Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Covert communication in the presence of an uninformed jammer

TV Sobers, BA Bash, S Guha… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …

泛在网络环境下隐蔽通道关键技术研究综述

李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …

Demonstration of entanglement-enhanced covert sensing

S Hao, H Shi, CN Gagatsos, M Mishra, B Bash… - Physical Review Letters, 2022 - APS
The laws of quantum physics endow superior performance and security for information
processing: quantum sensing harnesses nonclassical resources to enable measurement …

Covert communication gains from adversary's ignorance of transmission time

BA Bash, D Goeckel, D Towsley - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The recent square root law (SRL) for covert communication demonstrates that Alice can
reliably transmit O (√ n) bits to Bob in n uses of an additive white Gaussian noise (AWGN) …

First-and second-order asymptotics in covert communication

M Tahmasbi, MR Bloch - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study the first-and second-order asymptotics of covert communication over binary-input
discrete memoryless channels for three different covertness metrics and under maximum …

Multi-hop routing in covert wireless networks

A Sheikholeslami, M Ghaderi, D Towsley… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In covert communication, Alice tries to communicate with Bob without being detected by a
warden Willie. When the distance between Alice and Bob becomes large compared with the …

Covert Communication Over a -User Multiple-Access Channel

KSK Arumugam, MR Bloch - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
We consider a scenario in which K transmitters attempt to communicate covert messages
reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) …

Hybrid quantum photonics based on artificial atoms placed inside one hole of a photonic crystal cavity

KG Fehler, L Antoniuk, N Lettner, AP Ovvyan… - ACS …, 2021 - ACS Publications
Spin-based, quantum-photonics promise to realize distributed quantum computing and
quantum networks. The performance depends on an efficient entanglement distribution …

Fundamental limits of quantum-secure covert communication over bosonic channels

MS Bullock, CN Gagatsos, S Guha… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
We investigate the fundamental limit of quantumsecure covert communication over the lossy
thermal noise bosonic channel, the quantum-mechanical model underlying many practical …