Award Abstract # 1309573
Low Probability of Detection Wireless Communications

NSF Org: ECCS
Division of Electrical, Communications and Cyber Systems
Recipient: UNIVERSITY OF MASSACHUSETTS
Initial Amendment Date: August 14, 2013
Latest Amendment Date: August 14, 2013
Award Number: 1309573
Award Instrument: Standard Grant
Program Manager: chengshan xiao
ECCS
 Division of Electrical, Communications and Cyber Systems
ENG
 Directorate for Engineering
Start Date: September 1, 2013
End Date: August 31, 2016 (Estimated)
Total Intended Award Amount: $374,724.00
Total Awarded Amount to Date: $374,724.00
Funds Obligated to Date: FY 2013 = $374,724.00
History of Investigator:
  • Dennis Goeckel (Principal Investigator)
    goeckel@ecs.umass.edu
  • Donald Towsley (Co-Principal Investigator)
Recipient Sponsored Research Office: University of Massachusetts Amherst
101 COMMONWEALTH AVE
AMHERST
MA  US  01003-9252
(413)545-0698
Sponsor Congressional District: 02
Primary Place of Performance: University of Massachusetts Amherst
Amherst
MA  US  01003-9292
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): VGJHK59NMPK9
Parent UEI: VGJHK59NMPK9
NSF Program(s): CCSS-Comms Circuits & Sens Sys
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 153E, 154E
Program Element Code(s): 756400
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.041

ABSTRACT

The objective of this project is to establish the fundamental underpinnings
of low probability of detection (LPD) communication systems operating over
classical or quantum mechanical channels. This provides a transformative
impact in two ways: (1) establishing a new approach that transforms the
largely dormant (and socially compelling) area of LPD communications;
(2) introducing and developing the foundations of the LPD optical channel,
which requires quantum mechanical considerations.

Intellectual merit:

The intellectual merit is based on a fundamental approach to the LPD
communications problem that employs a broad array of tools to establish
a new branch in the large field of wireless communications security.
This project will also demonstrate the intellectual richness of the
security problem that arises when quantum mechanical considerations
are considered in optical communications. Tools from classical
communications and networks, in particular information theory, mix
with tools from quantum information systems.

Broader impacts:

The broader impacts are focused on impacting society and education.
The hiding of the existence of transmissions while still communicating
reliably has clear application in both military and civilian societal
contexts. The results of this project will allow communicating parties
and those whom attempt to detect them to understand the fundamental
limits on such communication and techniques to achieve those limits.
Finally, the project includes an integrated program of educational
engagement that utilizes the extensive resources of both UMass-Amherst
and BBN, with the latter contributing both theoretical expertise
and experimental facilities for quantum information processing
that will provide a unique opportunity for UMass students.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

A. Sheikholeslami, B. Bash, D. Towley, D. Goeckel, and S. Guha "Covert Communication over Classical-Quantum Channels" IEEE International Symposium on Information Theory (ISIT) , 2016
B. Bash, A. Gheorghe, M. Patel, J. Habif, D. Goeckel, D. Towsley, and S. Guha "Quantum-secure Covert Communication on Bosonic Channels (Honorable Mention, NSA Best Scientific Paper Competition, 2016)" Nature Communications , 2015
B. Bash, D. Goeckel, D. Towsley, and S. Guha "Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication" IEEE Communications Magazine , v.53 , 2015 , p.26
D. Goeckel, B. Bash, S. Guha, and D. Towsley "Covert Communications when the Warden Does Not Know the Background Noise Power" IEEE Communication Letters , v.20 , 2016 , p.236
H. Wang, T. Zheng, J. Yuan, D. Towsley and M. Lee "Physical layer security in heterogeneous cellular networks" IEEE Transactions on Communications , v.64 , 2016 , p.1204
R. Soltani, D. Goeckel, D. Towsley, A. Houmansadr "Covert Communications on Poisson Packet Channels" 53rd Annual Allerton Conference on Communication, Control, and Computing , 2015
R. Soltani, D. Goeckel, D. Towsley, and A. Houmandadr "Covert Communications on Renewal Packet Channels" 54th Annual Allerton Conference on Communication, Control, and Computing , 2016
T. Sobers, B. Bash, D. Goeckel, S. Guha, and D. Towsley "Covert Communication with the Help of an Uninformed Jammer Achieves Positive Rate" Asilomar Conference on Signals, Systems, and Computers , 2015

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Low probability of detection (LPD) communication is the transmission of a message in the presence of a watchful adversary without that adversary even being aware that communication has taken place.  Most research in security considers the protection of message content from an adversary through cryptographic approaches.  However, there are numerous applications where even the adversary's detection of the presence of a message, particularly if that message is encrypted, is problematic for the sender.  For example: (1) encrypted communication can indicate the presence and/or scale of military operations;  (2) an authoritarian government could shut down encrypted communication if it is detected between unauthorized parties during a time of social unrest; (3) a government might track user activities based on communications they originate.  Hence, the topic of LPD communications, also now more commonly referred to as "covert communications," is of emerging interest.

Our work shortly before grant inception set down the square root law (SRL) for the fundamental limits of covert radio communications.  The SRL states that, in n time slots, sqrt(n) bits can be sent reliably and covertly; conversely, sending more than sqrt(n) bits results in either detection of the communication by the adversary or erroneous reception at the desired receiver.  There is a basic tension that leads to this result:  covert communication requires a low transmission power so as to hide in the background noise, and this limited power makes reliable transmission challenging.

This project has developed the nascent field of covert communications through a collaboration between the University of Massachusetts at Amherst and Raytheon-BBN Technologies.  The outcomes in Intellectual Merit have been developed in three areas:

1.  Uncertainty at the adversary:  Critical to the adversary's ability to detect the presence of a message in a noisy environment is the adversary's knowledge of: (1) the message parameters; (2) the characteristics of the background environment.  We have shown that uncertainty at the adversary about the timing of a potential message, even if the desired recipient also has such uncertainty, improves the rate of covert communication.  We have also shown that generating uncertainty at a powerful adversary about the characteristics of the background environment is challenging, but we have further shown how to cause such uncertainty via the use of electronic jamming to greatly improve the rate of covert communication.

2.  Quantum mechanical considerations at optical frequencies:  Our early work under which the SRL was developed considered models appropriate for radio communications.   However, at the frequencies employed for optical communication, which is often desirable for secure communications (e.g. for high rate or the ability to point the transmitter), the consideration of the most powerful adversary must include quantum mechanical aspects.  We have performed the extension of our work to this scenario by developing theoretical bounds and validating the results with a proof-of-concept experiment that provided the first experimental validation of the SRL.

3.  Timing channels:  The randomness in channels appropriate for Internet communications comes from uncertainty in packet timings rather than background noise.  We have considered how such randomness can hide covert communications in the presence of an adversary looking for any aberrations that might indicate the presence of covert communications.  Here, we have demonstrated another SRL:  in n overt packets, a user can covertly insert sqrt(n) packets.  In addition, if the covert user is allowed to alter packet timings, we have demonstrated a method by which the covert user can use such to greatly improve the rate of covert communication.

The Broader Impacts of the project have been significant.  First, our foundational work in this area has been widely disseminated and ignited interest in covert communications in the information theory community, with a number of other research groups now working in the area.  This led to an informal workshop on covert communications at the 2016 IEEE International Symposium on Information Theory.  In addition, we have given a number of invited talks that have either focused solely on covert communications or included results from this grant.  The project has also had a significant impact on education and research training.  Four PhD students and one undergraduate student have made significant contributions to the project; this includes two female PhD students, one of whom is from a traditionally underrepresented group.  Boulat Bash completed his PhD under the support of this grant and then joined Raytheon BBN, where he leads a follow-on project from the Defense Advanced Research Projects Administration (DARPA): Quantum-secured Imperceptible and unExploitable communication and sensing Technologies (QUIET), which looks further at covert communications in the presence of an all-powerful quantum-capable adversary.  Finally, our work under this grant received recent recognition from the National Security Agency (NSA): B. Bash, A. Gheorghe, M. Patel, J. Habif, D. Goeckel, D. Towsley, and S. Guha, "Quantum-secure Covert Communication on Bosonic Channels,'' Nature Communications, October 19, 2015, won Honorable Mention in the Fourth Annual NSA Best Scientific Cybersecurity Paper Competition.


Last Modified: 11/25/2016
Modified by: Dennis L Goeckel

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page