Next Article in Journal
Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances
Previous Article in Journal
Novel Proton-Conducting Layered Perovskites Based on BaLa2In2O7 Produced by Cationic Co-Doping
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Wireless Covert Communication with Polarization Dirty Constellation

School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(6), 3451; https://doi.org/10.3390/app13063451
Submission received: 12 January 2023 / Revised: 5 March 2023 / Accepted: 6 March 2023 / Published: 8 March 2023
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Wireless covert communication is an emerging communication technique that prevents eavesdroppers. This paper presents a novel approach to wireless covert communication based on polar codes with dirty constellation polarization. The feasibility of dirty constellation polarization is analyzed, and the impact of covert transmission power on undetectability is investigated. We polarize the covert channel and decode the covert information using a successive-cancellation decoder. Simulation results demonstrate that polar codes can significantly improve the undetectability and reliability of covert communication when compared to BCH codes. Additionally, we find that polarized covert channels achieve better undetectability and reliability when using a successive-cancellation list decoder. The proposed algorithm shows significant improvement in the undetectability and reliability of wireless covert communication with dirty constellations. This research provides a promising direction for future development in the field of covert communication, with potential applications in secure communication systems.

1. Introduction

The proliferation of 5G and other wireless communication technologies has given rise to a broad range of multi-modal sensors, which have accelerated the process of social informatization [1,2]. However, the majority of IoT devices are susceptible to hacking and compromise. Given that eavesdroppers can intercept wireless communication signals, confidential information is at risk. This poses a significant threat to communication security. To ensure the privacy of user data, several approaches have been proposed to transmit noisy or incomplete data, which can impact the performance of some IoT applications [3]. As a result, it is crucial to transmitting information secretly without detection or interception, known as wireless covert communication.
Wireless covert channels, modern information-hiding technology in the wireless communication domain, conceal the transmission process of information that requires secrecy during typical wireless communication. Even if an eavesdropper intercepts the communication signal, it is impossible to differentiate it from standard wireless communication. The fundamental theory and performance limits of covert communication in AWGN channels are discussed in Ref. [4]. The authors established that a maximum of O ( n ) bits can be transmitted to the receiver reliably without being detected by the detector. Researchers have subsequently analyzed the covert communication capacity in multiple scenarios with unfavorable factors for eavesdroppers. These include the transmitter [5,6], receiver [7,8,9], and additional nodes [10,11]. Covert communication techniques include artificial additional signal noise, artificial coding domain error, and insertion of additional signal bands, among others. The research in this field has been extended to other communication scenarios, such as relay communication [12,13], multi-antenna [14,15], and broadcast communication [16,17,18], etc.
In the realm of covert communication, numerous techniques have been proposed to transmit confidential information without being detected [19] while some countermeasures to detect or localize covert communication entity has also been put forward [20]. However, achieving the theoretical covert rate of O ( n ) under detection remains a challenging task. With the growing demand for 5G, polar codes have emerged as a promising solution that can achieve the Shannon capacity for channel coding [21]. Therefore, it is imperative to investigate the potential of polar codes in the context of covert communication. To this end, our main contributions are listed as follows.
  • We present a novel wireless covert channel that integrates polar code and dirty constellations, which, to the best of our knowledge, has not been proposed before.
  • We employ two distinct decoding techniques, to enhance the reliability of the system and provide solutions for low-computational power scenarios.
  • We conduct experiments on a wireless covert channel testbed to evaluate the performance of our proposals. The results show that the proposed wireless covert channel can obtain better reliability and undetectability.
The remainder of this paper is structured as follows. In Section 2, we present a summary of the system model and related works. The fundamental principles of our scheme are elaborated in Section 3. In Section 4, we provide a detailed description of our wireless covert channel. Section 5 presents the experimental results obtained from our proposed method. Lastly, in Section 6, we conclude this paper.

2. Background

2.1. System Model

The Alice-Bob model, as depicted in Figure 1, involves a transmitter, a receiver, and a detector commonly referred to as Alice, Bob, and Willie. The objective is to transmit information covertly between Alice and Bob while evading detection by Willie, who observes the wireless channel and determines whether covert communication is taking place or not. Willie’s probability of detection error comprises two components: the probability of missed detection P F and the probability of false alarm P M . However, due to the practicality of detection, Willie can only detect a finite number of samples. Our numerical analysis reveals that in the presence of noise uncertainty at Willie, there may exist an optimal number of samples that maximizes the communication rate subject to ξ 1 ε , where ξ denotes the sum of P F (i.e., false positive rate) and P M (i.e., miss detection rate) at Willie. We consider an arbitrarily small number ε to be the maximum acceptable detection rate for Willie.

2.2. Wireless Covert Channels with Dirty Constellation

To reduce the probability of covert information being detected by potential eavesdroppers, we can convert the covert messages to constellation error of common signal, which is also called wireless covert communication with dirty constellation (WCC-DC).
The framework of WCC-DC is illustrated in Figure 2a. The premise of WCC-DC is wireless communication physical layer with OFDM structure. In order to reduce the statistical correlation, the transmitter can divide all OFDM subcarriers into secret subcarriers or normal subcarriers. The corresponding mapping sequence is also generated. The secret information will be modulated with QPSK to obtain covert signals. Covert signal and random noise signal are superposed on the subcarrier signal. To ameliorate the undetectability of covert communication, the covert constellation will be rotated at a certain angle, as shown in Figure 2b. The transmitter and receiver should share the mapping sequence before the covert communication starts. The receiver should demodulate the carrier message as normal first. Then, the carrier message should be modulated again to obtain the ideal carrier signal. The receiver subtracts the ideal carrier signal from the received signal to get residual signals, which is the covert signal with noise. The covert signal will be rotated in the opposite direction at a certain angle and demodulated with QPSK. The covert message will be extracted from modulated signal according to the mapping sequence. However, the wireless covert channel with dirty constellation has a high BLER (Block Error Rate) when the S N R is small. When we increase the S N R , the undetectability will deteriorate. Therefore, we plan to ameliorate the reliability of covert messages at low S N R with polar codes.

3. Basis of Our Scheme

3.1. Binary Hypothesis Testing at Willie

According to the system model shown in Figure 1, the performance elements of the wireless covert channels mainly include two aspects: undetectability and reliability. In communication, Alice totally transmits n symbols to Bob. We denote the finite block as m [ i ] ( i [ 1 , n ] ), which consist of normal information m c [ i ] and secret information m s [ i ] . Willie’s task is to collect the messages m [ i ] transmitted by Alice and detect whether covert communication exists or not. Let the AWGN between Alice and Bob as r i ( 0 , σ w 2 ) . The signal received by Willie can be expressed as
y w [ i ] = m [ i ] + r [ i ]
Willie’s task is to detect whether covert communication exists. We define two hypotheses, H 0 and H 1 , to distinguish these two cases:
H 0 : m [ i ] = m c [ i ] H 1 : m [ i ] = m c [ i ] + m s [ i ]
Let H 0 denotes that covert communication exists, H 1 denotes covert communication does not exist. In covert communication, the ultimate goal of Willie is to minimize the total error rate (i.e., ξ ). Let T and F denote binary decisions that infer whether covert communication exists or not. The false positive rate and miss detection rate can be expressed as
P F = P r ( T H 0 ) P M = P r ( F H 1 )
Assuming Willie performs the optimal detection. Following Pinsker’s inequality [22,23], we can obtain
P F + P M 1 1 2 D ( P 0 | | P 1 )
where relative entropy D ( P 0 | | P 1 ) (also called K-L divergence) is defined as follows:
D ( P 0 | | P 1 ) = n p 0 ( x ) ln p 0 ( x ) p 1 ( x ) d x
where n is the value range of x. Let p 0 ( x ) ( 0 , σ s ) ( 0 , P + σ ω 2 ) denotes the distribution of sequence P 0 detected by Willie, and p 1 ( x ) 0 , σ ω denotes the distribution of AWGN P 1 collected by Willie. Let P denote the transmit power. We can equivalently express Equation (5) as
D ( P 0 | | P 1 ) = n 1 2 π σ ω e x 2 σ ω 2 · ln ( σ s σ ω · e x 2 σ ω 2 x 2 σ s 2 ) d x = n 1 2 π σ ω e x 2 σ ω 2 · ( ln ( P + σ ω 2 σ ω ) + x 2 · P ( P + σ ω 2 ) · σ ω 2 ) d x = 1 2 ( ln P + σ ω 2 σ ω 2 P P + σ ω 2 )
It can be obtained that the K-L divergence deteriorates with the increase of transmit power P. We can ameliorate the value of K-L divergence by constraining the transmit power. Except for KL-divergence, we can also calculate the distance between distributions with the KS-Test (also called Kolmogorov–Smirnov statistic). The KS-distance [24] is defined as follows:
D K S = max F 1 ( x ) F 0 ( x )
where F 1 ( x ) = j = 1 x h 1 ( j ) n , F 0 ( x ) = j = 1 x h 0 ( j ) n . Let F 1 ( x ) and F 0 ( x ) denote the cumulative distribution functions of P 1 and P 0 . P 1 and P 0 are both divided into K bins. The number of the elements in P 1 and P 0 are denoted by h 1 ( j ) and h 0 ( j ) , j ( 1 , 2 K ) . We can express Equation (7) equivalently as
D K S = max e r f x σ ω e r f x σ s = max e r f x σ ω e r f x σ ω 2 + P
It can be obtained that we can also ameliorate the value of the KS test by constraining the transmit power. In summary, we can improve undetectability by constraining the power of covert communication. However, the BLER (Block Error Rate) would deteriorate with low transmit power. We can ameliorate the reliability of covert communication by encoding the covert messages with polar code.

3.2. Dirty Constellation Polarization

We always denote a binary discrete memoryless channel (B-DMC) W as W : X Y with input alphabet X and output alphabet Y. The input alphabet X belongs to set 0 , 1 , the output alphabet Y may be arbitrary. To measure the channel condition, Arıkan [21] mainly used two parameters: the symmetric capacity
I ( W ) y Y x X 1 2 W ( y x ) log W ( y x ) 1 2 W ( y 0 ) + 1 2 W ( y 1 ) ,
and the Bhattacharyya parameter as
Z ( W ) y Y W ( y 0 ) W ( y 1 ) .
When the input alphabet is just 1 or 0, Z ( W ) is an upper bound of the error probability of the maximum-likelihood (ML) decision. It is easy to see that Z ( W ) and I ( W ) both take values in [0,1]. Intuitively, we will expect I ( W ) 1 iff Z ( W ) 0 or I ( W ) 0 iff Z ( W ) 1 . In [25], Gallager proposed that the ensemble average probability of decoding error based on ML decoding satisfies
P ¯ e exp { N [ E 0 ( ρ , Q ) ρ R ] } ,
where
E 0 ( ρ , Q ) = ln j = 0 J 1 k = 0 K 1 Q ( k ) P ( j k ) 1 / ( 1 + ρ ) 1 + ρ .
We denote the transition probability of discrete memoryless channel as P ( j k ) , positive integer as N, and positive number as R. In the ensemble of ( N , R ) block codes, every code is independently chosen with the probability assignment Q ( k ) . Assuming ρ = 1 , we can transform Equation (12) as
E 0 ( 1 , Q ) = ln j = 0 J 1 k = 0 K 1 Q ( k ) P ( j k ) 1 / 2 2 .
For binary symmetric channel, E 0 ( 1 , Q ) is maximized over Q by Q ( 0 ) = Q ( 1 ) = 1 / 2 . For this Q, we have
E 0 ( 1 , Q ) = ln 2 2 ln p 1 / 2 + ( 1 p ) 1 / 2 = ln 2 p 1 / 2 + 1 p 1 / 2 2 = ln 2 1 + Z ( W ) .
The Equation (11) can be converted to
N R ln P ¯ e + N · ln 2 1 + Z ( W ) log P ¯ e + N · log 2 1 + Z ( W ) .
R in nats (that is, using ln) is the number of binary digits entering the encoder per transmitted per second. Thus, we use R in bits (that is, using log2) to interpret Equation (15), which is the number of binary digits entering the encoder per transmitted channel digit. It is known that I ( W ) = C R , so we have
I ( W ) log 2 1 + Z ( W ) .
For any B-DMC, we have
I ( W ) log 2 1 + Z ( W ) I ( W ) 1 Z ( W ) 2 .
When W is a symmetric channel, the symmetric capacity of W is equal to the Shannon capacity. Referring to Equation (17), it can be obtained that I ( W ) approaching 1 when Z ( W ) 0 . It shows that there exists a sequence of ( 2 N R , N ) codes with the maximum probability of error P e 0 when we encode the covert information in B-DMC.
The polarization code can realize P e 0 by polarizing the channel. Channel polarization is an operation consisting of channel combining and channel splitting. With the length of block N trending to infinity, the symmetric capacity I ( W ) tends to be two-polar. Part of the symmetric capacity tends to be 1, the rest tends to be 0. If we polarize the covert channel in B-DMC, as the length of covert information blocks N becomes large, part of the covert information can be transmitted with the Shannon capacity. We can improve the undetectability by reducing the power of the covert signal without deteriorating the reliability of covert communication.
If the communication channel is AWGN (Additive White Gaussian Noise) channel, the transmit process of covert information can be expressed as X 1 N S 1 N Y 1 N . The signal Y 1 N received by Bob can be expressed as y i = s i + n i , 1 i N . We denote the encoded covert information as S 1 N . Assuming that each X 1 N has the same probability, the probability of each X 1 N is 2 N R . We denote the BLER (Block Error Rate) based on maximum likelihood decoding as P e M L . The UUB (Union Upper Bound) of BLER (Block Error Rate) based on maximum likelihood decoding can be written as P e M L , U U B with
P e M L P e M L , U U B = x X Pr ( x ) P e ( N ) ( x ) = 1 2 N R x X Pr ( x ) w = 1 2 N R λ w ( C ) = d = d 1 d N R A d Q ( d σ ) = d = d 1 d N R A d Q ( 2 R d E b N 0 ) .
We use the standard notation P e N ( x ) , λ w ( C ) to denote the probability of error. We denote the Hamming distance and the codes with the same Hamming distance as d, A d .

4. Wireless Covert Channels with Polarized Dirty Constellation

To ameliorate the undetectability and reliability of WCC-DC, we proposed wireless covert communication method with polarized dirty constellation (WCC-PDC). The schematic diagram of the polarized dirty constellation is illustrated in Figure 3. Parts of the framework of WCC-PDC will be illustrated especially in the following chapters.

4.1. Polar Encoding

We use the standard notation x 1 N = u 1 N · G N to denote the encoding operation. G N is the conversion matrix consisting of various permutation operations. Erdal Arıkan provides a recursive formula as
G N = R N ( F I N / 2 ) ( I 2 G N / 2 ) = R N ( F G N / 2 ) .
Let I k denote the k-dimensional identity matrix for any positive integer k. We assume N = 2 n for positive integer n. It is simple to derive the recursive relationship as
G N = R N [ F ( R N / 2 ( F G N / 4 ) ) .
With the identity A C B D = ( A B ) ( C D ) , we can equivalently rewrite Equation (20) as
G N = R N ( I 2 R N / 2 ) ( F 2 G N / 4 ) = R N ( I 2 R N / 2 ) ( I 4 R N / 4 ) ( I N / 2 R 2 ) F n ,
where F n is the n-dimensional Kronecker product of F matrix with F equals 1 0 1 1 . R N is converted from the N-dimensional identity matrix, arranging the column vectors of the identity matrix in the order of odd first and then even. We can express R N as
R N = [ I N , o d d , I N , e v e n ] = [ I N , 1 , I N , 3 , I N , N 1 , I N , 2 , I N , 4 , I N , N ] .
where I N , x denotes the x-th column of matrix I N for positive integer x [ 1 , N ] . Let covert message u 1 N be any vector over GF (2). We would obtain x 1 N = u 1 N · G N at output. Some preprocessing needs to be performed to combine polar code and dirty constellation.

4.2. Fill and Rotation

The size of the covert information block and the carrier information block are incompatible, the covert information needs to be filled with all 0 or all 1 bits as shown in Figure 4. For reducing the statistical relevance of covert information, our scheme will rotate the covert constellation point. If we modulate the covert information with BPSK, we see from Figure 4 the position of initial covert constellation points and carrier constellation points.
To improve the undetectability, we rotate the covert constellation point with n θ degree with n [ 1 , π θ ] . Let us assume the coordinate of carrier constellation point is m c , r , m c , i . The coordinate of covert constellation point is m c , r + m s , r , m c , r + m s , i . When we rotate the covert constellation point, we can obtain
m ˜ s , r = cos ( n θ ) · m s , r sin ( n θ ) · m s , i m ˜ s , i = cos ( n θ ) · m s , i + sin ( n θ ) · m s , r
As we know, covert information is modulated with BPSK. Thus, we can express the covert constellation point as
m ˜ s , r [ i ] = cos ( ( i i n · n ) θ ) · m s , r [ i ] m ˜ s , i [ i ] = sin ( ( i i n · n ) θ ) · m s , r [ i ]
When we receive the subcarrier signal, the received carrier information should be modulated again to obtain the residual signal. By reversing the rotation of the residual signal, we can obtain the covert signal. The covert information can be obtained via Log-Likehood Ratio(LLR) calculation.

4.3. Split and Combing

As we know, the length of the covert information N basing on polar code equals 2 n . Assuming covert communication is set on an 802.11a/g PHY layer. There are 48 subcarriers in a symbol in transmissions. The size of the covert information block and the carrier information block are incompatible, some all 0 or all 1 bits are filled in the first and the last symbol. As the length of the code block becomes large, the symmetric capacity terms tend towards 0 or 1. The length of the code block would be extended as much as possible. The number of filled bits k can be expressed as
k = ( N 48 + 1 ) · 48 N .
The symbol construction of the subcarrier signal is illustrated in Figure 5. The black code blocks are filled bits that can also be used to judge the beginning and end of the covert information code block. The yellow code blocks are covert information code blocks. Finite covert code blocks would be split into multiple blocks and combined with the carrier information block.
When we receive the subcarrier signal, the subcarrier signal would be demodulated and modulated to obtain the residual signal. Then, the residual signal would be demodulated to obtain covert code blocks.
As illustrated in Figure 6, the covert information block would be extracted from the covert code block. Then, the covert information code block would be decoded by maximum likelihood decoding.

4.4. Maximum Likelihood Decoding

4.4.1. A Successive Cancellation (SC) Decoding

Polar code is a Gn-coset code with parameter ( N , K , A , u A ) where K is the code dimension and specifies the size of the information set A. Covert message u 1 N would be encoded into x 1 N , x 1 N would be transmitted through the channel W N and Bob would receive y 1 N . Thus, Bob needs a corresponding decoder that could generate an accurate estimate u ^ 1 N of u 1 N with given knowledge of A, u a and y 1 N . Because parts of the codewords are frozen bits, the decoder can directly set u ^ A c = u A c . The task is just to estimate u ^ A of u A . Arıkan has given a specific successive cancellation (SC) decoder. The SC decoder can generate its estimate of u A with given parameter ( N , K , A , u A ) by computing
u ^ i u A c i f i A c h i ( y 1 N , u ^ 1 i 1 ) i f i A ,
where i [ 1 , N ] and the decision functions are defined as
h i ( y 1 N , u ^ 1 i 1 ) 0 , i f L N ( i ) ( y 1 N , u ^ 1 i 1 ) 0 1 , i f L N ( i ) ( y 1 N , u ^ 1 i 1 ) < 0 ,
and the Log-Likelihood Ratio (LLR) can be expressed as
L N ( i ) ( y 1 N , u ^ 1 i 1 ) ln W N ( i ) ( y 1 N , u ^ 1 i 1 0 ) W N ( i ) ( y 1 N , u ^ 1 i 1 1 ) .
To calculate the LLR, we can use function f and function g
f ( a , b ) ln ( 1 + e a + b e a + e b ) g ( a , b , u s ) ( 1 ) u s a + b .
We can equivalently express the LLR as
L N 2 i 1 y 1 N , u ^ 1 2 i 2 = f L N / 2 i y 1 N / 2 , u ^ 1 , o 2 i 2 u ^ 1 , e 2 i 2 , L N / 2 i y N / 2 + 1 N , u ^ 1 , e 2 i 2 L N 2 i y 1 N , u ^ 1 2 i 1 = g L N / 2 i y 1 N / 2 , u ^ 1 , o 2 i 2 u ^ 1 , e 2 i 2 , L N / 2 i y N / 2 + 1 N , u ^ 1 , e 2 i 2 , u ^ 2 i 1 .
Thus, the task of calculating an LLR at length N is converted to calculating two LLRs at length N / 2 . This recursion can be continued down until the block length is 1, at which point the LLRs can be computed directly. To estimate the complexity of LLR calculations, we denote the Kolmogorov complexity of decoding over k [ N , N / 2 , N / 4 , , 1 ] as K L ( k ) . We have the complexity bound
K L ( k ) 2 K L ( k / 2 ) + c A ,
where c A is the worst-case complexity of combining two LLRs at length k / 2 into an LLR at length k. We can obtain the bound
K L ( N ) N K L ( 1 ) + c A = O ( N ) .
We can obtain the overall decoder complexity
K D ( N ) K K L ( N ) N K L ( N ) = O ( N 2 ) .
This overall complexity corresponds to a decoder whose DEs work privately. By sharing any partial results between DEs, the decoder could have a more efficient implementation with overall complexity O ( N log N ) .

4.4.2. A Successive Cancellation List (SCL) Decoding

Even though the code block length is comparable, the performance of polar codes is inferior to LDPC and turbo codes. To improve the performance of polar code, Ido [26] proposed a successive-cancellation list (SCL) decoder. In the SCL decoder, L decoding paths are considered concurrently at each decoding stage. By comparing the path metric (PM) of L results, the most likely estimate is selected as the decoder output. The path metric (PM) of path l( l 1 , 2 , L ) can be expressed as
P M l i j = 1 i ln 1 + exp 1 2 u ^ j l · L N j ,
where L N ( i ) = ln W N ( i ) ( y 1 N , u ^ 1 i 1 0 ) W N ( i ) ( y 1 N , u ^ 1 i 1 1 ) . For any two paths l 1 , l 2 1 , 2 , L , when we have P M l 1 i > P M l 2 i , we can equivalently obtain
W N i y 1 N , u ^ 1 i 1 l 1 | u ^ 1 i l 1 < W N i y 1 N , u ^ 1 i 1 l 2 | u ^ 1 i l 2 .
We can obtain that the greater transition probability W N i , the smaller the path metric P M l i . Then, Equation (34) can be expressed as
P M l i P M l i 1 , i f u ^ i l = δ L N i l P M l i 1 + L N i l , i f u ^ i l δ L N i l ,
where δ x = 1 2 1 s i g n x and P M l 0 = 0 .
Assuming a decoding path of L = 2 , the decoding process can be visualized through Figure 7, where the black paths represent the abandoned paths and the red paths indicate the adopted paths. At each node, the path metric P M l i is calculated, and the two paths with the smallest P M l i are chosen. This approach enables simultaneous maintenance of multiple code paths, thus ensuring the SCL code entry local best-generated code.

5. Performance Evaluations

In this section, we first construct a wireless covert channel testbed and give the experiment settings in Section 5.1. Then, we evaluate the experiment results of WCC-PDC in Section 5.2. We finally verify the covert performance of the WCC-PDC compared with the WCC-DC.

5.1. Wireless Covert Channel Testbed

In this study, we constructed a small-scale experimental testbed, depicted in Figure 8, comprising four devices, including one covert transmitter (Alice), one receiver (Bob), one detector (Willie), and one normal communicator. Alice transmits covert messages to Bob, with the positions of Alice and Willie remaining fixed. Willie’s role is to detect the presence of covert communication, with patrols being conducted within the target area to increase the likelihood of detection. To simulate real-world communication scenarios, we designed one normal communicator who utilizes broadcast signals with varying power levels within the target area, thereby changing the signal-to-noise ratio for Bob. It should be noted that the communication activities of the normal communicator can also exert an impact on the detection results.
Within the testbed, we assume that Alice, Bob, and Willie are situated within an indoor line-of-sight (LOS) environment [27]. The distances between Alice and Bob, normal and Bob, and the normal communicator and detector are established as 2 m, 5 m, and 5 m, correspondingly. Furthermore, the distance between Alice and the detector is varied within the range of 1 m to 10 m. MATLAB is utilized to conduct diverse simulations on the covert communication simulation platform, with the goal of verifying the efficacy of Willie’s detection in the classical model of covert communication. The detection approach adopted by Willie is based on both KL divergence and KS tests. In some simulations, WCC-DC with the BCH code is chosen for comparison.

5.2. Experiment Results

5.2.1. Reliability

In this chapter, we investigate the reliability comparison of two covert communication channels, namely WCC-DC and WCC-PDC. BCH codes are employed for encoding and decoding in WCC-DC, while polar codes are utilized for covert information encoding in WCC-PDC. The decoding process employs both SC and SCL decoders. In order to examine the reliability of different covert signal transmission rates, we establish a comparison between two code rates, namely 0.5 and 0.2. To accurately replicate the diverse environmental noise conditions that exist in practical scenarios, we set two distinct carrier-secret ratios ( C S R ), namely C S R = 10 dB and C S R = 15 dB. In this work, the number L of SCL decoders is set to 8, the length of the BCH code block is 1023 bits, and the length of the polar code block is 1024 bits.
As depicted in Figure 9a, the BLER of the wireless covert channels decreases as the code rate decreases to 0.2. It is worth noting that the S N R represents the ratio between the secret carrier signals and noise signals. WCC-PDC exhibits lower BLER compared to WCC-DC with BCH code. Specifically, at S N R = 18 dB, which is a normal value, the BLER of WCC-PDC with SC decoder reaches 0.02, and the BLER of WCC-PDC with SCL decoder reaches 1 × 10 6 . Moreover, even at S N R = 18 dB, a low BLER of 0.03 can still be obtained by utilizing WCC-PDC with SCL decoder.
Figure 9b illustrates the BLER of different wireless covert channels at C S R = 15 dB. The figure shows that the BLER of the hidden channel decreases significantly as the S N R increases. However, even at S N R = 21 dB, a BLER of only 0.01 can be achieved using WCC-PDC and SCL decoder. This suggests that the reliability of the covert channel needs to be improved in low C S R scenarios.

5.2.2. Undetectability

Undetectability is an important measure of wireless covert communication. It is typically assessed using measures such as ’KL divergence’ and ’KS Test’. The undetectability of I vectors, Q vectors, amplitude, and phases are detected with constellation errors.
In Figure 10a,b, we investigate the impact of the distance between Alice and Willie on undetectability. The S N R of the received signal at Bob is kept at 20 dB, and the C S R of the signal is set at 10 dB. As shown in Figure 10a, the KL divergence decreases with increasing distance between Alice and Willie. When the distance between Alice and Willie is greater than 5 m, the KL divergence of phase reaches a threshold and no longer changes, while the KL divergence of I vector, Q vector, and amplitude decrease with increasing distance. It can be observed that WCC-PDC can achieve better undetectability than WCC-DC, and our proposed WCC-PDC strategy can significantly improve the undetectability of covert communication.
In Figure 10b, the KL divergence decreases rapidly with increasing distance. It is important to note that the value of the KS test is generally higher than that of KL divergence at the same distance, which indicates that the KS test has better detection performance when the environmental noise is stable. However, when the noise power is uncertain, the KS test may have a high probability of detection error and may no longer be accurate, as we will confirm in the following simulation section.
In order to evaluate the undetectability of wireless covert communication, we analyzed the impact of Willie’s S N R on undetectability using KL divergence and KS distance measures. Specifically, we conducted experiments shown in Figure 11a,b, where we investigated the case when the C S R is set to 10 dB. Our findings suggest that when the S N R of the secret carrier signal is 20 dB, the KL divergence reaches a critical value, beyond which higher values will be deemed as covert communication. However, when the S N R is less than 20 dB, the KL divergence detection method cannot reliably detect the existence of covert communication. In this case, the results of the KS test are even worse than the KL divergence test, and a higher S N R of 23 dB is required to detect the presence of covert communication. These observations indicate that the KL divergence test results are superior to the KS test when the ambient noise power is high.
Furthermore, our experiments revealed that the wireless covert channel WCC-PDC, which we proposed, can achieve better undetectability compared to the wireless covert channel WCC-DC. This implies that under the same environment, WCC-PDC can utilize higher power than WCC-DC for covert communication without being detected. In summary, the results of our experiments suggest that WCC-PDC can provide better undetectability than WCC-DC, and the KL divergence test is a suitable method for detecting covert communication when the ambient noise power is high.
To evaluate the concealment performance of our proposed covert channel WCC-PDC at low power, we conducted experiments with a C S R of 15 dB, which is the same as the experimental environment in Figure 9a. In Figure 12a, we observed that the KL divergence values at C S R = 15 dB are smaller than those at C S R = 10 dB, indicating better undetectability at low power. Additionally, the WCC-PDC cannot be detected when Willie’s S N R is below 25 dB. This threshold is difficult to achieve in conventional communication and demonstrates that our proposed covert channel can achieve excellent concealment performance even at low power levels. In Figure 12b, we also observed that both wireless covert channels are virtually undetectable under KS test when Willie’s S N R is below 25 dB. Furthermore, the WCC-PDC outperforms the WCC-DC in terms of undetectability, making covert communication nearly impossible to detect.

6. Conclusions

In this paper, we have proposed a novel scheme for wireless covert communication based on polar codes. By extending the polarization theory to wireless covert communication, we have demonstrated that a portion of covert information can be transmitted with Shannon capacity, provided that the length of the code block is sufficiently long. Specifically, we have polarized the dirty constellation in wireless covert communication and decoded the covert information using SC decoder and SCL decoder. Our simulation and analysis have revealed that we can achieve improved reliability and undetectability with the polarization of the dirty constellation.
Through experiments, we have shown that the WCC-PDC covert channel can achieve high reliability under low signal-to-noise ratio and better detection resistance compared to traditional WCC-DC covert channels when the bit error rate is not higher than 0.01. However, the WCC-PDC covert channel also has limitations, particularly its strong dependence on the code block length. Incomplete polarization of the code block may occur if the length of the concealed code block is insufficient, which may negatively affect both the reliability and concealment of the channel. In future research, we plan to explore the combination of MIMO channel optimization schemes to further enhance the performance of wireless covert communication.

Author Contributions

Conceptualization, M.H. and S.Q.; methodology, M.H. and S.Q.; software, M.H.; validation, S.Q. and X.J.; writing—original draft preparation, M.H. and S.Q.; writing—review and editing, X.J.; visualization, S.Q.; supervision, X.J.; funding acquisition, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China grant number U1836104, 61801073, 61931004, 62072250, National Key Research and Development Program of China grant number 2021QY0700, and The Startup Foundation for Introducing Talent of NUIST grant number 2021r039.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
AWGNAdditive White Gaussian Noise
WCC-DCWireless Covert Communication with Dirty Constellation
OFDMLinear dichroism
BPSKBinary Phase Shift Keying
QPSKQuadrature Phase Shift Keying
BLERBlock Error Rate
BLERBlock Error Rate
SNRSignal Noise Ratio
B-DMCBinary Discrete Memoryless Channel
MLMaximum-Likehood
LLRLog-Likehood Ratio
SCSuccessive Cancellation
SCLSuccessive Cancellation List

References

  1. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 618–623. [Google Scholar]
  2. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  3. Chakravorty, A.; Wlodarczyk, T.; Rong, C. Privacy preserving data analytics for smart homes. In Proceedings of the 2013 IEEE Security and Privacy Workshops, Berkeley, CA, USA, 19–22 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 23–27. [Google Scholar]
  4. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
  5. Wang, H.M.; Zhang, Y.; Zhang, X.; Li, Z. Secrecy and covert communications against UAV surveillance via multi-hop networks. IEEE Trans. Commun. 2019, 68, 389–401. [Google Scholar] [CrossRef] [Green Version]
  6. Soltani, R.; Bash, B.; Goeckel, D.; Guha, S.; Towsley, D. Covert single-hop communication in a wireless network with distributed artificial noise generation. In Proceedings of the 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA., 30 September–3 October 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1078–1085. [Google Scholar]
  7. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving covert wireless communications using a full-duplex receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef] [Green Version]
  8. Shu, F.; Xu, T.; Hu, J.; Yan, S. Delay-constrained covert communications with a full-duplex receiver. IEEE Wirel. Commun. Lett. 2019, 8, 813–816. [Google Scholar] [CrossRef] [Green Version]
  9. Sobers, T.V.; Bash, B.A.; Goeckel, D.; Guha, S.; Towsley, D. Covert communication with the help of an uninformed jammer achieves positive rate. In Proceedings of the 2015 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 8–11 November 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 625–629. [Google Scholar]
  10. Li, K.; Kelly, P.A.; Goeckel, D. Optimal power adaptation in covert communication with an uninformed jammer. IEEE Trans. Wirel. Commun. 2020, 19, 3463–3473. [Google Scholar] [CrossRef]
  11. Forouzesh, M.; Azmi, P.; Kuhestani, A.; Yeoh, P.L. Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Trans. Commun. 2020, 68, 3737–3749. [Google Scholar] [CrossRef]
  12. Shahzad, K. Relaying via cooperative jamming in covert wireless communications. In Proceedings of the 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia, 17–19 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  13. Hu, J.; Yan, S.; Shu, F.; Wang, J. Covert transmission with a self-sustained relay. IEEE Trans. Wirel. Commun. 2019, 18, 4089–4102. [Google Scholar] [CrossRef] [Green Version]
  14. Arumugam, K.S.K.; Bloch, M.R.; Wang, L. Covert communication over a physically degraded relay channel with non-colluding wardens. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 766–770. [Google Scholar]
  15. Abdelaziz, A.; Koksal, C.E. Fundamental limits of covert communication over MIMO AWGN channel. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–9. [Google Scholar]
  16. Arumugam, K.S.K.; Bloch, M.R. Covert communication over broadcast channels. In Proceedings of the 2017 IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 299–303. [Google Scholar]
  17. Arumugam, K.S.K.; Bloch, M.R. Embedding covert information in broadcast communications. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2787–2801. [Google Scholar] [CrossRef] [Green Version]
  18. Dutta, A.; Saha, D.; Grunwald, D.; Sicker, D. Secret agent radio: Covert communication through dirty constellations. In Proceedings of the International Workshop on Information Hiding, Berkeley, CA, USA, 18–20 July 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 160–175. [Google Scholar]
  19. Choi, H.; Park, S.; Lee, H.N. Covert Anti-Jamming Communication Based on Gaussian Coded Modulation. Appl. Sci. 2021, 11, 3759. [Google Scholar] [CrossRef]
  20. Wei, G.; Ding, S.; Yang, H.; Liu, W.; Yin, M.; Li, L. A Novel Localization Method of Wireless Covert Communication Entity for Post-Steganalysis. Appl. Sci. 2022, 12, 12224. [Google Scholar] [CrossRef]
  21. Arikan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
  22. Cover, T.M. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1999. [Google Scholar]
  23. Lehmann, E. Testing statistical hypotheses: The story of a book. In Selected Works of EL Lehmann; Springer: Boston, MA, USA, 2012; pp. 995–999. [Google Scholar]
  24. Lee, S.; Baxley, R.J.; McMahon, J.B.; Frazier, R.S. Achieving positive rate with undetectable communication over MIMO Rayleigh channels. In Proceedings of the 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), A Coruna, Spain, 22–25 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 257–260. [Google Scholar]
  25. Gallager, R.G. Information Theory and Reliable Communication; Springer: New York, NY, USA, 1968; Volume 2. [Google Scholar]
  26. Tal, I.; Vardy, A. List decoding of polar codes. IEEE Trans. Inf. Theory 2015, 61, 2213–2226. [Google Scholar] [CrossRef]
  27. ANSI/IEEE Std 802.11 Working Group. IEEE Std 802.11b-1999; IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band. IEEE: Piscataway, NJ, USA, 2000; pp. 1–96.
Figure 1. The framework of wireless covert communication.
Figure 1. The framework of wireless covert communication.
Applsci 13 03451 g001
Figure 2. The schematic diagram of wireless covert communication with dirty constellation.
Figure 2. The schematic diagram of wireless covert communication with dirty constellation.
Applsci 13 03451 g002
Figure 3. The schematic diagram of wireless covert communication with polarization dirty constellation.
Figure 3. The schematic diagram of wireless covert communication with polarization dirty constellation.
Applsci 13 03451 g003
Figure 4. Rotation of polarized covert constellation.
Figure 4. Rotation of polarized covert constellation.
Applsci 13 03451 g004
Figure 5. Symbol construction of subcarrier signal.
Figure 5. Symbol construction of subcarrier signal.
Applsci 13 03451 g005
Figure 6. Block extraction of covert information.
Figure 6. Block extraction of covert information.
Applsci 13 03451 g006
Figure 7. Decoding process of SCL decoder.
Figure 7. Decoding process of SCL decoder.
Applsci 13 03451 g007
Figure 8. Wireless covert channel testbed.
Figure 8. Wireless covert channel testbed.
Applsci 13 03451 g008
Figure 9. Block error rate versus signal noise ratio.
Figure 9. Block error rate versus signal noise ratio.
Applsci 13 03451 g009
Figure 10. Detection values versus detection distance.
Figure 10. Detection values versus detection distance.
Applsci 13 03451 g010
Figure 11. Detection values versus signal noise ratio at Willie, and C S R = 10 dB.
Figure 11. Detection values versus signal noise ratio at Willie, and C S R = 10 dB.
Applsci 13 03451 g011
Figure 12. Detection values versus signal noise ratio at Willie, and C S R = 15 dB.
Figure 12. Detection values versus signal noise ratio at Willie, and C S R = 15 dB.
Applsci 13 03451 g012
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, M.; Qiao, S.; Ji, X. Wireless Covert Communication with Polarization Dirty Constellation. Appl. Sci. 2023, 13, 3451. https://doi.org/10.3390/app13063451

AMA Style

Hu M, Qiao S, Ji X. Wireless Covert Communication with Polarization Dirty Constellation. Applied Sciences. 2023; 13(6):3451. https://doi.org/10.3390/app13063451

Chicago/Turabian Style

Hu, Mingyu, Sen Qiao, and Xiaopeng Ji. 2023. "Wireless Covert Communication with Polarization Dirty Constellation" Applied Sciences 13, no. 6: 3451. https://doi.org/10.3390/app13063451

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop