TY - JOUR
T1 - Covert Wireless Communications in IoT Systems
T2 - Hiding Information in Interference
AU - Liu, Zhihong
AU - Liu, Jiajia
AU - Zeng, Yong
AU - Ma, Jianfeng
N1 - Publisher Copyright:
© 2002-2012 IEEE.
PY - 2018/12
Y1 - 2018/12
N2 - Wireless channels are increasingly being used to transmit highly sensitive information in the Internet of Things. However, traditional cryptography methods cannot solve all security problems in IoT systems. Covert wireless communication can prevent an adversary from knowing the existence of a user's transmission; thus, it can provide stronger security protection for IoT devices. In this article, we consider the covert communication in a noisy wireless network, and find that the uncertainty of the aggregated interference experienced by the adversary is beneficial to the potential transmitters. From the network perspective, wireless communications can be hidden in the interference of the noisy wireless network, which the adversary observes as a »shadow» network to a certain extent. Furthermore, we discuss some new results on the effect of active eavesdropper. Square root law becomes invalid, and even jammer-assisted schemes have little effect on the covertness in the presence of active eavesdropper. Finally, we provide a vision for future research.
AB - Wireless channels are increasingly being used to transmit highly sensitive information in the Internet of Things. However, traditional cryptography methods cannot solve all security problems in IoT systems. Covert wireless communication can prevent an adversary from knowing the existence of a user's transmission; thus, it can provide stronger security protection for IoT devices. In this article, we consider the covert communication in a noisy wireless network, and find that the uncertainty of the aggregated interference experienced by the adversary is beneficial to the potential transmitters. From the network perspective, wireless communications can be hidden in the interference of the noisy wireless network, which the adversary observes as a »shadow» network to a certain extent. Furthermore, we discuss some new results on the effect of active eavesdropper. Square root law becomes invalid, and even jammer-assisted schemes have little effect on the covertness in the presence of active eavesdropper. Finally, we provide a vision for future research.
UR - http://www.scopus.com/inward/record.url?scp=85059872842&partnerID=8YFLogxK
U2 - 10.1109/MWC.2017.1800070
DO - 10.1109/MWC.2017.1800070
M3 - 文章
AN - SCOPUS:85059872842
SN - 1536-1284
VL - 25
SP - 46
EP - 52
JO - IEEE Wireless Communications
JF - IEEE Wireless Communications
IS - 6
M1 - 8600757
ER -