This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Utilizing Pulse Pileup Effect in Development of Robust Low-SNR Covert Communication Links

Alexei V. Nikitin Nonlinear LLC
Wamego, Kansas, USA
E-mail: avn@nonlinearcorp.com
   Ruslan L. Davidchack Dept. of Mathematics, U. of Leicester
Leicester, UK
E-mail: rld8@leicester.ac.uk
Abstract

In contrast to other spread-spectrum techniques, wideband pulse trains with relatively low pulse arrival rates may be considered unsuitable for covert communications. The high crest factor of such trains can be extremely burdensome for the transmitter hardware, and it makes the pulse trains easily detectable even at very low signal-to-noise ratios. In addition, it may appear that sharing the wideband channel by multiple users would require explicit allocation of the pulse arrival times for each sub-channel, which would be impractical in most cases. On the other hand, messaging by wideband pulse trains has many appealing features. Among those are the ease of synchronous as well as asynchronous pulse detection, and on-the-fly channel reconfigurability (e.g. changing the spreading factor). Favorably, the crest factor of a pulse train, as well as its apparent temporal and amplitude structure, can be easily, and reversibly, controlled by simple linear filtering. For example, a transmitted pulse train can be made statistically indistinguishable from the Gaussian component of the channel noise (e.g. the thermal noise) observed in the same spectral band, while the received signal will be the designed high-crest-factor wideband pulse train. In this paper, we utilize the so-called pulse pileup effect to perform such reversible control of the pulse train structure, enabling a wider use of this approach for synthesis of robust low-SNR covert communication links. We place a particular focus on the synchronous pulse detection in the receiver, that provides a better utilization of the channel spectrum.

Index Terms:
Covert communications, hard-to-intercept communications, low-power communications, intermittently nonlinear filtering, physical layer, pileup effect, steganography.
Refer to caption
Figure 1: Using pulse trains for low-SNR communications: Large-TBP pulse shaping (i) “hides” pulse train, obscuring its temporal and amplitude structure, and (ii) reduces its PAPR, making signal suitable for transmission. In receiver, pulse train is restored by matched large-TBP filtering. High PAPR of restored pulse train enables low-SNR messaging. To make link more robust to outlier interference and to increase apparent SNR, analog-to-digital conversion in receiver can be combined with intermittently nonlinear filtering.

I Introduction

The additive white Gaussian noise (AWGN) capacity CC of a channel operating in the power-limited regime (i.e. when the received signal-to-noise ratio (SNR) is small, SNR0{\rm SNR}\ll 0\,dB) can be expressed as CP¯/(N0ln2)C\approx\bar{P}/(N_{0}\,\ln 2), where P¯\bar{P} is the average received power and N0N_{0} is the power spectral density (PSD) of the noise. This capacity is linear in power and insensitive to bandwidth and, therefore, by spreading the average transmitted power of the information-carrying signal over a large frequency band, the average PSD of the signal could be made much smaller than the PSD of the noise. This would “hide” the signal in the channel noise, making the transmission covert and insensitive to narrowband interference.

One of the common ways to achieve such “spreading” is frequency-hopping spread spectrum (FHSS) [1]. This technique is widely used, for example, in legacy military equipment for low-probability-of-intercept (LPI) communications. However, using frequency hopping for covert communications is nearly obsolete today, since modern wideband software-defined radio (SDR) receivers can capture all of the hops and put them back together (J. E. Gilley, personal communication, Feb. 9, 2020).

Another common and widely used spread-spectrum modulation technique is direct-sequence spread spectrum (DSSS) [2]. In DSSS, the narrow-band information-carrying signal of a given power is modulated by a wider-band, unit-power pseudorandom signal known as a spreading sequence. This results in a signal with the same total power but a larger bandwidth, and thus a smaller PSD. After demodulation (“de-spreading”) in the receiver, the original information-carrying signal is restored. However, such demodulation requires a precise synchronization, which is perhaps the most difficult and expensive aspect of a DSSS receiver design. Also, while de-spreading cannot be performed without the knowledge of the spreading sequence by the receiver, the spreading code by itself may not be usable to secure the channel. For example, linear spreading codes are easily decipherable once a short sequential set of chips from the sequence is known. To improve security, it would be desirable to perform a “code hopping” in a manner akin to the frequency hopping. However, synchronization can be an extremely slow process for pseudorandom sequences, especially for large spreading waveforms (long codes), and thus such DSSS code hopping may be difficult to realize in practice.

In this paper, we explore an alternative spread-spectrum approach that, among other appealing features, significantly simplifies and speeds up synchronization and enables on-the-fly link reconfigurability that combines the benefits of both DSSS and FHSS. A simplified explanation of this approach can be given as follows.

In the power-limited regime, we would normally use binary coding and modulation (e.g. binary phase-shift keying (BPSK) or quadrature phase-shift keying (QPSK)) for the narrow-band information-carrying signal, and this signal will be significantly oversampled to enable wideband spreading. Thus an idealized narrow-band information-carrying signal that is to be “spread” can be viewed as a discrete-level signal that is a linear combination of analog Heaviside unit step functions [3] delayed by multiples of the bit duration. Such a signal would have a limited bandwidth and a finite power. Since the derivative of the Heaviside unit step function is the Dirac δ\delta-function [4], the derivative of this idealized signal will be a “pulse train” that is a linear combination of Dirac δ\delta-functions. This pulse train will contain all the information encoded in the discrete-level signal, and it will have infinitely wide bandwidth and infinitely large power. Both the bandwidth and the power can then be reduced to the desired levels by filtering the pulse train with a lowpass filter. If the time-bandwidth product (TBP) of the filter is sufficiently small so that the pulses in the filtered pulse train do not overlap, these pulses will still contain all the intended information.

On the one hand, converting a narrow-band signal into a wideband pulse train has an apparent appeal of no need for “de-spreading”: One can simply obtain samples at the peaks of the pulses to obtain all the information encoded in the signal. On the other hand, at first glance such a pulse train is not suitable for practical communication systems, and especially for covert communications. Indeed, let us consider a pulse train with a given average pulse rate and power. The average PSD of this train can be made arbitrary small, since it is inversely proportional to the bandwidth. However, the peak-to-average power ratio (PAPR) of such a train would be proportional to the bandwidth, making the wideband signal extremely impulsive (super-Gaussian). First, such high crest factor of the pulse train puts a serious burden on the transmitter hardware, potentially making this burden prohibitive (e.g. for PAPR>30{\rm PAPR}>30\,dB). Secondly, the high-PAPR structure of a pulse train makes it easily detectable by simple thresholding in the time domain, seemingly making it unsuitable for covert communications. Thirdly, it may appear that sharing the wideband channel by multiple users would require explicit allocation of the pulse arrival times for each sub-channel, which would be impractical in most cases.

Favorably, the temporal and amplitude structure of a pulse train is modifiable by linear filtering, and such filtering can convert a high-PAPR train into a low-PAPR signal, and vice versa. Therefore, such PAPR-modifying filtering enables us to use pulse trains for low-SNR covert communications. As illustrated in Fig. 1, large-TBP pulse shaping in the transmitter can “hide” the pulse train, obscuring its temporal and amplitude structure. It also reduces the PAPR of the signal, making it suitable for transmission. In the receiver, the distinct structure of the pulse train is restored by matched large-TBP filtering, and the high PAPR of the restored pulse train enables low-SNR messaging. To make such a link more robust to outlier interference and to increase the apparent SNR, analog-to-digital conversion in the receiver can be combined with intermittently nonlinear filtering (INF) [5, 6].

Refer to caption
Figure 2: Illustration of pileup effect: When “width” of pulses becomes greater than distance between them, pulses begin to overlap and interfere with each other. For pulses with same spectral content, PSDs of pulse sequences are identical, yet their temporal and amplitude structures are substantially different.

The focus of the rest of the paper is on the key components of such a link, and on the synchronous pulse detection in particular. Some of the additional aspects of this approach, such as asynchronous detection, multi-layer and multi-user configurations, and applications for physical-layer steganography and “friendly jamming” are outlined in [7].

II PAPR Control Utility of Pileup Effect

A pulse train p(t)p(t) is simply a sum of pulses with the same shape (impulse response) w(t)w(t), same or different amplitudes aka_{k}, and distinct arrival times tkt_{k}: p(t)=kakw(ttk)p(t)=\sum_{k}a_{k}w(t-t_{k}). When the width of the pulses in a train becomes greater than the distance between them, the pulses begin to overlap and interfere with each other. This is illustrated in Fig. 2: For the same arrival times, the pulses in the sequence consisting of the narrow pulses w(t)w(t) remain separate, while the wider (more “spread out”) pulses g(t)g(t) are “piling up on top of each other.” In this example, w(t)w(t) and g(t)g(t) have the same spectral content, and thus the PSDs of the pulse sequences are identical. However, the “pileup effect” causes the temporal and amplitude structures of these sequences to be substantially different. For a random pulse train, when the ratio of the bandwidth and the pulse arrival rate becomes significantly smaller than the TBP of a pulse, the pileup effect causes the resulting signal to become effectively Gaussian [8, e.g.], making it impossible to distinguish between the individual pulses.

Indeed, let p^(t)\hat{p}(t) be an “ideal” pulse train: p^(t)=kakδ(ttk)\hat{p}(t)=\sum_{k}a_{k}\delta(t-t_{k}), where δ(x)\delta(x) is the Dirac δ\delta-function [4]. The moving average of this ideal train in a boxcar window of width 2T2T can be represented by the convolution integral

p¯(t)=dsθ(t+T)θ(tT)2Tp^(ts),\overline{p}(t)=\int_{-\infty}^{\infty}\!\!{\mathrm{d}}{s}\,\frac{\theta(t\!+\!T)-\theta(t\!-\!T)}{2T}\,\hat{p}(t\!-\!s)\,, (1)

where θ(x)\theta(x) is the Heaviside unit step function [3]. At any given time tit_{i}, the value of p¯(ti)\overline{p}(t_{i}) is proportional to the sum of aka_{k} for the pulses that occur within the interval [tiT,ti+T][t_{i}\!-\!T,t_{i}\!+\!T]. Then, if the amplitudes aka_{k} and/or the interarrival times tk+1tkt_{k+1}-t_{k} are independent and identically distributed (i.i.d.) random variables with finite mean and variance, it follows from the Central Limit Theorem [9, e.g.] that the distribution of p¯(ti)\overline{p}(t_{i}) approaches Gaussian for a sufficiently large interval [T,T][-T,T].

If we replace the boxcar weighting function in (1) with an arbitrary moving window w(t)w(t), then (1) becomes a weighted moving average

p(t)=dsw(t)p^(ts)=(p^w)(t)=kakw(ttk),p(t)=\int_{-\infty}^{\infty}\!\!{\mathrm{d}}{s}\,w(t)\,\hat{p}(t\!-\!s)=(\hat{p}\!\ast\!w)(t)=\sum_{k}a_{k}w(t-t_{k})\,, (2)

which is a “real” pulse train with the impulse response w(t)w(t). If w(t)w(t) is normalized so that dsw(s)=1\int_{-\infty}^{\infty}{\mathrm{d}}{s}\,w(s)=1, w(t)w(t) is an averaging (i.e. lowpass) filter. Then, if w(t)w(t) has both the bandwidth and the TBP similar to that of the boxcar pulse of width 2T2T, the distribution of p(ti)p(t_{i}) would be similar to that of p¯(ti)\overline{p}(t_{i}) (e.g. Gaussian for a sufficiently large TT).

II-A PAPR Control by Large-TBP Pulse Shaping

There are various ways to define the “time duration” and the “bandwidth” of a pulse. This can lead to a significant ambiguity in the definitions of the TBPs, especially for filters with complicated temporal structures and/or frequency responses. However, in the context of a PAPR control function of the pileup effect, our main concern is the change in the TBP that occurs only due to the change in the temporal structure of a filter, without the respective change in its spectral content. For a single pulse w(t)w(t), its PAPR can be expressed as

PAPRw=max(w2(t))1T2T1T1T2dtw2(t),{\rm PAPR}_{w}=\frac{\max\left(w^{2}(t)\right)}{\frac{1}{T_{2}-T_{1}}\int_{T_{1}}^{T_{2}}{\mathrm{d}}{t}\,w^{2}(t)}\,, (3)

where the interval [T1,T2][T_{1},T_{2}] includes the effective time support of w(t)w(t). Then for filters with the same spectral content and the impulse responses w(t)w(t) and g(t)g(t), the ratio of their TBPs can be expressed as the reciprocal of the ratio of their PAPRs,

TBPgTBPw=max(w2(t))max(g2(t))=PAPRwPAPRg,\frac{{\rm TBP}_{g}}{{\rm TBP}_{w}}=\frac{\max\left(w^{2}(t)\right)}{\max\left(g^{2}(t)\right)}=\frac{{\rm PAPR}_{w}}{{\rm PAPR}_{g}}\,, (4)

where the PAPRs are calculated over a sufficiently long time interval that includes the effective time support of both filters. Note that from (4) it follows that, among all possible pulses with the same spectral content, the one with the smallest TBP will contain a dominating large-magnitude peak. Hence any reasonable definition of a finite TBP for a particular filter with a given frequency response allows us to obtain comparable numerical values for the TBPs of all other filters with the same frequency response, regardless of their temporal structures.

Refer to caption
Figure 3: Transmitter waveform is constructed as sum of scaled and time-shifted large-TBP pulses. In receiver, IIR allpass filter recovers small-TBP pulse train.
Refer to caption
Figure 4: Using large-TBP filtering and pileup effect for obfuscation of temporal and amplitude structure of transmitted signal. In transmitter, pulse shaping with large-TBP filter reduces crest factor of pulse train, making it appear as sub-Gaussian or effectively Gaussian. In receiver, signal’s distinct temporal and amplitude structure is restored.

There are multiple ways to construct pulses with identical frequency responses yet significantly different TBPs. For example, given a “seed” small-TBP pulse with finite (FIR) or infinite (IIR) impulse response w(t)w(t), a large-TBP pulse with the same spectral content can be “grown” from w(t)w(t) by applying a sequence of IIR allpass filters that leave the PSD of the seed pulse unmodified [10, e.g.]. Then an FIR filter for pulse shaping in the transmitter can be obtained by (i) “spreading” w(t)w(t) with an IIR allpass filter, (ii) truncating the pulse when it sufficiently decays to zero, and (iii) time-inverting the resulting waveform. Then applying the same IIR allpass filter in the receiver to this waveform will produce the matched filter w(t)w(-t) to the original seed pulse.

In the illustration of Fig. 3, the transmitter waveform is composed as a “piled-up” sum of thus constructed large-TBP pulses, scaled and time-shifted. In the receiver, an IIR allpass filter recovers the underlying high-PAPR pulse train. The seed w(t)w(t) used in this illustration is an FIR root-raised-cosine (RRC) pulse symmetrical around t=0t\!=\!0, and thus (ww)(t)(w\!\ast\!w)(t) is a raised-cosine (RC) pulse. RC pulses are perhaps not the best choice for shaping the pulse trains for communications, since their TBP is only about unity, and pulse shaping with Gaussian or Bessel filters (with TBP2ln(2)/π0.44{\rm TBP}\approx 2\ln(2)/\pi\approx 0.44) may provide a better alternative. In the subsequent simulations and numerical examples, however, we use FIR RC pulses with roll-off factor β=1/2\beta\!=\!1/2 for convenience of their well-defined bandwidth and numerical values associated with their symbol-rate.

Fig. 4 further illustrates how the pileup effect can be used to obscure (e.g. to mimic as Gaussian or sub-Gaussian) a large-PAPR (super-Gaussian) transmitted signal, while fully recovering its distinct temporal and amplitude structure in the receiver. In this example, pulse shaping with a large-TBP filter in the transmitter “hides” the original structure of the pulse train, and the pulses with larger TBPs perform this more effectively. This can be seen in Fig. 4 from both the time-domain traces and the normal probability plots shown in the lower left corner. For a sufficiently large TBP, the distribution of the filtered pulse train with random pulse polarities becomes effectively Gaussian, making it impossible to distinguish between the individual pulses.

III Pulse Trains for Low-SNR Communications

Having demonstrated how the information-carrying pulse train can be made transmittable and covert, we shall discuss how the message can be best recovered in the receiver.

III-A Synchronous Pulse Detection

Let us consider a pulse train consisting of pulses with the bandwidth ΔB\Delta{B} and a small TBP, so that a single large-magnitude peak in a pulse dominates, and assume that the arrival rate {\mathcal{R}} of the pulses is sufficiently small so that pileup is negligible (e.g. 0=12ΔB/TBP{\mathcal{R}}\ll{\mathcal{R}}_{0}\!=\!{\frac{1}{2}}\Delta{B}/{\rm TBP}). When the arrival time of a pulse with the peak magnitude |A||A| is known, the probability of correctly detecting the polarity of this pulse in the presence of additive white Gaussian noise (AWGN) with zero mean and σn2\sigma_{\rm n}^{2} variance can be expressed, using the complementary error function, as 12erfc(|A|σn2){{\frac{1}{2}}\operatorname{erfc}\left(\frac{-|A|}{\sigma_{\rm n}\sqrt{2}}\right)}. Then the pulses with the magnitude |A|>σn2erfc1(2ε){|A|>\sigma_{\rm n}\sqrt{2}\operatorname{erfc}^{-1}(2\varepsilon)} will have a pulse identification error rate smaller than ε\varepsilon. For example, ε1.3×103\varepsilon\lesssim 1.3\!\times\!10^{-3} for |A|3σn|A|\gtrsim 3\sigma_{\rm n}, and ε3.2×105\varepsilon\lesssim 3.2\!\times\!10^{-5} for |A|4σn|A|\gtrsim 4\sigma_{\rm n}.

Refer to caption
Figure 5: PAPR(Np)1.143Np/Ns{{\rm PAPR}(N_{\rm p})\approx 1.143\,N_{\rm p}/N_{\rm s}} for Np/Ns1N_{\rm p}/N_{\rm s}\gg 1 for RC pulses with β=1/2\beta\!=\!1/2.

The pulse rate in a digitally sampled train with regular (periodic) arrival times is =Fs/Np\mathcal{R}=F_{\rm s}/N_{\rm p}, where FsF_{\rm s} is the sampling frequency and NpN_{\rm p} is the number of samples between two adjacent pulses in the train. For {\mathcal{R}} that is sufficiently smaller than 0{\mathcal{R}_{0}}, the PAPR of a train of equal-magnitude pulses with regular arrival times is an increasing function of the number of samples between two adjacent pulses Np{N_{\rm p}}, and is proportional to Np{N_{\rm p}}:

PAPR=PAPR(Np)Npfor largeNp.{\rm PAPR}={\rm PAPR}(N_{\rm p})\propto{N_{\rm p}}\quad\mbox{for large}\quad N_{\rm p}\,. (5)

For example, for raised-cosine (RC) pulses 0(4Ts)1{\mathcal{R}}_{0}\approx(4T_{\rm s})^{-1}, where TsT_{\rm s} is the symbol-period, and a “large NpN_{\rm p}” would mean NpTsFs=Ns{N_{\rm p}\gg T_{\rm s}F_{\rm s}=N_{\rm s}}, where NsN_{\rm s} is the number of samples per symbol-period. As illustrated in Fig. 5, PAPR(Np)1.143Np/Ns{{\rm PAPR}(N_{\rm p})\approx 1.143\,N_{\rm p}/N_{\rm s}} for Np/Ns1N_{\rm p}/N_{\rm s}\gg 1 for RC pulses with roll-off factor β=1/2\beta\!=\!1/2.

From the lower limit on the magnitude of a pulse for a given uncoded bit error rate (BER),

|A|=σnSNR×PAPR>σn2erfc1(2×BER),|A|=\sigma_{\rm n}\sqrt{{\rm SNR}\!\times\!{\rm PAPR}}>\sigma_{\rm n}\sqrt{2}\operatorname{erfc}^{-1}(2\times{\rm BER})\,, (6)

we can then obtain the lower limit on the SNR for a given pulse rate:

SNR(Np;BER)>2[erfc1(2×BER)]2PAPR(Np)Np1,{\rm SNR}(N_{\rm p};{\rm BER})>\frac{2\left[\operatorname{erfc}^{-1}(2\times{\rm BER})\right]^{2}}{{\rm PAPR}(N_{\rm p})}\propto{N_{\rm p}^{-1}}, (7)

or

SNR(Np;BER)1.75[erfc1(2×BER)]2NsNp{\rm SNR}(N_{\rm p};{\rm BER})\gtrsim 1.75\left[\operatorname{erfc}^{-1}(2\times{\rm BER})\right]^{2}\frac{N_{\rm s}}{N_{\rm p}} (8)

for Ns/Np1N_{\rm s}/N_{\rm p}\ll 1 and RC pulses with β=1/2\beta\!=\!1/2. For example, SNR(Np;103)9.6/PAPR(Np)8.4Ns/Np{\rm SNR}(N_{\rm p};10^{-3})\gtrsim 9.6/{\rm PAPR}(N_{\rm p})\approx 8.4\,N_{\rm s}/N_{\rm p}, and SNR(Np;105)18.2/PAPR(Np)15.9Ns/Np{\rm SNR}(N_{\rm p};10^{-5})\gtrsim 18.2/{\rm PAPR}(N_{\rm p})\approx 15.9\,N_{\rm s}/N_{\rm p}.

Refer to caption
Figure 6: AWGN SNR limits for different BER as functions of samples between pulses for raised-cosine pulses with β=1/2\beta\!=\!1/2 and Ns=2N_{\rm s}\!=\!2.

Fig. 6 illustrates the SNR limits for different BER as functions of samples between pulses for RC pulses with β=1/2\beta\!=\!1/2 and Ns=2N_{\rm s}\!=\!2. For example, for the pulses separated by 128 symbol-periods, BER103{\rm BER}\!\lesssim\!10{-3} is achieved for SNR12{\rm SNR}\!\gtrsim\!-12\,dB. For comparison, the AWGN Shannon capacity limit [11] for the bandwidth W=Fs/(2Ns)W\!=\!F_{\rm s}/(2N_{\rm s}), which is the nominal bandwidth of the respective RRC filter, is also shown.

III-B Asynchronous Detection (Pulse Counting)

The asynchronous pulse detection (pulse counting) is discussed in detail in [7], and it relies on synergistic combination of linear and nonlinear filtering. While the rate limit for pulse counting is approximately an order of magnitude lower than for synchronous pulse detection with a similar BER, pulse counting does not rely on any a priori knowledge of pulse arrival times, and can be used as a backbone method for pulse detection. In addition, randomizing the pulse arrival times allows us to more effectively hide the temporal structure of the pulse train, prioritizing security over the data rates. Further, intermittently nonlinear filtering used in combination with synchronous and/or asynchronous pulse detection enables “layering” of pulse trains with significantly different powers, physical-layer steganography, and “friendly jamming” applications. However, since synchronous detection enables much higher data rates for the same SNR, the focus of the next section is on the technique that can be used for synchronous detection of pulses in a train with a periodic structure. In practice, both pulse counting and synchronous pulse detection can be used in combination. For example, given a constraint on the total power of the pulse train, counting of relatively rare, higher-magnitude pulses can be used to establish the timing patterns for synchronization, and synchronous detection of smaller, more frequent pulses can be used for a higher data rate.

Refer to caption
Figure 7: Illustration of synchronization procedure described by (9) through (12). AWGN SNR=20{\rm SNR}=-20\,dB is chosen to be low, and M=32M\!=\!32 respectively high, to emphasize robustness even when BER1/3{\rm BER}\approx 1/3.

IV Synchronization

To enable synchronous detection for a train x[k]x[k] with the pulses separated by NpN_{\rm p} samples, the following modulo power averaging (MPA) function can be constructed as an exponentially decaying average of the instantaneous signal power x2[k]x^{2}[k] in a window of size Np+1N_{\rm p}\!+\!1:

p¯[i;kj1,M]=M1Mp¯[i;kj2,M]\displaystyle\bar{\rm p}[i;k_{j\!-\!1},M]=\frac{M\!-\!1}{M}\,\bar{\rm p}[i;k_{j\!-\!2},M] (9)
+1Mkx2[k]kkj1Npkkj1i=mod(k,Np),\displaystyle+\frac{1}{M}\sum_{k}x^{2}[k]{\llbracket}k\!\geq\!k_{j\!-\!1}\!-\!N_{\rm p}{\rrbracket}{\llbracket}k\!\leq\!k_{j\!-\!1}{\rrbracket}{\llbracket}i\!=\!{\rm mod}(k,N_{\rm p}){\rrbracket}\,,

where kjk_{j} is the sample index of the jj-th pulse, and M>1{M\!>\!1}. In (9), the double square brackets denote the Iverson bracket [12]

P={1ifPis true0otherwise,{\llbracket}P{\rrbracket}=\left\{\begin{array}[]{cc}\!\!1&\mbox{if}\;P\;\mbox{is true}\\ \!\!0&\mbox{otherwise}\end{array}\right., (10)

where PP is a statement that can be true or false. Thus the window kj1Npkkj1k_{j\!-\!1}\!-\!N_{\rm p}\!\leq\!k\!\leq\!k_{j\!-\!1} includes two transmitted pulses, kj2k_{j\!-\!2} and kj1k_{j\!-\!1}, and the index ii in p¯[i;kj1,M]\bar{\rm p}[i;k_{j\!-\!1},M] takes the values i=0,,Np1i=0,\ldots,N_{\rm p}\!-\!1. Note that using exponentially decaying average in (9) would roughly correspond to averaging N=2M1N\!=\!2M\!-\!1 of such windows. The exponentially decaying average, however, has the advantage of lower computational and memory burden, especially for large MM, and faster adaptability to dynamically changing conditions.

For a sufficiently large MM, the peak in p¯[i;kj1,M]\bar{\rm p}[i;k_{j\!-\!1},M] corresponding to the pulses of the pulse train will dominate. Therefore, the index kjk_{j} for sampling of the jj-th pulse can be obtained as

kj=imax+jNp,k_{j}=i_{\rm max}+jN_{\rm p}\,, (11)

where imaxi_{\rm max} is given implicitly by

p¯[imax;kj1,M]=max(p¯[i;kj1,M]).\bar{\rm p}[i_{\rm max};k_{j\!-\!1},M]=\max\left(\bar{\rm p}[i;k_{j\!-\!1},M]\right). (12)

Fig. 7 illustrates this synchronization procedure. The MPA function shown in the right-hand side of the figure is computed according to (9). To emphasize the robustness of this synchronization technique even when the bit error rates are very high, the SNR is chosen to be respectively low (SNR=20{\rm SNR}=-20\,dB, BER1/3{\rm BER}\approx 1/3).

Refer to caption
Figure 8: Calculated and simulated BERs as functions of AWGN SNRs for Np=32N_{\rm p}=32 and Np=256N_{\rm p}=256. For shown SNR ranges, MPA function with M=8{M\!=\!8} provides reliable synchronization. (Compare with SNR limits in Fig. 6.)
Refer to caption
Figure 9: If used in modulo magnitude averaging, “extra point” significantly increases probability of synchronization failure.

For the link shown in Fig. 1, Fig. 8 compares the calculated (dashed lines) and the simulated (dots connected by solid lines) BERs, for the “ideal” synchronization (black dots), and for the synchronization with the MPA function described above. The AWGN noise is added at the receiver input, and the SNR is calculated at the output of the matched filter in the receiver. One can see that for M=2{M\!=\!2} (red dots) the errors in synchronization are relatively high, which increases the overall BER, but the MPA function with M=8{M\!=\!8} (blue dots) provides reliable yet still fast synchronization. The BERs and the respective SNRs in Fig. 8 are presented for the pulse repetition rates indicated by the vertical dashed lines in Fig. 6.

IV-A Modulo magnitude averaging

When a pulse train is used for communications rather than, say, radar applications, reliable synchronization may only need to be achievable for relatively low BER, e.g. BER1/10{{\rm BER}\lesssim 1/10}. Then the following modulo magnitude averaging (MMA) function can replace the MPA function in the synchronization procedure, in order to reduce the computational burden by avoiding squaring operations:

a¯[i;kj1,M]=M1Ma¯[i;kj2,M]\displaystyle\bar{\rm a}[i;k_{j\!-\!1},M]=\frac{M\!-\!1}{M}\,\bar{\rm a}[i;k_{j\!-\!2},M] (13)
+1Mk|x|[k]k>kj1Npkkj1i=mod(k,Np).\displaystyle+\frac{1}{M}\sum_{k}|x|[k]{\llbracket}k\!>\!k_{j\!-\!1}\!-\!N_{\rm p}{\rrbracket}{\llbracket}k\!\leq\!k_{j\!-\!1}{\rrbracket}{\llbracket}i\!=\!{\rm mod}(k,N_{\rm p}){\rrbracket}\,.

