LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Covert Communications in Multi-Channel Slotted ALOHA Systems

Photo by averey from unsplash

The fundamental limits of covert communication, where a message is sent from transmitter Alice to intended recipient Bob without detection by an attentive adversary warden Willie, has been considered extensively… Click to show full abstract

The fundamental limits of covert communication, where a message is sent from transmitter Alice to intended recipient Bob without detection by an attentive adversary warden Willie, has been considered extensively in recent years at the physical layer. The covert throughput depends critically on the warden’s understanding of the characteristics of the radio environment and the type of receiver that he employs, and, as expected, the throughput increases when the warden has some uncertainty about the environment or some non-idealities in his receiver. In this paper, we consider the covert throughput when the adversary is only able to observe the medium access control (MAC) layer in a wireless communication system. In particular, given that the system has a rate of λ packets per slot transmitted over n channels by allowable system users, we study the allowable rate λa by covert users while maintaining covertness from an attentive warden observing the channel status in a slotted ALOHA system. We characterize performance for wardens with different abilities to discern the number of packets on a given channel, ranging from simple receivers that detect only whether there was a packet present to complicated receivers that can determine the number of packets involved in any collision, and also consider intended recipients Bob with varying abilities to perform multi-packet reception. In contrast to prior work in covert communications, the application considered motivates the consideration of results for finite (often small) observation vector lengths n at the adversary. Numerical results are provided both to illustrate the tightness of our achievability regions for the packet transmission rate of the covert transmitters and to demonstrate the covert throughput of the system as a function of λ and n.

Keywords: slotted aloha; system; communications multi; covert throughput; covert communications

Journal Title: IEEE Transactions on Mobile Computing
Year Published: 2020

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.