Wireless Covert Communication with Polarization Dirty Constellation
Abstract
:1. Introduction
- We present a novel wireless covert channel that integrates polar code and dirty constellations, which, to the best of our knowledge, has not been proposed before.
- We employ two distinct decoding techniques, to enhance the reliability of the system and provide solutions for low-computational power scenarios.
- We conduct experiments on a wireless covert channel testbed to evaluate the performance of our proposals. The results show that the proposed wireless covert channel can obtain better reliability and undetectability.
2. Background
2.1. System Model
2.2. Wireless Covert Channels with Dirty Constellation
3. Basis of Our Scheme
3.1. Binary Hypothesis Testing at Willie
3.2. Dirty Constellation Polarization
4. Wireless Covert Channels with Polarized Dirty Constellation
4.1. Polar Encoding
4.2. Fill and Rotation
4.3. Split and Combing
4.4. Maximum Likelihood Decoding
4.4.1. A Successive Cancellation (SC) Decoding
4.4.2. A Successive Cancellation List (SCL) Decoding
5. Performance Evaluations
5.1. Wireless Covert Channel Testbed
5.2. Experiment Results
5.2.1. Reliability
5.2.2. Undetectability
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
AWGN | Additive White Gaussian Noise |
WCC-DC | Wireless Covert Communication with Dirty Constellation |
OFDM | Linear dichroism |
BPSK | Binary Phase Shift Keying |
QPSK | Quadrature Phase Shift Keying |
BLER | Block Error Rate |
BLER | Block Error Rate |
SNR | Signal Noise Ratio |
B-DMC | Binary Discrete Memoryless Channel |
ML | Maximum-Likehood |
LLR | Log-Likehood Ratio |
SC | Successive Cancellation |
SCL | Successive Cancellation List |
References
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 618–623. [Google Scholar]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
- Chakravorty, A.; Wlodarczyk, T.; Rong, C. Privacy preserving data analytics for smart homes. In Proceedings of the 2013 IEEE Security and Privacy Workshops, Berkeley, CA, USA, 19–22 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 23–27. [Google Scholar]
- Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.M.; Zhang, Y.; Zhang, X.; Li, Z. Secrecy and covert communications against UAV surveillance via multi-hop networks. IEEE Trans. Commun. 2019, 68, 389–401. [Google Scholar] [CrossRef] [Green Version]
- Soltani, R.; Bash, B.; Goeckel, D.; Guha, S.; Towsley, D. Covert single-hop communication in a wireless network with distributed artificial noise generation. In Proceedings of the 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA., 30 September–3 October 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1078–1085. [Google Scholar]
- Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving covert wireless communications using a full-duplex receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef] [Green Version]
- Shu, F.; Xu, T.; Hu, J.; Yan, S. Delay-constrained covert communications with a full-duplex receiver. IEEE Wirel. Commun. Lett. 2019, 8, 813–816. [Google Scholar] [CrossRef] [Green Version]
- Sobers, T.V.; Bash, B.A.; Goeckel, D.; Guha, S.; Towsley, D. Covert communication with the help of an uninformed jammer achieves positive rate. In Proceedings of the 2015 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 8–11 November 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 625–629. [Google Scholar]
- Li, K.; Kelly, P.A.; Goeckel, D. Optimal power adaptation in covert communication with an uninformed jammer. IEEE Trans. Wirel. Commun. 2020, 19, 3463–3473. [Google Scholar] [CrossRef]
- Forouzesh, M.; Azmi, P.; Kuhestani, A.; Yeoh, P.L. Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Trans. Commun. 2020, 68, 3737–3749. [Google Scholar] [CrossRef]
- Shahzad, K. Relaying via cooperative jamming in covert wireless communications. In Proceedings of the 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia, 17–19 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Hu, J.; Yan, S.; Shu, F.; Wang, J. Covert transmission with a self-sustained relay. IEEE Trans. Wirel. Commun. 2019, 18, 4089–4102. [Google Scholar] [CrossRef] [Green Version]
- Arumugam, K.S.K.; Bloch, M.R.; Wang, L. Covert communication over a physically degraded relay channel with non-colluding wardens. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 766–770. [Google Scholar]
- Abdelaziz, A.; Koksal, C.E. Fundamental limits of covert communication over MIMO AWGN channel. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–9. [Google Scholar]
- Arumugam, K.S.K.; Bloch, M.R. Covert communication over broadcast channels. In Proceedings of the 2017 IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 299–303. [Google Scholar]
- Arumugam, K.S.K.; Bloch, M.R. Embedding covert information in broadcast communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef] [Green Version]
- Dutta, A.; Saha, D.; Grunwald, D.; Sicker, D. Secret agent radio: Covert communication through dirty constellations. In Proceedings of the International Workshop on Information Hiding, Berkeley, CA, USA, 18–20 July 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 160–175. [Google Scholar]
- Choi, H.; Park, S.; Lee, H.N. Covert Anti-Jamming Communication Based on Gaussian Coded Modulation. Appl. Sci. 2021, 11, 3759. [Google Scholar] [CrossRef]
- Wei, G.; Ding, S.; Yang, H.; Liu, W.; Yin, M.; Li, L. A Novel Localization Method of Wireless Covert Communication Entity for Post-Steganalysis. Appl. Sci. 2022, 12, 12224. [Google Scholar] [CrossRef]
- Arikan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
- Cover, T.M. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1999. [Google Scholar]
- Lehmann, E. Testing statistical hypotheses: The story of a book. In Selected Works of EL Lehmann; Springer: Boston, MA, USA, 2012; pp. 995–999. [Google Scholar]
- Lee, S.; Baxley, R.J.; McMahon, J.B.; Frazier, R.S. Achieving positive rate with undetectable communication over MIMO Rayleigh channels. In Proceedings of the 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), A Coruna, Spain, 22–25 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 257–260. [Google Scholar]
- Gallager, R.G. Information Theory and Reliable Communication; Springer: New York, NY, USA, 1968; Volume 2. [Google Scholar]
- Tal, I.; Vardy, A. List decoding of polar codes. IEEE Trans. Inf. Theory 2015, 61, 2213–2226. [Google Scholar] [CrossRef]
- ANSI/IEEE Std 802.11 Working Group. IEEE Std 802.11b-1999; IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band. IEEE: Piscataway, NJ, USA, 2000; pp. 1–96.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, M.; Qiao, S.; Ji, X. Wireless Covert Communication with Polarization Dirty Constellation. Appl. Sci. 2023, 13, 3451. https://doi.org/10.3390/app13063451
Hu M, Qiao S, Ji X. Wireless Covert Communication with Polarization Dirty Constellation. Applied Sciences. 2023; 13(6):3451. https://doi.org/10.3390/app13063451
Chicago/Turabian StyleHu, Mingyu, Sen Qiao, and Xiaopeng Ji. 2023. "Wireless Covert Communication with Polarization Dirty Constellation" Applied Sciences 13, no. 6: 3451. https://doi.org/10.3390/app13063451
APA StyleHu, M., Qiao, S., & Ji, X. (2023). Wireless Covert Communication with Polarization Dirty Constellation. Applied Sciences, 13(6), 3451. https://doi.org/10.3390/app13063451