Design a Wireless Covert Channel Based on Dither Analog Chaotic Code

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code

Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiao-Peng Ji, Yuewei Dai, Huiwen Bai
Copyright: © 2021 |Volume: 13 |Issue: 2 |Pages: 19
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799860358|DOI: 10.4018/IJDCF.2021030108
Cite Article Cite Article

MLA

Cao, Pengcheng, et al. "Design a Wireless Covert Channel Based on Dither Analog Chaotic Code." IJDCF vol.13, no.2 2021: pp.115-133. http://doi.org/10.4018/IJDCF.2021030108

APA

Cao, P., Liu, W., Liu, G., Zhai, J., Ji, X., Dai, Y., & Bai, H. (2021). Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. International Journal of Digital Crime and Forensics (IJDCF), 13(2), 115-133. http://doi.org/10.4018/IJDCF.2021030108

Chicago

Cao, Pengcheng, et al. "Design a Wireless Covert Channel Based on Dither Analog Chaotic Code," International Journal of Digital Crime and Forensics (IJDCF) 13, no.2: 115-133. http://doi.org/10.4018/IJDCF.2021030108

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.