TY - JOUR
T1 - Covert Communication with Gaussian Noise :
T2 - From Random Access Channel to Point-to-Point Channel
AU - Hayashi, Masahito
AU - Vázquez Castro, María Ángeles
N1 - DBLP License: DBLP's bibliographic metadata records provided through http://dblp.org/ are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.
PY - 2024/3/1
Y1 - 2024/3/1
N2 - We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and adversary receivers, which is a realistic assumption in the low power regime. Also, our method assumes that the legitimate users share secret variables in a similar way as the preceding studies. Although several studies investigated the covert communication for the point-to-point communication, no existing paper considers the covert communication under the above uncertainty assumption even for point-to-point communication. Our protocol under the above uncertainty assumption allows O(n) legitimate senders and O(n/n) active legitimate senders. Furthermore, our protocol can be converted to a protocol for point-to-point communication that works under the above uncertainty assumption.
AB - We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and adversary receivers, which is a realistic assumption in the low power regime. Also, our method assumes that the legitimate users share secret variables in a similar way as the preceding studies. Although several studies investigated the covert communication for the point-to-point communication, no existing paper considers the covert communication under the above uncertainty assumption even for point-to-point communication. Our protocol under the above uncertainty assumption allows O(n) legitimate senders and O(n/n) active legitimate senders. Furthermore, our protocol can be converted to a protocol for point-to-point communication that works under the above uncertainty assumption.
KW - Covert communication
KW - additive white Gaussian noise
KW - central limit theorem
KW - information hiding
KW - random access channel
KW - universal code
UR - http://www.scopus.com/inward/record.url?scp=85177071892&partnerID=8YFLogxK
UR - https://www.mendeley.com/catalogue/8379eab6-ab8a-3380-8efb-987263cf3bd5/
U2 - 10.1109/TCOMM.2023.3332861
DO - 10.1109/TCOMM.2023.3332861
M3 - Article
SN - 1558-0857
VL - 72
SP - 1516
EP - 1531
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 3
M1 - 3
ER -