stealth communication with vanishing power over binary
play

Stealth Communication with Vanishing Power over Binary Symmetric - PowerPoint PPT Presentation

Stealth Communication with Vanishing Power over Binary Symmetric Channels Diego Lentner, Gerhard Kramer Technical University of Munich Institute for Communications Engineering ISIT 2020 Covert Communication Covert Communication vs. Secrecy:


  1. Stealth Communication with Vanishing Power over Binary Symmetric Channels Diego Lentner, Gerhard Kramer Technical University of Munich Institute for Communications Engineering ISIT 2020

  2. Covert Communication Covert Communication vs. Secrecy: • In secrecy, we want to hide the content of a message, i.e., we minimize the mutual information between Alice’s message and Eve’s Alice Bob channel output. I s A l i c e c o m • In covert communication/stealth, we want to hide m u n i c a w t i i t n h g B o b ? ( y e s the presence of communication! / n o ) Other names: • Low probability of detection (LPD), • Hiding information in noise. Warren Diego Lentner, Gerhard Kramer (TUM) 2

  3. Hypothesis testing • Binary hypothesis test: ◮ Null hypothesis H 0 : z n ∼ P 0 , ◮ Alternative hypothesis H 1 : z n ∼ P 1 . • Optimal test (e.g., Neyman-Pearson ) minimizes PFA + PMD where PFA and PMD are the probabilities of false alarm and missed detection, respectively. • Bounds on the performance of an optimal test: ◮ Variational distance: PFA + PMD = 1 − V T ( P 0 , P 1 ) . ◮ KL divergence (Pinsker’s inequality): � 1 V T ( P 0 , P 1 ) ≤ 2 D ( P 0 � P 1 ) . Diego Lentner, Gerhard Kramer (TUM) 3

  4. Measuring Covertness X n Y n • Alice sends ”0” when she is not communicating P Y | X Alice Bob • Warren observes his channel output z n and performs a binary hypothesis test : ◮ H 0 : Alice is not communicating ⇔ z n ∼ P n Z | X ( ·| 0 ) , ◮ H 1 : Alice is communicating ⇔ z n ∼ P Z n . Z n P Z | X Warren • Alice can bound Warren’s detection performance when she is communicating to Bob by ensuring D ( P Z n � P n Z | X ( ·| 0 )) ≤ δ for a small δ > 0. Diego Lentner, Gerhard Kramer (TUM) 4

  5. Covert Communication: Main Results Square root law (Bash et al. ’13, Wang et al. ’16, Bloch ’16) • Let n be the total number of channel uses. • Warren observes Z n and compares its statistics to the null hypothesis. • Alice can reliably transmit O ( √ n ) bits to Bob without being detected by Warren. This means that the rate is zero. ⇒ lim n →∞ O ( √ = n ) / n = 0 ! Secret key lengths (Bash et al. ’13, Bloch ’16) • Alice and Bob pre-share a secret key of length K . • In general, O ( √ n log n ) pre-shared key bits are necessary. If Alice knows the statistics of her channel to Warren, O ( √ n ) key bits suffice. • If Warren’s channel is noisier than Bob’s, then covert communication can be achieved without key. • If Warren has uncertainty, e.g., about the transmission time or his noise model, then these results can be improved. Diego Lentner, Gerhard Kramer (TUM) 5

  6. Stealth Communication Hou and Kramer ’14 • Alice does not have to remain silent when not communicating information to Bob. • She is free to send any other symbols than the ”zero-symbol”. Main idea: Alice confuses Warren by sending obfuscation symbols i.i.d. ∼ P X o , n • Warren tests his observations against P Z o , n = P Z | X · P X o , n . • Alice must ensure that D ( P Z n � P n Z o ) ≤ δ for a small constant δ > 0. Then: Positive-rate stealth communication possible! Diego Lentner, Gerhard Kramer (TUM) 6

  7. Vanishing Power Communication Model We are interested in stealth communication • with vanishing power (VP) as without obfuscation • with energy that scales as n α , 0 ≤ α < 1, with blocklenght n . = ⇒ Average block power: � � n ≤ an α 1 � X 2 n , 0 ≤ α < 1 , a > 0 . n E i i = 1 P X , n P Y , n Assume X Y � ¯ 1 − p � 1 − an α 1 − an α p + an α • ¯ p = 1 − p , 0 ≤ α ≤ 1, and 0 < a < 1. n p 0 0 n n p • n is fixed (one-shot analysis!). How much information can we transmit p � � an α 1 − an α p + an α n ¯ with VP over n channel uses? p 1 1 n n 1 − p Diego Lentner, Gerhard Kramer (TUM) 7

  8. VP Gallager Exponents • Rate R : • Scaling constant R α for a fixed α : M = e n α R α . M = e nR . • For M ρ = e nR ρ , DMS P X , and DMC P Y | X : • For M ρ = e n α R α ρ , DMS P X , n , and DMC P Y | X : P ( E ) ≤ e − n α ˆ P ( E ) ≤ e − nE G ( R , P X ) E α G ( R α , P X , n ) with Gallager exponent (Gallager ’68) with VP Gallager exponent � � ˆ ˆ E G ( R , P X ) = max 0 ≤ ρ ≤ 1 [ E 0 ( ρ, P X ) − ρ R ] E α E α G ( R α , P X , n ) = max 0 ( ρ, P X , n ) − ρ R α 0 ≤ ρ ≤ 1 and and �� � 1 + ρ n ˆ E α � 0 ( ρ, P X , n ) = lim n α E 0 ( ρ, P X , n ) 1 E 0 ( ρ, P X ) = − log P ( x ) P ( y | x ) 1 + ρ n →∞ y x Diego Lentner, Gerhard Kramer (TUM) 8

  9. VP Gallager Exponent Example: a = 0 . 2, α = 0 . 5, p = 0 . 1. 0 . 16 ˆ E α 0 ( ρ, P X , n ) 0 . 14 � ��� � ¯ 0 . 12 � 1 + ρ 1 1 1 − an α 1 + ρ + an α G ( R α , P X , n ) n = lim − log p n p 1 + ρ n α n 0 . 1 n →∞ � 1 + ρ �� �� 0 . 08 � 1 1 R α, max ( P X , n ) 1 − an α 1 + ρ + an α n ¯ + p p 1 + ρ n 0 . 06 E α � � � � � ˆ ρ ρ 1 1 0 . 04 1 + ρ − p 1 + ρ − p ¯ ¯ ( 1 + ρ ) a p p , α < 1 1 + ρ 1 + ρ = 0 . 02 E 0 ( ρ, P X , n ) , α = 1 . 0 0 . 05 0 . 1 0 . 15 0 . 2 0 . 25 0 . 3 0 . 35 0 . 4 0 R α Maximum VP scaling constant for BSCs � � a ( 1 − 2 p ) log ¯ R α, max ( P X , n ) = ∂ ˆ p E α � p , α < 1 0 ( ρ, P X , n ) � = � ∂ρ I ( P X , n ; P Y | X ) , α = 1 . � ρ = 0 Diego Lentner, Gerhard Kramer (TUM) 9

  10. Stealth Communication with VP • P Y | X = BSC ( p ) and P Z | X = BSC ( q ) . • Alice can transmit obfuscation symbols with VP � � n = bn β X n Y n 1 � X 2 n , 0 ≤ β < 1 , 0 < b . P Y | X n E Alice Bob i i = 1 • When transmitting information, she must ensure that ◮ Bob can decode her message (with high probability) Z n ◮ Warren cannot distinguish the message from obfuscation: P Z | X Warren ! D ( P Z n � P n Z o ) ≤ δ. How large can Alice choose ( α, a ) for the given vanishing obfuscation power? Diego Lentner, Gerhard Kramer (TUM) 10

  11. Uncoded Stealth Communication • Assume all Z i are i.i.d.: ! D ( P Z n � P n Z o ) = n D ( P Z , n � P Z o , n ) ≤ δ. • For α, β < 1 and sufficiently large n , we find via Taylor approximation � 2 � an α (¯ q − q ) 2 − bn β D ( P Z , n � P Z o , n ) ≈ 1 q ¯ 2 q n n Uncoded Stealth Communication For sufficiently large n , uncoded stealth communication with α, β < 1 is possible if √ 2 q ¯ √ √ q � an α − bn β � � � ≤ k k = δ. n with ¯ q − q Diego Lentner, Gerhard Kramer (TUM) 11

  12. Uncoded Stealth Communication 1 D ( P Z , n � P Z o , n ) = 0 possible � an α − bn β � � For α, β < 1: 0 . 9 � = 0 ⇔ n D ( P Z , n � P Z o , n ) ≤ δ possible � ≤ k √ 0 . 8 � � an α − bn β � √ ⇔ n � � an α − bn β � � ≤ k n 0 . 7 • Case bn β 0 . 6 n = 0 (covert communication): 0 . 5 α max = 0 . 5 , a ≤ k . α • Case β = 0 . 5: 0 . 4 0 . 3 α max = 0 . 5 , a ≤ k + b . 0 . 2 • Case β = 1 (Hou and Kramer ’14): 0 . 1 α max = 1 . 0 = ⇒ Positive-rate communication! 0 . 1 0 . 2 0 . 3 0 . 4 0 . 5 0 . 6 0 . 7 0 . 8 0 . 9 0 1 β Diego Lentner, Gerhard Kramer (TUM) 12

  13. Coded Stealth Communication Coded Stealth Communication We can bound � a ( 1 − 2 p ) log ¯ p log M p , α < 1 < n α I ( P X , n ; P Y | X ) , α = 1  � � + a ( 1 − 2 q ) log ¯ q − a ( 1 − 2 p ) log ¯ q p log K  , α < 1 > p � + , n α � I ( P X , n ; P Z | X ) − I ( P X , n ; P Y | X ) α = 1  where • [ x ] + = max( x , 0 ) , � ≤ k √ � � an α − bn β � • ( α, a ) satisfy n for specified ( β, b ) . Note: • In the covert communication case bn β n = 0, we recover the bounds from Bloch ’16 evaluated for BSCs. • For log K = 0, we obtain the bounds for key-less stealth / covert communication. Diego Lentner, Gerhard Kramer (TUM) 13

  14. Proof Sketch • Random coding with binning • Pre-shared key indexes a subcodebook � � � � • Warren has to test against the entire codebook C � P n C � P n + D ( P n Z � P n D ( P Z n | ˜ Z o ) = E D ( P Z n | ˜ Z ) Z o ) E • Reliability: proof via VP Gallager exponents as � �� � � �� � ( b ) ( a ) for noisy channel coding theorem ��� � � log P n Z ( z n ) • Stealth: bound (a),(b),(c) separately. C ( z n | ˜ C ) − P n Z ( z n ) + E . P Z n | ˜ P n Z o ( z n ) (a) Proof with VP resolvability exponents (following z n Hayashi ’06, Hou and Kramer ’13). � �� � ( c ) (b) Uncoded stealth scenario, reuse result! (c) Bound with Pinsker’s and Jensen’s inequalities. Diego Lentner, Gerhard Kramer (TUM) 14

  15. Conclusion Main results: • Unified stealth communication framework that includes covert communication and positive-rate stealth communication as extreme cases. • Simple achievability proof based on suitably modified Gallager exponents. Outlook • Generalization to arbitrary DMCs (done!) and AWGN channels • Practical coding scheme! • Stealth with feedback • ... Diego Lentner, Gerhard Kramer (TUM) 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend