Next Article in Journal
Day-Ahead Hourly Solar Irradiance Forecasting Based on Multi-Attributed Spatio-Temporal Graph Convolutional Network
Previous Article in Journal
Detecting Gait Events from Accelerations Using Reservoir Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

NN-Based 8FSK Demodulator for the Covert Channel

by
Krystian Grzesiak
* and
Zbigniew Piotrowski
Institute of Communications Systems, Faculty of Electronics, Military University of Technology, 00-908 Warsaw, Poland
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(19), 7181; https://doi.org/10.3390/s22197181
Submission received: 31 August 2022 / Revised: 15 September 2022 / Accepted: 16 September 2022 / Published: 21 September 2022
(This article belongs to the Section Communications)

Abstract

:
In this article, a superposition-based covert channel and its demodulator were proposed and examined. As a covert waveform, an 8FSK modulation was selected. The impact of the channel estimation error and resulting imperfect SIC operation (successive interference cancelation) on the covert information demodulation process was considered. Especially for this imperfection, an NN-based demodulator was proposed. The superiority of this solution over the traditional 8FSK correlator-based receiver was examined for various cases, including the hard- and soft-decision detectors. It was proven that, although NN does not provide BER values equal to zero, even for the perfect SIC, it generally overcomes the traditional correlator-based 8FSK demodulator. Simulation results showed that the NN-base demodulator, in the case of additional covert channel coding, provides error-free demodulation, even for four-times greater channel gain error.

1. Introduction

The first use of the term “covert channel” occurred in research study [1]. It focused on the exchange of data between programs. It defined the covert channel as a communication channel that is not at all designed or intended for the transmission of information. Nowadays, it is assumed that any manner of communication that violates the system security policy is a covert channel. In the physical layer of wireless communication, there were proposed solutions [2,3,4,5], based on the so-called post-modulation [6] method, which embeds the hidden data stream after the modulation stage. In this method, the covert modulated signal is superposed on the cover (unhidden) signal. The hidden signal must be much weaker than the cover signal to avoid detection (in the sense of the low probability of detection). Moreover, additional phase shift mechanisms [2] can be implemented to decrease detection through statistical analysis.
The previous studies on covert channels consider only selected, coherent types of modulation for hidden signals. Generally, it was assumed that the separation of the superimposed signals (SIC operation) can be performed in a perfect way, which means that the receiver has perfect information about the cover signal. It is far from practice and reality. In this paper, we analyze an 8FSK modulation superimposed onto a QAM signal (cover). For the so-defined covert channel, an NN-based demodulator was proposed. To support the examinations, we compared the presented demodulator with a traditional FSK correlator-based demodulator. Our results indicate that the NN-based demodulator outperforms 8FSK correlator-based demodulator for imperfect SIC measured by channel gain estimator error.
In this paper, we present a strictly defined problem connected with a covert channel that combines several topics, such as steganography, FSK demodulation, impartments in the receiver, soft/hard metrics, and neural networks, as well as their applications. So, it needs to be analysed and merged with the use of several literature references to enhance the physical secrecy and quality of the transmission.
The idea of the use of a neural network in the demodulation process and, generally, in the physical layer of wireless communication [7] is not quite new. A NN-based BPSK demodulation is a subject of the article [8]. A fully convolutional neural network with variable input and output length, called DemodNet, to demodulate BPSK and QAM modulation was presented in [9]. DemodNet provides, under the AWGN channel, results that are very close to the traditional methods. What is important in this approach is the soft and hard demodulation realized by NN. To reduce the overall computational complexity of the soft-decision, a trainable universal neural network-based demodulator architecture was introduced in [10] for QAM signals
In the literature, much less attention has been devoted to FSK demodulators, when it comes to soft demodulation and neural networks, in general. A soft-decision Viterbi decoder for FSK demodulation was presented in [11]. However, it deals with frequency discriminator for FSK demodulation. Soft-decision metrics for FSK signalling, in the presence of Cauchy and Gaussian noise, are derived in [12]. The authors proposed utilizing correlators in the detection process, which is useful for dealing with non-coherent demodulation. A neural network, as a technique for BFSK demodulation, was presented in [13]. The authors simulated the demodulation process over the AWGN Rayleigh fading channel, but the NN works in a hard-decision manner.
The problem of the imperfect SIC operation (caused by channel gain estimation error) and superposition of signals are closely related to NOMA, specifically P-NOMA (power non-orthogonal multiple access) systems. In the case of NOMA, SIC errors have less impact on the system performance. There are some positions in the subject literature [14,15].
In summary, to the best of the authors’ knowledge, there are neither studies on high or-dered FSK modulation as a covert modulation nor comprehensive study regarding its non-perfect demodulation (in a presence of non-perfect SIC). Therefore, the purpose of this article is to fill this gap, as follows:
  • To ascertain the pros and cons of using 8FSK modulation we have compared the performances of the main modulation schemes used to create a covert channel;
  • We examined the imperfect SIC operation on 8FSK demodulation;
  • We proposed both soft- and hard-decision NN-based demodulator for covert channel and compared it with correlator-based FSK detector.
The rest of the paper is organized as follows. Section 2 briefly presents the covert channel model and receiver based on SIC operation. This section also justifies the use of 8FSK as a covert modulation. Section 3 presents sources of imperfect SIC and its impact on covert modulation reception. Section 4 presents the NN-based 8FSK demodulator and test scheme used for its evaluation. Section 5 presents the simulation results for the NN-based 8FSK demodulator and compares it with the traditional correlator-based 8FSK demodulator. Finally, the conclusions are presented in Section 6.

2. Model of the Covert Transmission

2.1. Covert Transmission Model

The covert transmission model tends to assume the existence of a standard cast of characters: Alice, Carol, Bob, and Willie [16]. In this model, it is considered a scenario where that Bob wants to send information to Alice, in the presence of Carol’s transmission (Figure 1a). The steganalyser is represented by the Warden (Willy). His knowledge of the cover transmission (waveform, variation, statistical properties, etc.) determines the possibility of the detection, where the covert channel transmission takes place. If there is no knowledge regarding covert transmission, Willy has no chance, in the sense of LPD (low probability of detection), to detect Bob. In other words, the covert message can be detected only when the non-covert message, where the covert message is superimposed, can be decoded [17]. Model Figure 1a can be simplified to the one presented in Figure 1b by assuming that Bob simultaneously transmits (but not necessarily synchronously) the cover and covert signals. In this case, Bob perfectly controls the cover and covert powers. In this study, for simplicity, we assume the above model.

2.2. Selection of the Modulation for Hidden Transmission

Bob’s ability (from Figure 1) to hide the fact of communication mainly depends on his ability to make covert signals look like noise. Therefore, the power of the covert signal should be kept as small as possible; in order to avoid detection by the outsider (Willie) [18].
Moreover, a covert waveform can be modified to impede steganalysis. So far, in the case of typical coherent transmission (QAM/PSK modulation), the covertness was increased by constellation point rotations [2,3]. The impact of the shape of the covert con-stellation points and resulting IQ histograms will be discussed in the next section.
It is also worth considering receiver problems. From the demodulator point of view, non-coherent demodulators are simpler. This issue arises because the carrier phase can be altered by the channel and has an impact on the accuracy of the detection. If there is not a perfect phase coherence, the non-coherent demodulation constitutes a good solution and can make it easier to convert channel demodulation. In addition to the foregoing, it is worth noting that, in contrast to the typical communication model, a covert channel generally does not require a high data rate. The low variance of the covert signal is compensated by the increased duration of the symbol.
These scenarios and assumptions lead us to the main assumptions for covert signal modulation:
  • No constant constellation points (higher immunity to steganalysis [2,3,4]);
  • Non-coherent detection (easier detection, lack of expensive, and complex recovery circuit);
  • Possible low BER (bit error rate) for given energy per symbol to noise power (reliable transmission).
FSK modulation fulfills the first two of three criteria. The last criterion must be carefully analyzed. The best way to do this is as follows: BER curves are used for illustration of the modulation performance. Figure 2 shows the BER performance for coherent (QAM and PSK) and non-coherent demodulation (FSK), taking the different modulation orders into consideration.
The performance analysis of the two-ordered modulation under the minimum required E b / N 0 rate shows the superiority of 2PSK modulation. The 2FSK modulation required 4 dB more energy per bit. By increasing the order of the PSK/QAM modulation, the higher E b that is required, the lower the bandwidth. In the case of FSK, the higher modulation order results in lower energy per bit and higher bandwidth. From a covert channel perspective, it is most important to choose a modulation scheme that has a lower required E b / N 0 for the given BER. This justifies the use of 2PSK, 4PSK, and QAM modulation in the previous papers of the author [2,3,4,5].
As was shown in Figure 2, 8FSK provides similar results (in the sense of energy per bit), and that is why it became the waveform for the covert information and subject of our analysis.

2.3. The System Model for Cover Communication

Figure 3 shows in a detail the system model (compatible with Figure 1b) used to describe principles of a covert channel, based on the superposition of signals. The cover and covert signals are transmitted simultaneously (in our case, not necessarily synchronously). To increase the BER performance, and for better analysis of our proposed solutions, we assumed channel coding before covert data transmission. The coding was not carried out for cover bits. Next, the superimposed signals with different power levels were transmitted via a wireless channel. In the receiver, SIC operation (successive interference cancellation) was performed to recover the covert signal. SIC, in short, means subtraction operation, where the minuend represents the received combined signal (superposition of cover and covert modulated signals), and the subtrahend is the recovered signal of the cover (after remodulation).
The transmitter signal is shown in Equation (1) [14].
s t = s 1 t + s 2 t ,
where s 1 t is the signal of the cover (with the variance σ 1 2 ), and s 2 t is the covert signal (with the variance σ 2 2 ). To ensure the secrecy of communication, the variance of the signals should satisfy the inequality σ 2 2 < < σ 1 2 . If the receiver (user) is aware that additional information is embedded, it is able to decode (demodulate) the covert message. This is achieved by removing the cover signal from the received signal. An uninformed user treats signal s t as a noised version of s 1 t .
The received signal is given as Equation (2) [15]:
y t = h s t + n = i = 1 2 h i s i t + n .
In this model, h represents the channel gain (e.g., Rayleigh fading channel) between the transmitter and receiver, and it is represented by a circularly-symmetric, complex Gaussian random variable. The symbol n represents Gaussian noise.
Perfect SIC operation means that the recovery and re-modulation of the signal s 1 t are achieved without any errors, which means [15], as shown in Equation (3):
s ^ 2 t = y t s ^ 1 t = y t s 1 t = s 2 t .
Assumed that a perfect SIC operation can be performed, the simulation was conducted for the following parameters.
Different numbers of samples per symbol for different covert modulation (Table 1) were adopted to achieve the same covert data rate. The results of the simulation are depicted in Figure 4, where the value E b / N 0 refers only to the cover signal (16QAM).
The covert signal causes additional distortions and degrades the system performance that can be measured by EVM. For this case, the results of the simulation are depicted in Figure 5 and Figure 6.
From the results depicted above, we can conclude that FSK, 8FSK, and BPSK have the same impact on the cover signal. Slightly worse transmission parameters of 8FSK in relation to BPSK (Figure 4) may be treated as a cost of the non-coherent demodulation.
There remains the question of the steganalysis mentioned in the previous section. It is usually based on histograms. It is achieved by carrying out the I/Q analysis of the received signal s(t) and examining its histograms.
The example of histogram-based steganalysis is presented in Figure 7. For a clearer graphical presentation, we assumed QAM as the cover. We compare 8FSK IQ histograms with covert modulation 4PSK. The covert modulation is 4PSK taken for the analysis result from comparable bit energy for the given BER (presented in Figure 2).
As shown in Figure 7, adding a hidden signal to the cover signal inevitably changes the properties of the second one. For the countermeasure for covert channels, steganalysis looks for these changes. When the warden (Figure 1) has perfect knowledge about the cover signal (plus channel gains, noise, and other disturbances), it is not possible to ensure covertness (Figure 7). Increased resistance 8FSK to steganalysis comes from the fact that IQ histograms (estimation of the probability density functions) are more similar to the cover histograms than 4PSK, especially in the case of the noisy channel (Figure 7b vs Figure 7c). Basically, coherent modulation (like N-order phase modulation) always provide a limited number of states on IQ constellation and, thus, bins on IQ histograms. In contrast, after observation of the N-FSK signal, the obtained histograms have many more bins, in a specified range. That is why FSK modulation is less prone to steganalysis.
Graphical representation of the signal in histogram form is used to decide on the detection of hidden transmission. Numerical values of the similarity of the histograms can be calculated by Kolmogorov–Smirnov (KS) test [3,19].

3. Imperfect SIC Operation

The severe amplitude and phase fluctuations inherent to wireless channels significantly degrade the BER performance of the signal. Moreover, errors in the demodulation process come from every part of the transmitter and receiver, including antenna systems [20,21,22,23] The typical receiver block diagram is depicted in Figure 8.
The main sources of distortion considered in our paper are AGC and CE (channel estimator). Other errors can come from ADC (analog to digital converter) and FCO (frequency carrier oscillator) corrector. The impact of the channel gain error and hardware impartments for SIC were presented in [24,25], whereas the mean-reverting signal strength was presented in [26]. AGC and CE errors lead to non-ideal SIC operation. As a result, SIC cancels only a part of the cover signal.
The covert signal after non-deal SIC is provided by [15], as shown in Equation (4):
s ^ 2 t = h h ^ s 1 t h ^ + h s 2 t h ^ ,
where h ^ is a channel gain estimator and represents in our paper AGC and CE errors.
When the channel gain estimator is equal to zero, i.e., e x = h h ^ = 0, then s ^ 2 t = s 2 t , that indicates perfect SIC. In the case of covert transmission, when σ 2 2 < < σ 1 2 , even a small error e x causes severe damage to the covert signal. In the subsequent discussion, the normalized channel gain estimator error will be used to evaluate the demodulator’s performance, provided by [27], as shown in Equation (5):
e a b s = h h ^ h 100 % .
The example of the IQ constellation of the covert signal after perfect ( e a b s = 0) and imperfect SIC ( e a b s = 2%) for 8FSK (covert) and 16QAM as a cover signal is depicted in Figure 9. However, such a graphical presentation does not reflect the detection performance, so the detailed assessment and numerical evaluation must be performed via simulation.

