Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 134 tok/s
Gemini 2.5 Pro 41 tok/s Pro
GPT-5 Medium 26 tok/s Pro
GPT-5 High 27 tok/s Pro
GPT-4o 100 tok/s Pro
Kimi K2 204 tok/s Pro
GPT OSS 120B 433 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Covert Multi-Access Communication with a Non-Covert User (2404.14056v1)

Published 22 Apr 2024 in cs.IT and math.IT

Abstract: In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users. They further show that the presence of a non-covert user in the system can enhance the capacities of the covert users under stringent secret-key constraints. To derive our fundamental limits, we provide an information-theoretic converse proof and present a coding scheme that achieves the performance of our converse result. Our coding scheme is based on multiplexing different code phases, which seems to be essential to exhaust the entire tradeoff region between the rates at the covert and the two non-covert users. This property is reminiscent of the setup with multiple non-covert users, where multiplexing is also required to exhaust the entire rate-region.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (11)
  1. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on iot security: Application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82 721–82 743, 2019.
  2. B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on awgn channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1921–1930, 2013.
  3. B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: fundamental limits of covert wireless communication,” IEEE Communications Magazine, vol. 53, no. 12, pp. 26–31, 2015.
  4. M. R. Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334–2354, 2016.
  5. L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits of communication with low probability of detection,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3493–3503, 2016.
  6. K. S. Kumar Arumugam and M. R. Bloch, “Embedding covert information in broadcast communications,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2787–2801, 2019.
  7. D. Kibloff, S. M. Perlaza, and L. Wang, “Embedding covert information on a given broadcast code,” in 2019 IEEE International Symposium on Information Theory (ISIT), 2019, pp. 2169–2173.
  8. S. W. Kim and H. Q. Ta, “Covert communications over multiple overt channels,” IEEE Transactions on Communications, vol. 70, no. 2, pp. 1112–1124, 2022.
  9. A. Bounhar, M. Sarkiss, and M. Wigger, “Mixing a covert and a non-covert user,” in 2023 IEEE International Symposium on Information Theory (ISIT), 2023, pp. 2577–2582.
  10. K. S. K. Arumugam and M. R. Bloch, “Covert communication over a k𝑘kitalic_k -user multiple-access channel,” IEEE Transactions on Information Theory, vol. 65, no. 11, pp. 7020–7044, 2019.
  11. K.-H. Cho and S.-H. Lee, “Treating interference as noise is optimal for covert communication over interference channels,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 322–332, 2021.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 2 tweets and received 0 likes.

Upgrade to Pro to view all of the tweets about this paper: