Publication | Closed Access
Hiding information in noise: fundamental limits of covert wireless communication
375
Citations
13
References
2015
Year
Wireless CommunicationsEngineeringInformation SecurityInformation LeakageInformation ForensicsCovert Wireless CommunicationCommunicationCovert Military OperationsRobust EncryptionData HidingSteganalysisData PrivacyComputer ScienceCovert ChannelSignal ProcessingData SecurityCryptographyInformation HidingSteganographyWireless Networks
Widely deployed encryption-based security prevents unauthorized decoding, but does not ensure undetectability of communication. However, covert, or low probability of detection/intercept communication is crucial in many scenarios ranging from covert military operations and the organization of social unrest, to privacy protection for users of wireless networks. In addition, encrypted data or even just the transmission of a signal can arouse suspicion, and even the most theoretically robust encryption can often be defeated by a determined adversary using non-computational methods such as side-channel analysis. Various covert communication techniques have been developed to address these concerns, including steganography for finite-alphabet noiseless applications and spread-spectrum systems for wireless communications. After reviewing these covert communication systems, this article discusses new results on the fundamental limits of their capabilities, and provides a vision for the future of such systems as well.
| Year | Citations | |
|---|---|---|
Page 1
Page 1