Traditional security (e.g., encryption) prevents unauthorized access to message content; however, detection of the mere presence of a message can have significant negative impact on the privacy of the communicating parties. Unlike these standard methods, covert or low probability of detection (LPD) communication not only protects the information contained in a transmission from unauthorized decoding, but also prevents the detection of a transmission in the first place. In this thesis we investigate the fundamental laws of covert communication. We first study covert communication over additive white Gaussian noise (AWGN) channels, a standard model for radio-frequency (RF) communication. We present a square root limit on the amount of informa...
Data security is of such paramount importance that security measures have been implemented across al...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while g...
A covert communication system under block fading channels is considered, where users experience unc...
This dissertation investigates covert communication in dynamic wireless communication environments. ...
This dissertation studies covert wireless communications where a transmitter (Alice) intends to tran...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
International audienceWe consider the problem of covert communication over continuous-time additive ...
The recent achievements in enhanced throughput, efficiency, and reliability of wireless communicatio...
International audienceThe paper studies covert communication over a continuous-time Gaussian channel...
In this work, we propose a covert communication scheme where the transmitter attempts to hide its t...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Data security is of such paramount importance that security measures have been implemented across al...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while g...
A covert communication system under block fading channels is considered, where users experience unc...
This dissertation investigates covert communication in dynamic wireless communication environments. ...
This dissertation studies covert wireless communications where a transmitter (Alice) intends to tran...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
International audienceWe consider the problem of covert communication over continuous-time additive ...
The recent achievements in enhanced throughput, efficiency, and reliability of wireless communicatio...
International audienceThe paper studies covert communication over a continuous-time Gaussian channel...
In this work, we propose a covert communication scheme where the transmitter attempts to hide its t...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
In this work, we consider a covert communication scenario, where a transmitter Alice communicates to...
Data security is of such paramount importance that security measures have been implemented across al...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the...