Covert Communication Using Jointly Spread Spectrum and Artificial Noise
Subject Areas : electrical and computer engineeringMorteza Shafiee Neyestanak 1 , Iman Kazemi 2
1 - Malek Ashtar University of Technology
2 - Malek Ashtar University of Technology
Keywords: Covert Communication (CC), Spread Spectrum, Direct Sequence, Artificial Noise (AN), Jamming,
Abstract :
Covert Communication technique is developed for LPD communication in military and civil applications. Artificial Noise (AN) is the method to confuse eavesdropper and assure data transmission. But, generating AN in wide range of frequencies and times is very challenging. Furthermore, it reveals the transmitter or challenges it for synchronization to confuse eavesdropper about environmental noise. This paper proposes a method based on Spread Spectrum as well as self-jamming as AN to solve the problems. By spreading the spectrum, we can generate AN in wide range of frequencies and times, at low power and cost-effective manner. Consequently, there is no need to synchronization. Simulation and numerical results indicate, partial band jammer, effectively confuse the eavesdropper by 1.8 dB margin at JSR = -5 dB. In the situations, transmitter and receiver may communicate at BER = 10^-3 for Eb/N > 8.3 dB. The paper simulates the proposed method for various types of jamming and reports the results where, multitone jamming is rejected for this application as artificial noise. Single-tone jammer also can confuse the eavesdropper by 2.6 dB margin at JSR = -5 dB and TRX communications quality equal to BER = 10-3 for Eb/N > 10.9 dB
[1]. Vaudenay, Serge. A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media, 2005.
[2]. Shih, Frank Y. Digital watermarking and steganography: fundamentals and techniques. CRC press, 2017.
[3]. Peterson, Roger L., David E. Borth, and Roger E. Ziemer. An introduction to spread-spectrum communications. Prentice-Hall, Inc., 1995.
[4]. M. K. Simon, Jim K. Omura, Robert A. Scholtz, and Barry K. Levitt, Spread Spectrum Communications Handbook, McGraw-Hill, 1994.
[5]. Biswas, Ardhendu Shekhar, et al. "Orthogonal Coded Spread Spectrum Digital Beamforming-Based 5G Receiver." Arabian Journal for Science and Engineering (2022): 1-13.
[6]. Jung, Hyoyoung, et al. "Design of anti-jamming waveforms for time-hopping spread spectrum systems in tone jamming environments." IEEE Transactions on Vehicular Technology 69.1 (2019): 728-737.
[7]. Baek, Chang-Uk, Ji-Won Jung, and Dae-Won Do. "Study on the structure of an efficient receiver for covert underwater communication using direct sequence spread spectrum." Applied Sciences 8.1 (2018): 58.
[8]. He, Wenhui, et al. "Optimal Transmission Probabilities of Information and Artificial Noise in Covert Communications." IEEE Communications Letters 26.12 (2022): 2865-2869.
[9]. Simmons, Gustavus J. "The prisoners’ problem and the subliminal channel." Advances in Cryptology. Springer, Boston, MA, 1984.
[10]. Mazurczyk, Wojciech, and Luca Caviglione. "Steganography in modern smartphones and mitigation techniques." IEEE Communications Surveys & Tutorials 17.1 (2014): 334-357.
[11]. Lee, Seonwoo, et al. "Achieving undetectable communication." IEEE Journal of Selected Topics in Signal Processing 9.7 (2015): 1195-1205.
[12]. Safier, Pedro N., Ira S. Moskowitz, and Paul Cotae. "On the baseband communication performance of physical layer steganography." 2011 45th Annual Conference on Information Sciences and Systems. IEEE, 2011.
[13]. B. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
[14]. He, Biao, et al. "On covert communication with noise uncertainty." IEEE Communications Letters 21.4 (2017): 941-944.
[15] Ta, Hien Q., and Sang Wu Kim. "Covert communication under channel uncertainty and noise uncertainty." ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019.
[16]. Sodagari, Shabnam. "Covert Communications Against an Adversary with Low-SNR Sensing Capability in Nakagami Fading." IEEE Sensors Letters 4.5 (2020): 1-4.
[17]. Li, Ke, Patrick A. Kelly, and Dennis Goeckel. "Optimal power adaptation in covert communication with an uninformed jammer." IEEE Transactions on Wireless Communications 19.5 (2020): 3463-3473.
[18]. Zheng, Tong-Xing, et al. "Wireless covert communications aided by distributed cooperative jamming over slow fading channels." IEEE Transactions on Wireless Communications 20.11 (2021): 7026-7039.
[19]. Huang, Ke-Wen, Hao Deng, and Hui-Ming Wang. "Jamming aided covert communication with multiple receivers." IEEE Transactions on Wireless Communications 20.7 (2021): 4480-4494.
[20]. T. -X. Zheng, H. -M. Wang, D. W. K. Ng and J. Yuan, "Multi-Antenna Covert Communications in Random Wireless Networks," in IEEE Transactions on Wireless Communications, vol. 18, no. 3, pp. 1974-1987, March 2019, doi: 10.1109/TWC.2019.2900915.
[21]. X. Chen et al., "Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden with Uncertain Locations," in IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 5467-5480, Aug. 2021, doi: 10.1109/TWC.2021.3068096.
[22]. O. Shmuel, A. Cohen and O. Gurewitz, "Multi-Antenna Jamming in Covert Communication," in IEEE Transactions on Communications, vol. 69, no. 7, pp. 4644-4658, July 2021.
[23]. Xiong, Wenhui, et al. "Covert communication with cognitive jammer." IEEE Wireless Communications Letters 9.10 (2020): 1753-1757.
[24]. Choi, Haeung, Sangjun Park, and Heung-No Lee. "Covert Anti-Jamming Communication Based on Gaussian Coded Modulation." Applied Sciences 11.9 (2021): 3759.
[25]. Arbi, Tarak, Benoit Geller, and Oudomsack Pierre Pasquero. "Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to Jamming." MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021.
[26]. S. N. Kirillov and A. A. Lisnichuk, "The Procedure of Multi-Criteria Synthesis of DSSS Radio Signals to Adapt Prospective Wireless Communication Systems to the Action of NarrowBand Interference," 2020 Moscow Workshop on Electronic and Networking Technologies (MWENT), 2020, pp. 1-5.
[27]. Bawahab, Fawzan Ghalib Abdul Karim, et al. "Performance evaluation and mathematical analysis of direct sequence and frequency hopping spread spectrum systems under wideband interference." International Journal of Advances in Intelligent Informatics 4.3 (2018): 180-191.
[28]. R. C. Dixon, Spread Spectrum Systems with Commerical Applications. John Wiley and Sons, Inc., 1994.
[29] Lathi, Bhagwandas Pannalal. Modern digital and analog communication systems. Oxford university press, 1998.
[30]. K. Grover, A. Lim, and Q. Yang, “Jamming and anti-jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol.17, no. 4, pp. 197–215, Dec. 2014.
[31]. Y. Wang, Y. Huang, Z. Chen, S. Fan, Z. Liu and H. Xu, "Complicated Interference Identification via Machine Learning Methods," 2021 IEEE 4th International Conference on Electronic Information and Communication Technology (ICEICT), 2021, pp. 400-405.
[32]. Milstein, L., Sorin Davidovici, and D. Schilling. "The effect of multiple-tone interfering signals on a direct sequence spread spectrum communication system." IEEE Transactions on Communications 30.3 (1982): 436-446.
[33]. Liang, Jhih-Jhong, Li-Der Jeng, and Chung-Hsuan Wang. "A new partial-band noise jamming model for frequency-hopped MFSK systems." 2005 2nd International Symposium on Wireless Communication Systems. IEEE, 2005.
[34]. Granlund, John. Interference in frequency modulation reception. Diss. Massachusetts Institute of Technology. Department of Electrical Engineering, 1950.
[35]. Jan MIKULKA, Stanislav HANUS, “CCK and Barker Coding Implementation in IEEE 802.11b Standard” 1-4244-0822-9/07, 2007 IEEE.
[36]. Finn, H. M and P. S. Johnson, “Adaptive detection mode with threshold control as a function of spatially sampled clutter estimation.” RCA Review, vol. 29, No 3, pp. 414-464, 1968