Results 231 to 240 of about 84,456 (273)

Covert Communications With Constrained Age of Information [PDF]

open access: yesIEEE Wireless Communications Letters, 2021
5 pages, 3 ...
Yida Wang, Shihao Yan, Weiwei Yang
exaly   +3 more sources

Covert Communication With Cognitive Jammer

IEEE Wireless Communications Letters, 2020
This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it determines whether to transmit the jamming signal.
Wenhui Xiong   +3 more
openaire   +1 more source

Keyless asynchronous covert communication

2016 IEEE Information Theory Workshop (ITW), 2016
We consider a scenario in which Alice asynchronously communicates with Bob over a Discrete Memoryless Channel (DMC) while escaping detection from an adversary who observes their communication through another DMC. Specifically, Alice transmits codewords of length n and chooses the transmission epoch T uniformly at random among N available time epochs ...
Keerthi Suria Kumar Arumugam   +1 more
openaire   +1 more source

Covert and Deniable Communications

Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their ...
openaire   +1 more source

Covert Communication in Backscatter Radio

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
Covert communication in backscatter radio systems is considered, where the transmitter controls its transmit power to keep the transponder's response hidden, while a warden tries to detect this covert communication. To achieve covertness, we propose a non-conventional transmission scheme where the transmitter emits noise-like signal with transmit power
Khurram Shahzad 0003, Xiangyun Zhou 0001
openaire   +1 more source

Detecting covert communication on Android

37th Annual IEEE Conference on Local Computer Networks, 2012
Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen   +2 more
openaire   +1 more source

On Covert Communication with Interference Uncertainty

2018 IEEE International Conference on Communications (ICC), 2018
Covert communication can prevent the opponent from knowing that a wireless communication has occurred. If only the additive white Gaussian noise (AWGN) channels and ambient noise are taken into consideration, a square root law was obtained and the result shows that the privacy rate approaches zero asymptotically.
Zhihong Liu   +4 more
openaire   +1 more source

Jamming Strategies in Covert Communication

2019
Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy