TY - JOUR
T1 - Covert Communication with Gaussian Noise :
T2 - From Random Access Channel to Point-to-Point Channel
AU - Hayashi, Masahito
AU - Vázquez Castro, María Ángeles
N1 - Publisher Copyright:
© 1972-2012 IEEE.
PY - 2024/3
Y1 - 2024/3
N2 - We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and adversary receivers, which is a realistic assumption in the low power regime. Also, our method assumes that the legitimate users share secret variables in a similar way as the preceding studies. Although several studies investigated the covert communication for the point-to-point communication, no existing paper considers the covert communication under the above uncertainty assumption even for point-to-point communication. Our protocol under the above uncertainty assumption allows O(n) legitimate senders and O(n/n) active legitimate senders. Furthermore, our protocol can be converted to a protocol for point-to-point communication that works under the above uncertainty assumption.
AB - We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and adversary receivers, which is a realistic assumption in the low power regime. Also, our method assumes that the legitimate users share secret variables in a similar way as the preceding studies. Although several studies investigated the covert communication for the point-to-point communication, no existing paper considers the covert communication under the above uncertainty assumption even for point-to-point communication. Our protocol under the above uncertainty assumption allows O(n) legitimate senders and O(n/n) active legitimate senders. Furthermore, our protocol can be converted to a protocol for point-to-point communication that works under the above uncertainty assumption.
KW - Covert communication
KW - additive white Gaussian noise
KW - central limit theorem
KW - information hiding
KW - random access channel
KW - universal code
KW - Codes
KW - Protocols
KW - Uncertainty
KW - Random access channel
KW - Receivers
KW - Universal code
KW - Information hiding
KW - AWGN channels
KW - Central limit theorem
KW - Symbols
KW - Channel models
UR - http://www.scopus.com/inward/record.url?scp=85177071892&partnerID=8YFLogxK
UR - https://www.mendeley.com/catalogue/8379eab6-ab8a-3380-8efb-987263cf3bd5/
U2 - 10.1109/TCOMM.2023.3332861
DO - 10.1109/TCOMM.2023.3332861
M3 - Article
SN - 1558-0857
VL - 72
SP - 1516
EP - 1531
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 3
M1 - 3
ER -