7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Multipath Stealth Communication with Jammers

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We consider the problem of stealth communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. We consider two types of jamming --- erasure jamming and overwrite jamming. We require the communication to be both stealthy and reliable, i.e., the adversary should be unable to detect whether or not meaningful communication is taking place, while the legitimate receiver should reconstruct any potential messages from the transmitter with high probability simultaneously. We provide inner bounds on the robust stealth capacities under both adversarial erasure and adversarial overwrite jamming.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Article: not found

          Covert Communication Over Noisy Channels: A Resolvability Perspective

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Fundamental Limits of Communication With Low Probability of Detection

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Wire-Tap Channel II

                Bookmark

                Author and article information

                Journal
                08 May 2018
                Article
                1805.03095
                616a682c-97c4-4d5d-b778-9631bf691e2b

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                A shorter version will be presented in ISIT 2018
                cs.IT math.IT

                Numerical methods,Information systems & theory
                Numerical methods, Information systems & theory

                Comments

                Comment on this article