{1}\right)

Likewise, by the weak law of large numbers, for any η>0\eta>0, there exists N1N_{1} such that, for nN1n\geq N_{1}, we have:

P(1ni=1nRi(u+αη,u+α+η)H1)>1ϵ2.\displaystyle P\left(\frac{1}{n}\sum_{i=1}^{n}R_{i}\in\left(u+\alpha-\eta,u+\alpha+\eta\right)\mid H_{1}\right)>1-\frac{\epsilon}{2}\,.

Therefore, for n>N1n>N_{1}, PMD(u)>1ϵ2P_{MD}(u)>1-\frac{\epsilon}{2} for any γn>α+u+η\gamma_{n}>\alpha+u+\eta.

Define the set 𝒜={u:uη<γn<α+u+η}\mathcal{A}=\{u:u-\eta<\gamma_{n}<\alpha+u+\eta\}. We have established that, for any u𝒜cu\in\mathcal{A}^{c} and n>max(N0,N1)n>\max(N_{0},N_{1}), PFA(u)+PMD(u)>1ϵ2P_{FA}(u)+P_{MD}(u)>1-\frac{\epsilon}{2}. The probability of 𝒜\mathcal{A} has the following upper bound:

P(A)\displaystyle P(A) =P(γnαη<β<γn+η)2η+αΔ.\displaystyle=P(\gamma_{n}-\alpha-\eta<\beta<\gamma_{n}+\eta)\leq\frac{2\eta+\alpha}{\Delta}\,.

By choosing η=ϵΔ4\eta=\frac{\epsilon\Delta}{4} and α=ϵΔ2\alpha=\frac{\epsilon\Delta}{2}, we have P(𝒜)ϵ2P(\mathcal{A})\leq\frac{\epsilon}{2}, i.e., P(𝒜c)>1ϵ2P(\mathcal{A}^{c})>1-\frac{\epsilon}{2}. Hence,

PFA+PMD\displaystyle P_{FA}+P_{MD} =Eβ[PFA(β)+PMD(β)]\displaystyle=E_{\beta}[P_{FA}(\beta)+P_{MD}(\beta)]
Eβ[PFA(β)+PMD(β)𝒜c]P(𝒜c)\displaystyle\geq E_{\beta}[P_{FA}(\beta)+P_{MD}(\beta)\mid\mathcal{A}^{c}]P(\mathcal{A}^{c})
>1ϵ2.\displaystyle>1-\frac{\epsilon}{2}\,.

Thus, Alice can send an average of αn=ϵΔ2WT\alpha n=\frac{\epsilon\Delta}{2}\lfloor WT\rfloor pulses with a constant power and remain covert from Willie. Note that since the maximum interference from the jammer at Bob can be upper bounded by a constant, reliability is also achieved under the same construction. Therefore, 𝒪(WT)\mathcal{O}(WT) bits can be transmitted covertly and reliably from Alice to Bob.

IV Achievable Covert Communications: Unknown Path-Loss

In this section, we consider the case that the jammer does not know the exact path-loss between Alice and Willie, but only knows an upper and lower bound of the received power from Alice at Willie. Without loss of generality, we assume the path-loss between the jammer and Willie is one. Since the jammer does not know the exact path-loss between Alice and Willie, it cannot use a power that results in the pulses of Alice and the jammer arriving at Willie with the same power as in the previous section. With the construction of the previous section, Willie could separate Alice and the jammer by looking for a pulse power distribution that is the combination of two distributions. Therefore, to prevent Willie from detecting Alice, another construction is needed. The idea of the construction is to let the jammer send pulses with multiple power levels that cover a wide range of the power spectrum, so that if Alice uses an average power within that range, she can possibly hide herself in the jammer’s interference. We will establish the construction and show that under such construction, covert communications with a positive covert rate can be achieved.

IV-A Construction

IV-A1 Alice

Similar to before, we employ random coding arguments and generate codewords by independently drawing symbols from a zero-mean complex Gaussian distribution. However, Alice’s average transmission power is random: she chooses a power level uniformly over [Pa,Pa+ΔPa][P_{a},P_{a}+\Delta_{P_{a}}] where PaP_{a} and ΔPa\Delta_{P_{a}} are constants (Pa+ΔPaσa2P_{a}+\Delta_{P_{a}}\leq\sigma_{a}^{2}), and transmits symbols with this power over [0,T][0,T]. Alice transmits a total of Mn=αnM_{n}=\lfloor\alpha n\rfloor pulses (0α<10\leq\alpha<1 is a constant) over [0,T][0,T]. Therefore, Alice’s waveform within [0,T][0,T] is given by:

xa(t)=i=1Mnfip(tτi)\displaystyle x_{a}(t)=\sum_{i=1}^{M_{n}}f_{i}p(t-\tau_{i})

where fi,i=1,2,,Mnf_{i},i=1,2,\ldots,M_{n} is a sequence of i.i.d zero-mean Gaussian symbols with the same variance that is uniformly drawn from [Pa,Pa+ΔPa][P_{a},P_{a}+\Delta_{P_{a}}], and τi,i=1,2,,Mn\tau_{i},i=1,2,\ldots,M_{n} is a sequence of i.i.d pulse delays that are uniformly distributed in [0,T][0,T].

IV-A2 Jammer

The jammer also sends i.i.d. Gaussian symbols. It first determines a number KK of power levels according to a Poisson distribution, i.e., KPois(λj)K\sim Pois\left(\lambda_{j}\right), where λj\lambda_{j} is a constant. It then chooses each of the KK power levels uniformly in [Pj,Pj+ΔPj][P_{j},P_{j}+\Delta_{P_{j}}], where PjP_{j} and ΔPj\Delta_{P_{j}} are constants (Pj+ΔPjσj2P_{j}+\Delta_{P_{j}}\leq\sigma_{j}^{2}), to transmit its symbols. Note that the range of the jammer’s power at Willie needs to cover the range of all possible values of Alice’s power at Willie, and since the jammer knows an upper and lower bound of the received power from Alice and Willie, PjP_{j} and ΔPj\Delta_{P_{j}} are chosen such that [Padawr,Pa+ΔPadawr][Pj,Pj+ΔPj]\left[\frac{P_{a}}{d_{aw}^{r}},\frac{P_{a}+\Delta_{P_{a}}}{d_{aw}^{r}}\right]\subset\left[P_{j},P_{j}+\Delta_{P_{j}}\right]. Note that this implies that the jammer knows a lower bound on the distance between Alice and Willie. The jammer transmits MnM_{n} number of pulses for each power level it chooses. Hence, it will transmit a total of KMnKM_{n} pulses over [0,T][0,T]. Therefore, the jammer’s waveform is given by:

xj(t)=k=1Ki=1Mnvi,kp(tτi,k)\displaystyle x_{j}(t)=\sum_{k=1}^{K}\sum_{i=1}^{M_{n}}v_{i,k}p(t-\tau_{i,k}^{\prime})

where vi,k,i=1,2,,Mn,k=1,2,,Kv_{i,k},i=1,2,\ldots,M_{n},k=1,2,\ldots,K is a sequence of i.i.d zero-mean Gaussian symbols with variance being the kthk^{\text{th}} power level randomly chosen by the jammer, and τi,i=1,2,,Mn,k=1,2,,K\tau_{i},i=1,2,\ldots,M_{n},k=1,2,\ldots,K is a sequence of i.i.d pulse delays that are uniformly distributed in [0,T][0,T].

IV-B Analysis

For achievability, we derive an upper bound to the performance of Willie’s optimal detector by assuming a genie provides Willie extra knowledge on the exact power range [Padaw2,Pa+ΔPadawr]\left[\frac{P_{a}}{d_{aw}^{2}},\frac{P_{a}+\Delta_{P_{a}}}{d_{aw}^{r}}\right] received from Alice, the distribution of the number of the jammer’s power levels (including all of the parameters), and the values of all power levels employed by the jammer and Alice (if she decided to transmit), but not which power level is employed by whom.

IV-C Optimal Hypothesis Test

In this section, we show that the number of power levels in the range of [PAdaw2,PA+ΔPAdawr]\left[\frac{P_{A}}{d_{aw}^{2}},\frac{P_{A}+\Delta_{P_{A}}}{d_{aw}^{r}}\right], which we term the detection region, is a sufficient statistic for Willie in deciding between hypothesis H0H_{0} or H1H_{1}. Fig. 4 illustrates the power levels received at Willie.

Refer to caption
Figure 4: Willie’s received power levels from Alice and the jammer. An impulse means a power level Alice or the jammer chooses for transmission.

Let K1K_{1} be the number of power levels inside the detection region, K2K_{2} be the number of power levels outside the detection region, i.e. K=K1+K2K=K_{1}+K_{2}. By construction, all of the power levels sent by the jammer form a Poisson point process with KPois(λj)K\sim Pois\left(\lambda_{j}\right) on [Pj,Pj+ΔPj][P_{j},P_{j}+\Delta_{P_{j}}]. Note that for a Poisson point process, generating KK power levels with mean λj\lambda_{j} and placing them uniformly over [Pj,Pj+ΔPj][P_{j},P_{j}+\Delta_{P_{j}}] is equivalent to: generating K1K_{1} power levels with mean ΔPaΔPjdawrλj\frac{\Delta_{P_{a}}}{\Delta_{P_{j}}d_{aw}^{r}}\lambda_{j} and placing them uniformly inside the detection region, and generating K2K_{2} power levels with mean (1ΔPaΔPjdaw2)λj\left(1-\frac{\Delta_{P_{a}}}{\Delta_{P_{j}}d_{aw}^{2}}\right)\lambda_{j} and placing them uniformly outside the detection region. This is critical in the proof below.

Recall that DD denotes Alice’s decision on transmission, LL denotes the locations (in [0,T][0,T]) of all of the pulses sent, and 𝕊\mathbb{S} denotes the height of the pulses. We also denote the values of all power levels (within and outside the detection region) as a vector 𝕍\mathbb{V}. The random variables DD, K1K_{1}, 𝕍\mathbb{V}, 𝕃\mathbb{L} and 𝕊\mathbb{S} form a Markov chain shown in Fig. 5, which illustrates the transition from Alice’s state DD to Willie’s received signal z(t)z(t). The transitions of the Markov chain are:

  • DK1D\longrightarrow K_{1}: K1K_{1} and K11K_{1}-1 are characterized by a Poisson process with mean ΔPaλjΔPjdawr\frac{\Delta_{P_{a}}\lambda_{j}}{\Delta_{P_{j}}d_{aw}^{r}} when Alice does not transmit, and a Poisson process with mean ΔPaλjΔPjdawr\frac{\Delta_{P_{a}}\lambda_{j}}{\Delta_{P_{j}}d_{aw}^{r}} when she does transmit.

  • K1𝕍,𝕃K_{1}\longrightarrow\mathbb{V},\mathbb{L}: Let Vk,k=1,2,,K1V_{k},k=1,2,\ldots,K_{1} be the values of power levels within the detection region, and Vk,k=K1+1,K1+2,,KV_{k},k=K_{1}+1,K_{1}+2,\ldots,K the power values outside the detection region. Given K1K_{1}, the conditional distribution of Vk,k=1,2,,K1V_{k},k=1,2,\ldots,K_{1}, is uniform within the detection region. Note that K2K_{2} is independent of DD since the pulses sent with power levels outside the detection region can only come from the jammer, no matter if Alice transmits or not. Given K2K_{2} (Poisson with mean (1ΔPAΔPJdaw2)λj\left(1-\frac{\Delta_{P_{A}}}{\Delta_{P_{J}}d_{aw}^{2}}\right)\lambda_{j}), the distribution of Vk,k=K1+1,K1+2,,KV_{k},k=K_{1}+1,K_{1}+2,\ldots,K, is uniform outside the detection region. Let {Lk,m:k=1,,K1,m=1,,Mn}\{L_{k,m}:k=1,\ldots,K_{1},m=1,\ldots,M_{n}\} denote the locations (in [0,T][0,T]) of pulses sent with power within the detection region, and {Lk,m:k=K1+1,,K,m=1,,Mn}\{L_{k,m}:k=K_{1}+1,\ldots,K,m=1,\ldots,M_{n}\} denote the locations of pulses sent with power outside the detection region. Given K1K_{1}, the distribution of Lk,mL_{k},m for k=1,2,,K1k=1,2,\ldots,K_{1} and all mm is uniform over [0,T][0,T]. Given K2K_{2}, the distribution of LkL_{k} for k=K1+1,K1+2,,Kk=K_{1}+1,K_{1}+2,\ldots,K and all mm is also uniform over [0,T][0,T], which is independent from DD.

  • 𝕍,𝕃𝕊,𝕃\mathbb{V},\mathbb{L}\longrightarrow\mathbb{S},\mathbb{L}: The conditional distribution of Sk,mS_{k,m}, for k=1,2,,K,m=1,2,,Mnk=1,2,\ldots,K,m=1,2,\ldots,M_{n}, given VkV_{k}, is a zero-mean Gaussian random variable with variance VkV_{k}.

Refer to caption
Figure 5: Markov chain illustrating the transition from Alice’s decision DD on transmission, to Willie’s observed signal z(t)z(t).

Given the pulse locations and the height of the pulses, the signal z(t)z(t) can be constructed from p(t)p(t) and the AWGN of Willie’s channel. From the Markov chain shown in Fig. 5, we see that z(t)z(t) conditioned on K1K_{1} is independent of DD. Therefore, K1K_{1} is a sufficient statistic for Willie to decide between hypotheses H0H_{0} and H1H_{1}.

In particular, hypotheses H0H_{0} and H1H_{1} can be characterized as:

  • H0H_{0}: the number of power levels within the detection region follows Pois(λjΔPaΔPjdawr)Pois\left(\frac{\lambda_{j}\Delta_{P_{a}}}{\Delta_{P_{j}}d_{aw}^{r}}\right);

  • H1H_{1}: the number of power levels within the detection region follows Pois(λjΔPaΔPjdawr)+1Pois\left(\frac{\lambda_{j}\Delta_{P_{a}}}{\Delta_{P_{j}}d_{aw}^{r}}\right)+1.

IV-D Covert Limit

Let P0P_{0} and P1P_{1} denote the distribution of the number of power levels observed by Willie (within Willie’s detection range) given H0H_{0} and H1H_{1}, respectively:

P0(k)=λkeλk!,k0\displaystyle P_{0}(k)=\frac{\lambda^{k}e^{-\lambda}}{k!},\,\,\,k\geq 0 (15)

and

P1(k)=λk1eλ(k1)!,k1\displaystyle P_{1}(k)=\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!},\,\,\,k\geq 1 (16)

where λ=λjΔPaΔPjdawr\lambda=\frac{\lambda_{j}\Delta_{P_{a}}}{\Delta_{P_{j}}d_{aw}^{r}}. Theorem 13.1.1 in [13] shows that for the optimal hypothesis test,

PFA+PMD=1𝒱T(P0,P1)\displaystyle P_{FA}+P_{MD}=1-\mathcal{V}_{T}(P_{0},P_{1})

where

𝒱T(P0,P1)=12k|P0(k)P1(k)|\displaystyle\mathcal{V}_{T}(P_{0},P_{1})=\frac{1}{2}\sum_{k}|P_{0}(k)-P_{1}(k)|

is the total variation distance between P0P_{0} and P1P_{1}, where the sum is over all kk in the support of P0P1P_{0}\cup P_{1}. Therefore, by the definition of covertness, if

𝒱T(P0,P1)ϵ,\displaystyle\mathcal{V}_{T}(P_{0},P_{1})\leq\epsilon, (17)

Alice achieves covert communications.

Given (15) and (16), we derive:

𝒱T(P0,P1)=12k=1|P0(k)P1(k)|+12P0(0)\displaystyle\mathcal{V}_{T}(P_{0},P_{1})=\frac{1}{2}\sum_{k=1}^{\infty}|P_{0}(k)-P_{1}(k)|+\frac{1}{2}P_{0}(0)
=12k=1λk1eλ(k1)!|λk1|+12eλ\displaystyle=\frac{1}{2}\sum_{k=1}^{\infty}\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!}\left|\frac{\lambda}{k}-1\right|+\frac{1}{2}e^{-\lambda}
=12[k=1λλk1eλ(k1)!(λk1)+k=λ+1λk1eλ(k1)!(1λk)\displaystyle=\frac{1}{2}\Bigg{[}\sum_{k=1}^{\lambda}\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!}\left(\frac{\lambda}{k}-1\right)+\sum_{k=\lambda+1}^{\infty}\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!}\left(1-\frac{\lambda}{k}\right)
+eλ]\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\quad\,\,\,\,\,+e^{-\lambda}\Bigg{]}
=12[k=1λλkeλk!k=1λλk1eλ(k1)!+k=λ+1λk1eλ(k1)!\displaystyle=\frac{1}{2}\Bigg{[}\sum_{k=1}^{\lambda}\frac{\lambda^{k}e^{-\lambda}}{k!}-\sum_{k=1}^{\lambda}\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!}+\sum_{k=\lambda+1}^{\infty}\frac{\lambda^{k-1}e^{-\lambda}}{(k-1)!}
k=λ+1λkeλk!+eλ]\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\qquad\quad-\sum_{k=\lambda+1}^{\infty}\frac{\lambda^{k}e^{-\lambda}}{k!}+e^{-\lambda}\Bigg{]}
=12[k=1λλkeλk!+k=λλkeλk!k=0λ1λkeλk!\displaystyle=\frac{1}{2}\Bigg{[}\sum_{k=1}^{\lambda}\frac{\lambda^{k}e^{-\lambda}}{k!}+\sum_{k=\lambda}^{\infty}\frac{\lambda^{k}e^{-\lambda}}{k!}-\sum_{k=0}^{\lambda-1}\frac{\lambda^{k}e^{-\lambda}}{k!}
k=λ+1λkeλk!+eλ]\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\qquad\quad-\sum_{k=\lambda+1}^{\infty}\frac{\lambda^{k}e^{-\lambda}}{k!}+e^{-\lambda}\Bigg{]}
=12(k=1λkeλk!+λλeλλ!k=0λkeλk!+λλeλλ!+eλ)\displaystyle=\frac{1}{2}\left(\sum_{k=1}^{\infty}\frac{\lambda^{k}e^{-\lambda}}{k!}+\frac{\lambda^{\lambda}e^{-\lambda}}{\lambda!}-\sum_{k=0}^{\infty}\frac{\lambda^{k}e^{-\lambda}}{k!}+\frac{\lambda^{\lambda}e^{-\lambda}}{\lambda!}+e^{-\lambda}\right)
=λλeλλ!\displaystyle=\frac{\lambda^{\lambda}e^{-\lambda}}{\lambda!}

Using Stirling’s approach, this can be upper bounded as:

λλeλλ!\displaystyle\frac{\lambda^{\lambda}e^{-\lambda}}{\lambda!} λλeλ2πλλ+1/2eλ=12πλ.\displaystyle\leq\frac{\lambda^{\lambda}e^{-\lambda}}{\sqrt{2\pi}\lambda^{\lambda+1/2}e^{-\lambda}}=\frac{1}{\sqrt{2\pi\lambda}}\,.

Thus, if

λ12πϵ2,\displaystyle\lambda\geq\frac{1}{2\pi\epsilon^{2}},

i.e.,

λjΔPjdawr2πΔPaϵ2,\displaystyle\lambda_{j}\geq\frac{\Delta_{P_{j}}d_{aw}^{r}}{2\pi\Delta_{P_{a}}\epsilon^{2}}\,, (18)

covertness is achieved. This implies that one of the two strategies can be employed: 1) Alice chooses a ΔPa\Delta_{P_{a}} and the jammer can use an upper bound on dawrd_{aw}^{r} to choose λj\lambda_{j}; 2) the jammer chooses a λj\lambda_{j} and Alice can use dawrd_{aw}^{r} to choose ΔPa\Delta_{P_{a}}.

Since the maximum interference from the jammer at Bob can be upper bounded by a constant, reliability is achieved under the same construction. Thus, under this construction, Alice can achieve covert and reliable communications when the path-loss between her and Willie is unknown. Also, since under the above construction, Alice can send Mn=αWTM_{n}=\lfloor\alpha\lfloor WT\rfloor\rfloor pulses with a constant power (which does not decrease with WTWT), 𝒪(WT)\mathcal{O}(WT) bits can be transmitted covertly and reliably from Alice to Bob.

V Conclusion

In this paper, we have studied covert communications in continuous-time systems, where Alice wants to reliably communicate with Bob in the presence of a jammer without being detected by Willie. We established constructions that allow Alice to achieve covert communications in both cases when the path-loss between Alice and Willie is known and unknown. We proved that 𝒪(WT)\mathcal{O}(WT) covert information bits on a channel with approximate bandwidth WW can be reliably transmitted from Alice to Bob in TT seconds for both cases. In this paper, an infinite number of key bits shared between Alice and Bob is needed. A direction for future work is to consider the use of a finite number of key bits and the values of the scaling constants.

Appendix A Simulation of Fig. 1

[10] introduces a co-channel interference cancellation technique with initial signal separation when the signals have different timing offsets. Here we apply similar techniques in covert communication systems where the receiver only wants to detect the existence of the power – a single bit of information, instead of a signal from its mixture of another signal. In the simulation, we set the number of trials to 10001000. We let Alice and the jammer send 200200 i.i.d zero-mean Gaussian symbols with pulse-shaped waveforms (using square-root raised cosine pulse shaping filter with roll-off factor 0.20.2). The two signals have symbol period Ts=48T_{s}=48 discrete-time samples and time delay difference Ts/6T_{s}/6. Alice’s signal to noise ratio (SNR) is set to be 55 dB, and the jammer’s SNR is set to be 2020 dB. The jammer’s signal is treated as interference and is subtracted using the same techniques in [10] without iteration. Standard power detector is then applied at the output to detect Alice’s presence.

Appendix B Discussion of the Bandwidth of the Constructions

Here we provide a brief discussion on the bandwidth of our construction. For either of our constructions, each of a random or a constant number MM of pulses with pulse shape p(t)p(t) is multiplied by its corresponding symbol and then placed with delay randomly drawn from the interval [0,T][0,T]. This results in a waveform:

X(t)=k=1Nakp(tτk)\displaystyle X(t)=\sum_{k=1}^{N}a_{k}p(t-\tau_{k})

where ak,n=1,2,,Na_{k},n=1,2,\ldots,N is the sequence of zero-mean independent symbol values, and τk,k=1,2,,M\tau_{k},k=1,2,\ldots,M is the i.i.d. sequence of pulse delays. Since the delays are drawn uniformly over only the interval [0,T][0,T], the process X(t)X(t) is not wide-sense stationary and thus its bandwidth is not strictly defined. Hence, consider rather the following random process, which is an extension of the construction to the infinite interval:

X~(t)=i=k=1Nak(i)p(tτk(i)iT)\displaystyle\tilde{X}(t)=\sum_{i=-\infty}^{\infty}\sum_{k=1}^{N}a_{k}^{(i)}p(t-\tau_{k}^{(i)}-iT)

where ak(0)=aka_{k}^{(0)}=a_{k} and τk(0)=τk\tau_{k}^{(0)}=\tau_{k}, k=1,2,,Nk=1,2,\ldots,N, and the values for the intervals outside of [0,T][0,T] are chosen independently but according to the same construction as within [0,T][0,T]. The random process X~(t)\tilde{X}(t) is wide-sense stationary, and, through standard digital communication system analysis arguments, has power spectral density SX~(f)=|P(f)|2S_{\tilde{X}}(f)=|P(f)|^{2}, where P(f)P(f) is the Fourier transform of p(t)p(t). Hence, the bandwidth of X~(t)\tilde{X}(t) is the same as that of P(f)P(f). Observing that X(t)X(t) is a windowed version of X~(t)\tilde{X}(t) and that TT is very large, the signal X(t)X(t) is approximately bandlimited to the bandwidth WW of p(t)p(t).

References

  • [1] B. A. Bash, D. Goeckel and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1921-1930, September 2013.
  • [2] P. H. Che, M. Bakshi and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” 2013 IEEE International Symposium on Information Theory, Istanbul, 2013, pp. 2945-2949.
  • [3] L. Wang, G. W. Wornell and L. Zheng, “Fundamental Limits of Communication With Low Probability of Detection,” in IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3493-3503, June 2016.
  • [4] M. R. Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334-2354, May 2016.
  • [5] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst, “Achieving undetectable communication” IEEE Journal of Selected Topics in Signal Processing, vol. 9, no. 7, pp. 1195–1205, Oct. 2015.
  • [6] P. H. Che, M. Bakshi, C. Chan and S. Jaggi, “Reliable deniable communication with channel uncertainty,” 2014 IEEE Information Theory Workshop (ITW 2014), Hobart, TAS, 2014, pp. 30-34.
  • [7] D. Goeckel, B. Bash, S. Guha and D. Towsley, “Covert communications when the warden does not know the background noise power,” IEEE Communications Letters, vol. 20, no. 2, pp. 236-239, Feb. 2016.
  • [8] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley and D. Goeckel, “Covert communication in the presence of an uninformed jammer,” IEEE Transactions on Wireless Communications, vol. 16, no. 9, pp. 6193-6206, Sept. 2017.
  • [9] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley and D. Goeckel, “Covert communications on continuous-time channels in the presence of jamming,” 51st Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, 2017, pp. 1697-1701.
  • [10] H. Arslan and K. Molnar, “Cochannel interference suppression with successive cancellation in narrow-band systems,” IEEE Communications Letters, vol. 5, no. 2, pp. 37-39, Feb 2001.
  • [11] S. Kay, “Fundamentals of statistic signal processing: detection theory,” Fundamentals of Statistical Signal Processing, Englewood Cliffs, NJ, USA: Prentice-Hall, 1998.
  • [12] M. Shaked and J. Shanthikumar, Stochastic Orders and their Applications, San Diego, CA, USA: Academic, 1994.
  • [13] E. Lehmann and J. Romano, Testing Statistical Hypotheses, 3rd ed. New York: Springer, 2005.