4. NN-Based 8FSK Demodulator and Its Evaluation

To evaluate the impact of channel gain estimation error on covert signal demodulation (consequently the imperfect SIC) we used a test scheme presented in Figure 10. This scheme shows that correlation-based (Figure 10, case (a)) and NN-based (Figure 10, case (b)) demodulators were tested under the same conditions, including hard and soft decoding.
Covert data are coded (Figure 10) and modulated using the 8FSK modulation. Next, the signal is superimposed onto the 16QAM cover signal. For simplicity, we assume that the wireless channel does not introduce any errors (noise-free channel). The cover signal is distorted only by the covert signal, which means, in our case (very low variance of the covert signal), its error-free demodulation. Then comes the main purpose of this paper: a comparison of the typical (correlator-based) 8FSK and NN-based demodulators, in the presence of the SIC error. They both realize hard- and soft-output demodulation. Evaluation of these methods was achieved using BER ratio vs. e a b s for coded data (hard-output demodulation) and decoded data (hard- and soft-output demodulation). Every demodulation/decoding was made separately, with the use of the same input set. In our simulation, NN has been implemented in Keras with Tensorflow. Input data, as in all simulations reported here, were created in Matlab. In the next section, the main elements of our test will be described, especially the NN-based and correlator-based demodulators.

4.1. Correlator-Based 8FSK Demodulator

Demodulation can be achieved in either a soft or hard manner. Hard demodulation converts the received symbols into bit streams. Compared with hard demodulation, soft demodulation retains more channel information. Soft demodulation provides the level of confidence of each bit, according to the received symbols. The commonly used method of soft-decision is the estimation method, based on the logarithmic likelihood ratio (LLR). When the parameters of the channel and noise are unknown, the unknown parameters can be replaced by their maximum likelihood estimates (this leads to the so-called generalized likelihood ratio (GLR)). The output of the demodulator is then transferred to the channel decoder. As a result, it can improve the posterior probability of data decoding and reduce the bit error rate.
The block diagram of the 8FSK hard and soft demodulator is presented in Figure 11. The MFSK modulated signal s 2 t for the order M=8 is composed of eight elementary components [11], as shown in Equation (6):
s 2 , j t = s 2 , 1 t , s 2 , 2 t , , s 2 , j t , j = 1 , , M
Every elementary component is given by [28], as shown in Equation (7):
s 2 , j t = exp ( j 2 π m f j t )
and frequency separation equals Δ f 0 .
The output of the j t h correlator w i is given by [28], as shown in Equation (8):
w j = 1 T T s ^ 2 t c o n j s 2 , j t d t .
The hard-decision calculator determines the maximum value among all w j ; hence, the symbol value c i [12], as shown in Equation (9):
c i = m a x ( w j 2 ) .
Each received symbol represents l o g 2 M coded bits. The soft-decision of coded symbols are generated by the demodulator, in the form of a log-likelihood ratio (LLR), and passed to the decoder. The LLR of the j th coded bit b j is defined as [12,28], as shown in Equation (10).
L j log Pr [ b j = 0 | w ] Pr [ b j = 1 | w ]
where w = [ w 1 , w 2 , , w M ] is a vector of the outputs of all correlators.
In our case, because of unknown channel parameters, we use GLR metrics given by Equation (11):
L j w = l o g i : b j = 1 k = 0 ,   k i M 1 w k 2 M i : b j = 0 k = 0 ,   k i M 1 w k 2 M

4.2. NN-Based 8FSK Demodulator

The block diagram of the receiver with the NN-based FSK demodulator is presented in Figure 12, with the NN architecture in Figure 13. The NN-based covert channel demodulator is a result of searching for the optimal solution. Originally, it was assumed that NN can perform SIC operation and demodulation simultaneously. However, NN was not able to learn, due to the fact that the covert information contained in far decimal places was lost by it. Finally, the input vector is composed of signals s ^ 1 (signal after remodulation process, i.e., demapping) and s ^ 2 .
It was assumed that every symbol of the 8FSK consists of 16 complex samples (16 real and 16 imaginary). Accordingly, for the input of the neural network (Figure 13), a vector of length 64 is supplied. There are three hidden layers with a sigmoid activation function. The output layer consists of three softmax activation functions, one for each bit. In the simplest case, such a neural network, it operates as a classifier that classifies the received signal into the corresponding transmitting bit combination. To train the NN, we use hard bit information as labels. The cross-entropy was used as the loss function during the training. The best performance of the model was achieved for the batch size, in each training round set to 256 and epochs to 1000. The input set consisted of 100,000 samples, where 80% of samples were used to train NN, with 20% for validation.
As mentioned before, the presented NN can work as both hard- and soft-decision demodulators. The hard-decision is based on the selection of the softmax output with a higher value. The decision is made for every 3 bits (data symbol). In the case of soft demodulation, we utilize the property, and that sigmoid output represents the probability that the bit has a certain value, 0 or 1. For every two outputs, for every softmax function ( out 1 , N and out 2 , N , N = 1 ,   2 ,   3 ), the relation can be expressed as: out 1 , N = 1 out 2 , N . Thus, the soft-decision metrics are given as [9], as shown in Equation (12):
ξ j = l o g o u t 1 , N o u t 2 , N = l o g i t o u t 1 , N , N = 1 , 2 , 3

4.3. Channel Coder

In our simulation, for both demodulators, we implemented the standard convolutional encoder and Viterbi decoder [28] rate of ½ with generator polynomial G = 171 ,   133 for constraint length 7 (Figure 14).

5. Simulations Results

We have conducted a simulation to assess the BER performance in the presence of imperfect SIC operation measured by e abs (distortion expressed in %). The main parameters of the simulation are shown in Table 2. It was assumed that e abs is constant over the transmission of the one symbol 8FSK. The evaluation of the correlator and NN-based demodulator was done at different stages of the covert signal data reception process:
  • Hard 8FSK demodulation;
  • Hard/soft 8FSK demodulation with a covert data decoder.

5.1. Hard Demodulation (Without Channel Coder)

Figure 15 shows the performance comparison of the 8FSK correlator-based and NN demodulators (output a1a vs output b1a, Figure 10). The advantage of the 8FSK demodulator, which is obvious, is perfect demodulation in the absence of channel estimation gain error. The NN-based demodulator has BER ≠ 0, even for e a b s = 0. The superiority of the NN over the correlator-based detector appears for e a b s > 1%. Imperfect SIC severely degrades FSK demodulator, with the growth e a b s , whereas NN considerably mitigates its effect. It can be assumed that channel coding can improve BER. The impact of channel coding is presented in the next section.

5.2. Demodulation with Hard/Soft Viterbi Decoder

As expected, the Viterbi decoder can improve BER performance, but the final results strongly depend on the demodulator.
Figure 16 shows the performance of the correlator-based 8FSK demodulator for hard and soft decoding (output a1 vs output a2, Figure 10). In his case, soft decoding has a negligible impact, in comparison to hard decoding. It is due to the fact that the metrics are calculated for unknown channel parameters.
In the case of the NN demodulator (output b1 vs output b2, Figure 10), the channel coding significantly improves the performance of the system (Figure 17). It guarantees, in comparison to the system without a coder (Figure 15), the BER = 0 for e a b s = 0. Moreover, the soft decoding, in addition to NN, remarkably enhances detection. This results from the fact that the metrics calculated based on NN perform much better than those that are theoretically calculated.

6. Conclusions

In this article, the 8FSK modulation was proposed for covert communication based on the superposition of the signal. This modulation provides the possibility of transmitter and receiver low complexity and assists considerably in the effective practical implementation of such a system. The main advantage of this solution is the non-coherent transmission and a lower probability of detection by the intruder, thanks to non-constant constellation points on the constellation diagram. This is a major difference from a typical solution, based on the constant point of the phase modulation. Inherently, the covert signal suffers from non-deal SIC operation caused by hardware impairments and estimation channel gain error, mainly because of the low energy of the hidden signal. As was shown, even small errors severely affect the correlator-based detector performance. To solve this problem, an NN-based detector was proposed. Such a detector highly outperforms traditional FSK correlator-based demodulator. The additional use of channel coding improves the performance of the system. In this case, the metrics calculated based on NN outperformed the theoretically calculated metrics for the correlator-based detector. It leads to better soft-decision decoding. Ultimately, the simulation results showed that the NN-base demodulator with the Viterbi decoder provides error-free demodulation, even for normalized channel gain estimator error   e a b s = 2%, compared to e a b s = 0.5% for the correlator-based demodulator. Because of focusing on non-ideal SIC operation, the impact of channel noise, multipath transmission, and additional radiated undesirable missions [29] were omitted here for clarity. This may be a subject of future studies.

Author Contributions

Conceptualization, K.G.; methodology, K.G. and Z.P.; software, K.G.; validation, K.G.; formal analysis, K.G. and Z.P.; investigation, K.G.; re-sources, Z.P.; data curation, K.G. and Z.P.; writing—original draft preparation, K.G. and Z.P.; writing—review and editing, K.G. and Z.P.; visualization, K.G.; supervision, Z.P.; project administration, Z.P.; funding acquisition, Z.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the NATIONAL CENTRE FOR RESEARCH AND DEVELOPMENT, grant number DOB-BIO10/05/03/2019, on “Teleinformation module supporting the identification of victims of catastrophe and terrorist attacks” (acronym IDvictim).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to project restrictions.

Acknowledgments

The authors would like to express their great appreciation to the sensors journal editors and anonymous reviewers for their valuable suggestions, which have improved the manuscript quality.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lampson, W. A note on the confinement problem. Commun. ACM 1973, 16, 613–615. [Google Scholar] [CrossRef]
  2. Dutta, A.; Saha, D.; Grunwald, D.; Sicker, D. Secret agent radio: Covert communication through dirty constellations. In Proceedings of the Information Hiding, Berkeley, CA, USA, 15–18 May 2012. [Google Scholar]
  3. Cao, P.; Liu, W.; Liu, G.; Ji, X.; Zhai, J.; Dai, Y. A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Netw. 2018, 2018, 1–15. [Google Scholar] [CrossRef]
  4. D’Oro, S.; Restuccia, F.; Melodia, T. Hiding data in plain sight: Undetectable wireless communications through pseudo-noise asymmetric shift keying. In Proceedings of the 2019 38th IEEE Conference on Computer Communications (INFOCOM), Paris, France, 29 April–2 May 2019; pp. 1585–1593. [Google Scholar]
  5. Qiao, S.; Liu, G.; Shi, J.; Ji, X.; Liu, W. Wireless Covert Channel with Polarized Dirty Constellation in Backscatter Communication. Available online: https://assets.researchsquare.com/files/rs-816334/v1_covered.pdf?c=1631877587 (accessed on 30 August 2022). [CrossRef]
  6. Moskowitz, I.S.; Safier, P.N.; Cotae, P. Pre-Modulation Physical Layer Steganography. Patent 0101059A1, 25 April 2013. [Google Scholar]
  7. O’shea, T.J.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575. [Google Scholar] [CrossRef]
  8. Fang, L.; Wu, L. Deep learning detection method for signal demodulation in short range multipath channel. In Proceedings of the IEEE 2nd International Conference on Opto-Electronic Information (ICOIP), Singapore, 7–9 July 2017; pp. 16–20. [Google Scholar]
  9. Zheng, S.; Zhou, X.; Chen, S.; Qi, P.; Yang, X. DemodNet: Learning Soft Demodulation from Hard Information Using Convolutional Neural Network. arXiv 2004, arXiv:2011.11337. [Google Scholar]
  10. Shental, O.; Hoydis, J. “Machine LLRning”: Learning to softly demodulate. arXiv preprint 2019, arXiv:1907.01512. [Google Scholar]
  11. Nojima, D.; Nagao, Y.; Kurosaki, M.; Ochi, H.; Ishikawa, A.; Fukagawa, S.; Tahira, A. Soft decision Viterbi decoder for FSK demodulation under fast fading channel. In Proceedings of the International Conference on Communications and Electronics, Nha Trang, Vietnam, 11–13 August 2010; pp. 222–227. [Google Scholar] [CrossRef]
  12. Souryal, M.R.; Larsson, E.G.; Peric, B.; Vojcic, B.R. Soft-Decision Metrics for Coded Orthogonal Signaling in Symmetric Alpha-Stable Noise. IEEE Trans. Signal. Process. 2008, 56, 266–273. [Google Scholar] [CrossRef]
  13. Mohammad, A.S.; Reddy, N.; James, F.; Beard, C. Demodulation of faded wireless signals using deep convolutional neural networks. In Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018. [Google Scholar]
  14. Chung, K. Impact of Channel Estimation Errors on BER Performance of Single-User Decoding NOMA System. Int. J. Internet Broadcast. Commun. 2020, 12, 18–25. [Google Scholar]
  15. Usman, M.R.; Khan, A.; Usman, M.A.; Jang, Y.S.; Shin, S.Y. On the performance of perfect and imperfect SIC in downlink non orthogonal multiple access (NOMA). In Proceedings of the International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS), Denpasar, Indonesia, 6–8 October 2016. [Google Scholar]
  16. Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Comm. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  17. Ta, H. Physical-layer Secrecy and Privacy of Wireless Communication. Ph.D. Thesis, Iowa State University, Ames, IA, USA, 2020. [Google Scholar]
  18. Kelner, J.M.; Ziolkowski, C.; Nowosielski, L.; Wnuk, M. Localization of Emission Source in Urban Environment Based on the Doppler Effect. In Proceedings of the IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016. [Google Scholar]
  19. Peng, P.; Ning, P.; Reeves, D.S. On the secrecy of timingbased active watermarking trace-back techniques. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, 21–24 May 2006; pp. 334–348. [Google Scholar]
  20. Althuwayb, A.A. On-Chip Antenna Design Using the Concepts of Metamaterial and SIW Principles Applicable to Terahertz Integrated Circuits Operating over 0.6–0.622 THz. Int. J. Antennas Propag. 2020, 2020, 1–9. [Google Scholar] [CrossRef]
  21. Alibakhshikenari, M.; Virdee, B.S.; Azpilicueta, L.; Naser-Moghadasi, M.; Akinsolu, M.O.; See, C.H.; Liu, B.; Abd-Alhameed, R.A.; Falcone, F.; Huynen, I.; et al. A Comprehensive Survey of “Metamaterial Transmission-Line Based Antennas: Design, Challenges, and Applications”. IEEE Access 2020, 8, 144778–144808. [Google Scholar] [CrossRef]
  22. Althuwayb, A.A. Enhanced Radiation Gain and Efficiency of a Metamaterial-Inspired Wideband Microstrip Antenna Using Substrate Integrated Waveguide Technology for sub-6 GHz Wireless Communication Systems. Microw. Opt. Technol. Lett. 2021, 13, 1892–1898. [Google Scholar] [CrossRef]
  23. Alibakhshikenari, M.; Ali, E.M.; Soruri, M.; Dalarsson, M.; Naser-Moghadasi, M.; Virdee, B.S.; Stefanovic, C.; Pietrenko-Dabrowska, A.; Koziel, S.; Szczepanski, S.; et al. A Comprehensive Survey on Antennas On-Chip Based on Metamaterial, Metasurface, and Substrate Integrated Waveguide Principles for Millimeter-Waves and Terahertz Integrated Circuits and Systems. IEEE Access 2022, 10, 3668–3692. [Google Scholar] [CrossRef]
  24. Tang, X.; Alouini, M.S.; Goldsmith, A.J. Effect of channel estimation error on M-QAM BER performance in Rayleigh fading. IEEE Trans. Commun. 1999, 47, 1856–1864. [Google Scholar] [CrossRef]
  25. Selim, B.; Muhaidat, S.; Sofotasios, P.C.; Al-Dweik, A.; Sharif, B.S.; Stouraitis, T. Radio-Frequency Front-End Impairments: Performance Degradation in Nonorthogonal Multiple Access Communication Systems. IEEE Veh. Technol. Mag. 2019, 14, 89–97. [Google Scholar] [CrossRef]
  26. Chin, E.; Chieng, D.; Teh, V.; Natkaniec, M.; Loziak, K.; Gozdecki, J. Wireless link prediction and triggering using modified Ornstein–Uhlenbeck jump diffusion process. Wirel. Netw. 2014, 20, 379–396. [Google Scholar] [CrossRef] [Green Version]
  27. Vakili, A.; Sharif, M.; Hassibi, B. The Effect of Channel Estimation Error on the Throughput of Broadcast Channels. In Proceedings of the IEEE International Conference on Acoustics Speech and Signal, Toulouse, France, 14–19 May 2006; p. IV. [Google Scholar]
  28. Peric, B.M.; Souryal, M.R.; Larsson, E.G.; Vojcic, B.R. Soft decision metrics for turbo-coded FH M-FSK ad hoc packet radio networks. In Proceedings of the 2005 IEEE 61st Vehicular Technology Conference, Stockholm, Sweden, 30 May 2005–1 June 2005; pp. 724–727. [Google Scholar]
  29. Przesmycki, R.; Bugaj, M.; Skokowski, P.; Wnuk, M. Identification of Interface in the Complex Systems Based on Radiated Emission of Mobile Computer. Available online:https://web.s.ebscohost.com/abstract?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=15599450&AN=98478863&h=psbWUBvuELCKkQOvUSWlBzkp8QHcqbcmJyT2eCykgYu%2bt4EmqTNjPaC6yFzswHymmwxn%2fMIglmyxbwEVlu5Hxg%3d%3d&crl=c&resultNs=AdminWebAuth&resultLocal=ErrCrlNotAuth&crlhashurl=login.aspx%3fdirect%3dtrue%26profile%3dehost%26scope%3dsite%26authtype%3dcrawler%26jrnl%3d15599450%26AN%3d98478863 (accessed on 5 September 2022).
Figure 1. Scenarios for covert channel: (a) general model; (b) simplified model.
Figure 1. Scenarios for covert channel: (a) general model; (b) simplified model.
Sensors 22 07181 g001
Figure 2. BER curve vs. E b / N 0 for FSK, PSK, and QAM modulation.
Figure 2. BER curve vs. E b / N 0 for FSK, PSK, and QAM modulation.
Sensors 22 07181 g002
Figure 3. Transmitter/receiver structure for covert channel.
Figure 3. Transmitter/receiver structure for covert channel.
Sensors 22 07181 g003
Figure 4. The comparative simulation of the covert data transmission in AWGN channel.
Figure 4. The comparative simulation of the covert data transmission in AWGN channel.
Sensors 22 07181 g004
Figure 5. EVM introduced by covert signal on the cover signal constellation.
Figure 5. EVM introduced by covert signal on the cover signal constellation.
Sensors 22 07181 g005
Figure 6. Comparison on BERs for 16QAM and 16QAM disturbed by covert signal in AWGN channel.
Figure 6. Comparison on BERs for 16QAM and 16QAM disturbed by covert signal in AWGN channel.
Sensors 22 07181 g006
Figure 7. Constellations and histograms for (a) cover (QAM); (b) cover + 4PSK; (c) cover + 8FSK for noiseless and gaussian noise.
Figure 7. Constellations and histograms for (a) cover (QAM); (b) cover + 4PSK; (c) cover + 8FSK for noiseless and gaussian noise.
Sensors 22 07181 g007aSensors 22 07181 g007b
Figure 8. Typical receiver block diagram.
Figure 8. Typical receiver block diagram.
Sensors 22 07181 g008
Figure 9. Constellation of the transmitted 8FSK covert signal after perfect (a) and imperfect (b) SIC operation ( e a b s = 2%). Variance of the cover σ 1 2 =1 and variance of covert σ 2 2 = 0.01 σ 1 2 .
Figure 9. Constellation of the transmitted 8FSK covert signal after perfect (a) and imperfect (b) SIC operation ( e a b s = 2%). Variance of the cover σ 1 2 =1 and variance of covert σ 2 2 = 0.01 σ 1 2 .
Sensors 22 07181 g009
Figure 10. Block diagram of test scheme (all methods under test).
Figure 10. Block diagram of test scheme (all methods under test).
Sensors 22 07181 g010
Figure 11. Block diagram of the 8FSK correlator-based hard and soft demodulator.
Figure 11. Block diagram of the 8FSK correlator-based hard and soft demodulator.
Sensors 22 07181 g011
Figure 12. Block diagram of the receiver structure with the NN-based 8FSK hard and soft demodulator.
Figure 12. Block diagram of the receiver structure with the NN-based 8FSK hard and soft demodulator.
Sensors 22 07181 g012
Figure 13. Deep Neural Network (DNN) architecture for covert channel demodulation.
Figure 13. Deep Neural Network (DNN) architecture for covert channel demodulation.
Sensors 22 07181 g013
Figure 14. Encoder for rate R = ½, and constraint length K = 7 convolutional code.
Figure 14. Encoder for rate R = ½, and constraint length K = 7 convolutional code.
Sensors 22 07181 g014
Figure 15. Hard-decision FSK correlator-based and NN-based demodulator. BER performance vs. e a b s [%].
Figure 15. Hard-decision FSK correlator-based and NN-based demodulator. BER performance vs. e a b s [%].
Sensors 22 07181 g015
Figure 16. Hard and soft correlator-based FSK demodulator with Viterbi decoder. BER performance vs. e a b s [%].
Figure 16. Hard and soft correlator-based FSK demodulator with Viterbi decoder. BER performance vs. e a b s [%].
Sensors 22 07181 g016
Figure 17. Hard and soft NN-based FSK demodulator with Viterbi decoder. BER performance vs. e a b s [%].
Figure 17. Hard and soft NN-based FSK demodulator with Viterbi decoder. BER performance vs. e a b s [%].
Sensors 22 07181 g017
Table 1. Parameters of the simulation.
Table 1. Parameters of the simulation.
ModulationVarianceNumber Samples Per Symbol
16QAM (cover) σ 1 2 1
BPSK (covert) 0.05 σ 1 2 8
2FSK (covert) 0.05 σ 1 2 8
8FSK (covert) 0.05 σ 1 2 24
Table 2. Simulation parameters.
Table 2. Simulation parameters.
SignalModulationBit RateVarianceSignal
cover16QAM9600bps σ 1 2 = 1cover
covert8FSK600bps σ 2 2   =   0.01 σ 1 2 covert
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Grzesiak, K.; Piotrowski, Z. NN-Based 8FSK Demodulator for the Covert Channel. Sensors 2022, 22, 7181. https://doi.org/10.3390/s22197181

AMA Style

Grzesiak K, Piotrowski Z. NN-Based 8FSK Demodulator for the Covert Channel. Sensors. 2022; 22(19):7181. https://doi.org/10.3390/s22197181

Chicago/Turabian Style

Grzesiak, Krystian, and Zbigniew Piotrowski. 2022. "NN-Based 8FSK Demodulator for the Covert Channel" Sensors 22, no. 19: 7181. https://doi.org/10.3390/s22197181

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop