Covert Communication (Low Probability of Detection – LPD)

I. Makhdoom, M. Abolhasan, and J. Lipman, “A comprehensive survey of covert communication techniques, limitations and future challenges,” Computers & Security, vol. 120, p. 102784, Sep. 2022, doi: 10.1016/j.cose.2022.102784.

Best Readings in Covert Communication and Networking
https://www.comsoc.org/publications/best-readings/covert-communication-and-networking

Covert communication (often called LPD or Low Probability of Detection) is a security paradigm where the goal is not just to hide the message, but to hide the very fact that communication is happening at all.

In standard wireless security (like Encryption), an attacker knows we are talking but can’t read what we are saying. In covert communication, the attacker (often called the “Warden”) shouldn’t even know a signal exists.

Covert communication often uses the same physical properties, exploiting noise and channel uncertainty, to “bury” signals so they look like natural background interference.

Low Probability of Detection (LPD)

The primary goal of covert communication is Low Probability of Detection (LPD). It adds a security layer beyond standard cryptography by:

  • Hiding Transmission: Embedding signals within ambient or artificial noise.
  • Exploiting Uncertainty: Using the natural fluctuations and uncertainties of wireless channels to mask data.
  • Targeting Awareness: Ensuring adversaries are unaware that any communication is taking place.

Key Features of Covert Networking

The four defining characteristics of modern covert communication systems:

  1. Uncertainty-driven Signaling: Leveraging noise power and channel unpredictability to confuse eavesdroppers.
  2. Multi-dimensional Allocation: Optimizing power, spectrum, and spatial paths to hide signals across large networks.
  3. Adversary-aware Design: Tailoring communication strategies based on the eavesdropper’s specific detection capabilities.
  4. Dynamic Adaptability: Using real-time learning to maintain secrecy against mobile or intelligent adversaries.

Techniques of Covert Communication

Leave a Reply

Your email address will not be published. Required fields are marked *

error: