Core Concepts
A hardware Trojan embedded in a legitimate transmitter can covertly communicate with a rogue receiver by manipulating the pilot symbols, thereby degrading the channel estimation at the legitimate receiver and enabling positive-rate covert communications.
Abstract
The paper investigates a scenario where a hardware Trojan is embedded in a legitimate transmitter, Alice, and aims to establish covert communication with a rogue receiver, Eve, while evading detection by the legitimate receiver, Willie.
The key insights are:
In the channel estimation phase, the Trojan, Tom, carries out a covert pilot scaling attack to corrupt Willie's channel estimation. As long as the scaling parameter ε is small enough, this attack remains undetected by Willie.
In the communication phase, Tom exploits the imperfect channel estimation at Willie to covertly transmit to Eve. By properly choosing the scaling parameter ε and his own transmit power ΛT, Tom can operate in the "linear regime" of covert communications, achieving a positive covert rate.
The authors show that when the pilot detection budget δ1 is positive, Tom can always find ε and ΛT to satisfy the covertness criteria and communicate covertly at a positive rate. However, when δ1 = 0, Tom can only achieve a vanishing covert rate that obeys the "square-root law".
The key enabler for Tom's positive covert rate is his ability to degrade Willie's SINR through the pilot scaling attack, which introduces a residual term in Willie's test statistic that depends on ε and the legitimate transmit power ΛA.
In summary, the paper highlights the vulnerability of wireless systems to hardware Trojans that can exploit the channel estimation process to enable covert communications.
Stats
ε ≤ δ1/√2
τ* < ε^2 α^2_W |h_W|^2 Λ_A + σ^2_W
R_A ≤ log_2(1 + γ_W)
Quotes
"Hardware Trojans, by exploiting the link margins inherent in communication systems, can inflict harm on wireless networks."
"Our results highlight the vulnerability of the channel estimation process in wireless communication systems against hardware Trojans."