Contact Us Search Paper

Covert Communications in Satellite Internet: A Survey

Zewei Guo1, Ji He2,*, Yuanyu Zhang3,*, Shuangrui Zhao4, Yulong Shen5, and Xiaohong Jiang6

Corresponding Author:

Ji He and Yuanyu Zhang

Affiliation(s):

1,2,3,4,5 School of Computer Science and Technology, Xidian University, Xi’an 710071, China

2 Guangzhou Institute of technology, Xidian University, Guangzhou, 510555, China

1,2,3,4,5 Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi’an, 710071, China

6 School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, 041-8655, Japan

Abstract:

The broadcast nature of wireless channels and broad coverage brings significant challenges to the security of Satellite Internet. Recently, a new security paradigm named covert communication aims to enhance security by hiding the transmission process and has received great research attention. Various covert transmission schemes were proposed to achieve covertness for different network scenarios. Motivated by the importance of promising security techniques, this survey provides a comprehensive overview of the recent works on covert communication in Satellite Internet for the first time. We first introduce the basic architecture and characteristics of Satellite Internet, as well as its access security challenges. Then, an in-depth overview of covert communication technologies is provided with an emphasis, which is divided into two categories, i.e., traditional ones and information theory-based ones. Finally, several key challenges and future research directions on covert communication are presented.

Keywords:

Satellite Internet, covert communication, spread spectrum, artificial noise, cooperative relaying

Downloads: 126 Views: 657
Cite This Paper:

Zewei Guo, Ji He, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, and Xiaohong Jiang (2022). Covert Communications in Satellite Internet: A Survey. Journal of Networking and Network Applications, Volume 2, Issue 3, pp. 120–128. https://doi.org/10.33969/J-NaNA.2022.020304.

References:

[1] J. Fomon. (March 2022) Starlink hits 100+ Mbps down-load speed in 15 countries during Q4 2021. Ookla.[Online]. Available: https://www.ookla.com/articles/starlink-hughesnet-viasat-performance-q4-2021

[2] V. K. Shadaab Khan, Pramod Borasi. (2021) Satellite internet market by band type (C-band, X-band, L-band, K-band, and others) and end user (commercial users and individual): Global opportunity analysis and industry forecast, 2020–2030. [Online]. Available: https://www.alliedmarketresearch.com/satellite-internet-market-A12472

[3] J. Foust. (January 2022) SpaceX passes 2,000 star-link satellites launched. Spacenews. [Online]. Available: https://spacenews.com/spacex-passes-2000-starlink-satellites-launched/

[4] M. Sheetz. (May 2022) SpaceX’s starlink satellite inter-net surpasses 400,000 subscribers globally. CNBC. [On-line]. Available: https://www.cnbc.com/2022/05/25/spacexs-starlink-surpasses-400000-subscribers-globally.html

[5] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26–31, 2015.

[6] S. Yan, X. Zhou, J. Hu, and S. V. Hanly, “Low probability of de-tection communication: Opportunities and challenges,” IEEE Wireless Commun., vol. 26, no. 5, pp. 19–25, 2019.

[7] S. Cioni, R. De Gaudenzi, O. D. R. Herrero, and N. Girault, “On the satellite role in the era of 5G massive machine type communications,” IEEE Netw., vol. 32, no. 5, pp. 54–61, 2018.

[8] O. Kodheli, E. Lagunas, N. Maturo, S. K. Sharma, B. Shankar, J. F. M. Montoya, J. C. M. Duncan, D. Spano, S. Chatzinotas, S. Kisseleff et al., “Satellite communications in the new space era: A survey and future challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 1, pp. 70–109, 2020.

[9] F. Fourati and M.-S. Alouini, “Artificial intelligence for satellite com-munication: A review,” Intelligent and Converged Netw., vol. 2, no. 3, pp. 213–243, 2021.

[10] B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information networks: A survey,” IEEE Internet Things J., vol. 7, no. 1, pp. 33–52, 2019.

[11] S. Han, J. Li, W. Meng, M. Guizani, and S. Sun, “Challenges of physical layer security in a satellite-terrestrial network,” IEEE Netw., 2022. 

[12] M. Manulis, C. P. Bridges, R. Harrison, V. Sekar, and A. Davis, “Cyber security in new space,” Int. J. Inf. Secur., vol. 20, no. 3, pp. 287–311, 2021

[13] P. Tedeschi, S. Sciancalepore, and R. Di Pietro, “Satellite-based com-munications security: A survey on threats, solutions, and research challenges,” arXiv preprint arXiv:2112.11324, 2021.

[14] S. Karapantazis and F. Pavlidou, “Broadband communications via high-altitude platforms: A survey,” IEEE Commun. Surveys Tuts., vol. 7, no. 1, pp. 2–31, 2005.

[15] A. L. Allison, The ITU and managing satellite orbital and spectrum resources in the 21st century. Springer Science & Business, 2014.

[16] R. Scholtz, “The origins of spread-spectrum communications,” IEEE Trans. Commun., vol. 30, no. 5, pp. 822–854, 1982.

[17] R. Huiltberg, F. H. Jean, and M. E. Jones, “Time division access for military communications satellites,” IEEE Trans. Aerosp. Electron. Syst., no. 3, pp. 272–282, 1965.

[18] T. Sekimoto and J. Puente, “A satellite time-division multiple-access experiment,” IEEE Trans. Commun. Technol., vol. 16, no. 4, pp. 581–588, 1968.

[19] O. Gabbard, “Design of a satellite time-division multiple-access burst synchronizer,” IEEE Trans. Commun. Technol., vol. 16, no. 4, pp. 589–596, 1968.

[20] A. Polydoros and C. Weber, “Detection performance considerations for direct-sequence and time-hopping LPI waveforms,” IEEE J. Sel. Areas Commun., vol. 3, no. 5, pp. 727–744, 1985.

[21] A. Bharadwaj and J. K. Townsend, “Evaluation of the covertness of time-hopping impulse radio using a multi-radiometer detection,” in Proc. IEEE MILCOM, vol. 1, 2001, pp. 128–134.

[22] J. Yu and Y. Yao, “Detection performance of time-hopping ultra-wideband lpi waveforms,” in Proc. IEEE/Sarnoff Symp. on Advances in Wired and Wireless Commun., 2005, pp. 137–140.

[23] M. Pursley, “Frequency-hop transmission for satellite packet switching and terrestrial packet radio networks,” IEEE Trans. Inf. Theory, vol. 32, no. 5, pp. 652–667, 1986.

[24] P. Lal, V. Palsule, and K. Ravi, “Applications of frequency hopping spread spectrum techniques: an overview,” IETE Technical Review, vol. 3, no. 5, pp. 210–220, 1986.

[25] K. M. Dostert, “Frequency-hopping spread-spectrum modulation for digital communications over electrical power lines,” IEEE J. Sel. Areas Commun., vol. 8, no. 4, pp. 700–710, 1990.

[26] L. Rong and L. Ruimin, “An anti-jamming improvement strategy for satellite frequency-hopping communication,” in Proc. IEEE Int. Conf. on Wireless Commun. & Signal Processing, 2009, pp. 1–5.

[27] N. C. Beaulieu, W. L. Hopkins, and P. J. McLane, “Interception of frequency-hopped spread-spectrum signals,” IEEE J. Sel. Areas Com-mun., vol. 8, no. 5, pp. 853–870, 1990.

[28] K. Lee and S. Oh, “Detection of fast frequency-hopping signals using dirty template in the frequency domain,” IEEE Wireless Commun. Lett., vol. 8, no. 1, pp. 281–284, 2018.

[29] B. Ning, L. Guan, and H. Huang, “A novel frequency-hopping sequence for covert communication,” IEEE Access, vol. 5, pp. 20 157–20 163, 2017.

[30] D. Borth and M. Pursley, “Analysis of direct-sequence spread-spectrum multiple-access communication over rician fading channels,” IEEE Trans. Commun., vol. 27, no. 10, pp. 1566–1577, 1979.

[31] R. Pickholtz, D. Schilling, and L. Milstein, “Theory of spread-spectrum communications-a tutorial,” IEEE Trans. Commun., vol. 30, no. 5, pp. 855–884, 1982.

[32] E. Chandler and G. Cooper, “Low probability of intercept performance bounds for spread-spectrum systems,” IEEE J. Sel. Areas Commun., vol. 3, no. 5, pp. 706–713, 1985.

[33] R. D. Van Nee, H. S. Misser, and R. Prasad, “Direct-sequence spread spectrum in a shadowed rician fading and land-mobile satellite channel,” IEEE J. Sel. Areas Commun., vol. 10, no. 2, pp. 350–357, 1992.

[34] M. Simon, J. Omura, R. Scholtz, and B. Levitt, Spread spectrum communications handbook. McGraw-Hill Education, 2002.

[35] A. M. Wik and A. L. Lindblad, “A novel LPI concept using filtered spreading codes,” in Proc. IEEE Military Commun. Conf. (MILCOM), vol. 1, McLean, VA, USA, 1996, pp. 90–94.

[36] M. S. Nowak, J. LoCicero, and D. Ucci, “Bandlimited covert data com-munications using zinc waveforms,” in Proc. IEEE Military Commun. Conf. (MILCOM), vol. 2, Anaheim, CA, USA, 2002, pp. 1018–1023.

[37] C. Shih, “Fractionalization of fourier transform,” Opt. Commun., vol. 118, no. 5-6, pp. 495–498, 1995.

[38] L. Mei, X. Sha, and N. Zhang, “The approach to carrier scheme convergence based on 4-weighted fractional fourier transform,” IEEE Commun. Lett., vol. 14, no. 6, pp. 503–505, 2010.

[39] S. Liu, J. Zhang, and Y. Zhang, “Properties of the fractionalization of a fourier transform,” Opt. Commun., vol. 133, no. 1-6, pp. 50–54, 1997.

[40] D. S. Yeung, Q. Ran, E. C. Tsang, and K. L. Teo, “Complete way to fractionalize fourier transform,” Opt. Commun., vol. 230, no. 1-3, pp. 55–57, 2004.

[41] Q. Ran, D. S. Yeung, E. C. Tsang, and Q. Wang, “General multifractional fourier transform method based on the generalized permutation matrix group,” IEEE Trans. Signal Process., vol. 53, no. 1, pp. 83–98, 2004.

[42] Z. Wang, L. Mei, X. Wang, and N. Zhang, “WFRFT precoding for generalized frequency division multiplexing,” in Proc. IEEE WCNC, Doha, Qatar, 2016, pp. 1–6.

[43] L. Mei, X. Sha, and N. Zhang, “Covert communication based on waveform overlay with weighted fractional fourier transform signals,” in Proc. IEEE Int. Conf. on Wireless Commun., Netw. and Information Security, 2010, pp. 472–475.

[44] D. Zhai, X. Da, H. Hu, Y. Liang, R. Xu, and L. Ni, “Satellite anti-interception communication system based on WFRFT and MIMO,” in Proc. IEEE Int. Conf. Commun. Soft. and Netw. (ICCSN), Chengdu, China, 2018, pp. 305–310.

[45] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communi-cation with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, 2013.

[46] P. H. Che, S. Kadhe, M. Bakshi, C. Chan, S. Jaggi, and A. Sprintson, “Reliable, deniable and hidable communication: A quick survey,” in Proc. IEEE Information Theory Workshop (ITW), Hobart, TAS, Aus-tralia, 2014, pp. 227–231.

[47] P. H. Che, M. Bakshi, C. Chan, and S. Jaggi, “Reliable, deniable and hidable communication,” in Proc. Information Theory and Applications (ITA), San Diego, CA, USA, 2014, pp. 1–10.

[48] M. Bloch, “A channel resolvability perspective on stealth communica-tions,” in Proc. IEEE Int. Symp. on Information theory (ISIT), Hong Kong, China, 2015, pp. 2535–2539.

[49] D. Goeckel, B. Bash, S. Guha, and D. Towsley, “Covert communications when the warden does not know the background noise power,” IEEE Commun. Lett., vol. 20, no. 2, pp. 236–239, 2015.

[50] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert communication in the presence of an uninformed jammer,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 6193–6206, 2017.

[51] R. Soltani, D. Goeckel, D. Towsley, B. A. Bash, and S. Guha, “Covert wireless communication with artificial noise generation,” IEEE Trans. Wireless Commun., vol. 17, no. 11, pp. 7252–7267, 2018.

[52] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li, “Achieving covert wireless communications using a full-duplex receiver,” IEEE Trans. Wireless Commun., vol. 17, no. 12, pp. 8517–8530, 2018.

[53] K. Huang, H. Deng, and H. Wang, “Jamming aided covert communica-tion with multiple receivers,” IEEE Trans. Wireless Commun., vol. 20, no. 7, pp. 4480–4494, 2021.

[54] Z. Li, X. Liao, J. Shi, L. Li, and P. Xiao, “MD-GAN based UAV trajectory and power optimization for cognitive covert communications,” IEEE Internet Things J., 2021.

[55] M. Wang, W. Yang, L. Xu, X. Lv, Y. Chen, Q. Wu, and B. Liu, “Covert wireless communication on beidou short message communication,” in China Satellite Navigation Conference. Springer, 2022, pp. 310–320.

[56] S. Yan, B. He, X. Zhou, Y. Cong, and A. L. Swindlehurst, “Delay-intolerant covert communications with either fixed or random transmit power,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 1, pp. 129–140, 2018.

[57] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint optimization of a UAV’s trajectory and transmit power for covert communications,” IEEE Trans. Signal Process., vol. 67, no. 16, pp. 4276–4290, 2019.

[58] L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, and D. Chen, “Covert communication in downlink noma systems with random transmit power,” IEEE Wireless Commun. Lett., vol. 9, no. 11, pp. 2000–2004, 2020.

[59] R. Ma, X. Yang, G. Pan, X. Guan, Y. Zhang, and W. Yang, “Covert communications with channel inversion power control in the finite blocklength regime,” IEEE Wireless Commun. Lett., vol. 10, no. 4, pp. 835–839, 2020.

[60] B. Kang, N. Ye, and B. Qi, “Comparisons on covert performances of noma in satellite internet of things,” in Proc. IEEE Comput., Commun. and IoT Appl. (ComComAp), Shenzhen, China.

[61] A. Sheikholeslami, M. Ghaderi, D. Towsley, B. A. Bash, S. Guha, and D. Goeckel, “Multi-hop routing in covert wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 3656–3669, 2018.

[62] H. Wang, Y. Zhang, X. Zhang, and Z. Li, “Secrecy and covert com-munications against UAV surveillance via multi-hop networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 389–401, 2019.

[63] H. Wu, Y. Zhang, X. Liao, Y. Shen, and X. Jiang, “On covert throughput performance of two-way relay covert wireless communications,” Wirel. Netw., vol. 26, no. 5, pp. 3275–3289, 2020.

[64] C. Gao, B. Yang, X. Jiang, H. Inamura, and M. Fukushi, “Covert communication in relay-assisted IoT systems,” IEEE Internet Things J., vol. 8, no. 8, pp. 6313–6323, 2021.

[65] R. Sun, B. Yang, S. Ma, Y. Shen, and X. Jiang, “Covert rate maximiza-tion in wireless full-duplex relaying systems with power control,” IEEE Trans. Commun., vol. 69, no. 9, pp. 6198–6212, 2021.

[66] X. Jiang, Z. Yang, N. Zhao, Y. Chen, Z. Ding, and X. Wang, “Resource allocation and trajectory optimization for UAV-Enabled multi-user covert communications,” IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 1989–1994, 2021.

[67] X. Chen, Z. Chang, J. Tang, N. Zhao, and D. Niyato, “UAV-aided multi-antenna covert communication against multiple wardens,” in Proc. IEEE International Conference on Communications (ICC), Montreal, QC, Canada, 2021, pp. 1–6.

[68] H. Du, D. Niyato, Y. Xie, Y. Cheng, J. Kang, and D. I. Kim, “Perfor-mance analysis and optimization for jammer-aided multi-antenna UAV covert communication,” arXiv preprint arXiv:2202.00973, 2022.

[69] Z. Wu, R. Liu, H. Shuai, S. Zhu, and C. Li, “Covert performance for integrated satellite multiple terrestrial relay networks with partial relay selection,” Sensors, vol. 22, no. 15, p. 5524, 2022.

[70] T. Zheng, H. Wang, D. W. K. Ng, and J. Yuan, “Multi-antenna covert communications in random wireless networks,” IEEE Trans. Wireless Commun., vol. 18, no. 3, pp. 1974–1987, 2019.

[71] L. Yang, W. Yang, S. Xu, L. Tang, and Z. He, “Achieving covert wireless communications using a full-duplex multi-antenna receiver,” in Proc. IEEE Int. Conf. on Compu. and Commun. (ICCC), 2019, pp. 912–916.

[72] K. Shahzad, X. Zhou, and S. Yan, “Covert wireless communication in presence of a multi-antenna adversary and delay constraints,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12 432–12 436, 2019.

[73] O. Shmuel, A. Cohen, and O. Gurewitz, “Multi-antenna jamming in covert communication,” IEEE Trans. Commun., vol. 69, no. 7, pp. 4644–4658, 2021.

[74] M. V. Jamali and H. Mahdavifar, “Covert millimeter-wave communica-tion: Design strategies and performance analysis,” IEEE Trans. Wireless Commun., 2021.

[75] J. Xu, L. Bai, L. Zhou, D. Liu, J. Wang, and Y. Shi, “Covert downlink mmwave communication for massive MIMO LEO satellite,” in Proc. China Conference on Command and Control. Singapore: Springer, 2022, pp. 653–664.

[76] J. Si, Z. Li, Y. Zhao, J. Cheng, L. Guan, J. Shi, and N. Al-Dhahir, “Covert transmission assisted by intelligent reflecting surface,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5394–5408, 2021.

[77] C. Wu, S. Yan, X. Zhou, R. Chen, and J. Sun, “Intelligent reflecting surface (IRS)-aided covert communication with warden’s statistical CSI,” IEEE Wireless Commun. Lett., vol. 10, no. 7, pp. 1449–1453, 2021.

[78] C. Wang, Z. Li, J. Shi, and D. W. K. Ng, “Intelligent reflecting surface-assisted multi-antenna covert communications: Joint active and passive beamforming optimization,” IEEE Trans. Commun., vol. 69, no. 6, pp. 3984–4000, 2021.

[79] X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, 2022.

[80] J. R. Hampton, “The impact of evaporative ducting on covert commu-nications,” in Proc. IEEE MILCOM, Orlando, FL, USA, 2007, pp. 1–7.

[81] J. Liu and W. Yang, “Secure uav communication against cooperative adaptive eavesdroppers,” Wirel. Netw., vol. 28, no. 3, pp. 1113–1128, 2022.

[82] R. M. Clark, “Perspectives on intelligence collection,” J. of US Intelli-gence Collection, vol. 20, pp. 47–52, 2013.

[83] X. Wu, Y. Shi, W. Meng, X. Ma, and N. Fang, “Specific emitter identification for satellite communication using probabilistic neural networks,” Int. J. Satell. Co. Netw., vol. 37, no. 3, pp. 283–291, 2019.