Open Access System for Information Sharing

Login Library

 

Article
Cited 34 time in webofscience Cited 40 time in scopus
Metadata Downloads

Time-Division is Optimal for Covert Communication Over Some Broadcast SCIE SCOPUS

Title
Time-Division is Optimal for Covert Communication Over Some Broadcast
Authors
Tan, Vincent Y. F.Lee, Si-Hyeon
Date Issued
2019-05
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Abstract
We consider a covert communication scenario where a transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, the warden. The legitimate receivers and the adversary observe the transmission from the transmitter via a three-user discrete or Gaussian memoryless broadcast channel. We focus on the case where the "no-input" symbol is not redundant, i.e., the output distribution at the warden induced by the no-input symbol is not a mixture of the output distributions induced by other input symbols, so that the covert communication is governed by the square root law, i.e., at most Theta(root n) bits can be transmitted over n channel uses. We show that for such a setting, a simple time-division strategy achieves the optimal throughputs for a non-trivial class of broadcast channels; this is not true for communicating over broadcast channels without the covert communication constraint. Our result implies that a code that uses two separate optimal point-to-point codes each designed for the constituent channels and each used for a fraction of the time is optimal in the sense that it achieves the best constants of the root n-scaling for the throughputs. Our proof strategy combines several elements in the network information theory literature, including concave envelope representations of the capacity regions of broadcast channels and El Gamal's outer bound for more capable broadcast channels.
URI
https://oasis.postech.ac.kr/handle/2014.oak/95246
DOI
10.1109/TIFS.2018.2878398
ISSN
1556-6013
Article Type
Article
Citation
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 14, no. 5, page. 1377 - 1389, 2019-05
Files in This Item:
There are no files associated with this item.

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이시현LEE, SI HYEON
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse