Covert Multi-Access Communication with a Non-Covert User

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we caracterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users. They further show that the presence of a non-covert user in the system can enhance the capacities of the covert users under stringent secret-key constraints. To derive our fundamental limits, we provide an information-theoretic converse proof and present a coding scheme that achieves the performance of our converse result. Our coding scheme is based on multiplexing different code phases, which seems to be essential to exhaust the entire tradeoff region between the rates at the covert and the two non-covert users. This property is reminiscent of the setup with multiple non-covert users, where multiplexing is also required to exhaust the entire rate-region.

Original languageEnglish
Title of host publicationICC 2024 - IEEE International Conference on Communications
EditorsMatthew Valenti, David Reed, Melissa Torres
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1473-1478
Number of pages6
ISBN (Electronic)9781728190549
DOIs
Publication statusPublished - 1 Jan 2024
Event59th Annual IEEE International Conference on Communications, ICC 2024 - Denver, United States
Duration: 9 Jun 202413 Jun 2024

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference59th Annual IEEE International Conference on Communications, ICC 2024
Country/TerritoryUnited States
CityDenver
Period9/06/2413/06/24

Keywords

  • Covert Communication
  • IoT
  • Physical Layer Security
  • Undetectable Communication

Fingerprint

Dive into the research topics of 'Covert Multi-Access Communication with a Non-Covert User'. Together they form a unique fingerprint.

Cite this