Note that the window kj1Np<kkj1k_{j\!-\!1}\!-\!N_{\rm p}\!<\!k\!\leq\!k_{j\!-\!1} in (13) includes only the (j1)(j\!-\!1)-th transmitted pulse, instead of two pulses used in (9). The reason behind this is illustrated in Fig. 9, which compares (for AWGN) the MPA function p¯[i;kj1,M]\bar{\rm p}[i;k_{j\!-\!1},M] with the respective squared MMA function a¯2[i;kj,M]\bar{\rm a}^{2}[i;k_{j},M] computed for the window kjNpkkjk_{j}\!-\!N_{\rm p}\!\leq\!k\!\leq\!k_{j} that includes the “extra point” (the (j1)(j\!-\!1)-th pulse). The relatively long averaging (M=64M\!=\!64) is used to reduce the variations in the function values due to noise, and to make the comparison with the levels indicated by the dashed lines more apparent.

When a correct synchronization has already been obtained, and the maxima are “locked” at the correct imaxi_{\rm max} values (black dots connected by solid lines), both the MPA and the MMA functions would adequately maintain the position of their maxima. However, an offset in the synchronization (e.g. by nn points shown in the figure) significantly more unfavorably affects the margin between the extrema at imaxi_{\rm max} and imax+ni_{\rm max}\!+\!n in the MMA function, compared with the MPA function (blue dots connected by solid lines). Thus the “extra point” may cause the “failure to synchronize” even at a relatively high SNR, and it should be removed from the calculation of the MMA function. Then, as illustrated in Fig. 10, for BER1/10{{\rm BER}\lesssim 1/10} synchronization with the MMA function a¯[i;kj1,M]\bar{\rm a}[i;k_{j\!-\!1},M] would be effectively equivalent to synchronization with the MPA function p¯[i;kj1,M]\bar{\rm p}[i;k_{j\!-\!1},M]. When reliable synchronization for larger BERs is desired (e.g. in timing and ranging applications), then the MPA given by (9) should be used.

Refer to caption
Figure 10: For BER smaller than about 10110^{-1}, less computationally expensive modulo magnitude averaging (e.g. given by (13)) can be used for synchronization. Modulo power averaging (with “extra point,” e.g. given by (9)) should be used when reliable synchronization for full BER range is desired.

Conclusion

Gaining control over the temporal and amplitude structures of the signals in the transmitter and the receiver, especially when combined with nonlinear filtering techniques such as INF [7], opens up intriguing opportunities in various spectrum sharing and coexistence applications. For example, as schematically illustrated in Fig. 11, the main message may be transmitted using one of the existing communication protocols (e.g. OFDM), but its temporal and amplitude structure can be obscured by employing a large-TBP filter in the transmitter, e.g., made to be effectively Gaussian. This alone enhances security of the transmission, since the intersymbol interference becomes excessively large and the signal cannot be recovered in the receiver without knowing the pulse shaping filter. Further, a jamming pulse train, disguised as Gaussian by a different large-TBP filter, can be added to the main signal. This jamming signal can have the same spectral content as the main signal, and its power can be sufficiently large (e.g. similar to the main signal) so that the main signal is unrecoverable even if the first pulse shaping filter is known. In the receiver, the jamming pulse train is removed from the mixture by an INF (and decoded, if it itself contains information), enabling the subsequent recovery of the main message without loosing its quality.

Even a simple single-channel link that is the focus of this paper (see Fig. 1) provides appealing practical applications. For example, an existing channel (say, a voice channel in a two-way radio) can be converted into a low-power, lower-rate (say, text) covert channel operating at the same range. This can be accomplished without significant hardware redesign, by modifying only the digital signal processing in both transmitter and the receiver. Alternatively, when transmitted at the original power, such a lower-rate, lower-SNR channel can extend (say, quadruple) the range of the link.

In a broader context, the approach outlined in this paper allows for many practical variations, ranging from simple and easily implementable to more elaborate, highly secure multi-level configurations that would require addressing additional conceptual and implementational challenges.

Refer to caption
Figure 11: Friendly in-band jamming.

Acknowledgment

The authors would like to thank James E. Gilley of BK Technologies, West Melbourne, FL; Arlie Stonestreet  II of Ultra Electronics ICE, Manhattan, KS, and Kyle D. Tidball of Textron Aviation, Wichita, KS, for their valuable suggestions and critical comments. This work was supported in part by Pizzi Inc., Denton, TX 76205 USA.

References

  • [1] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook (Revised Ed.).   USA: McGraw-Hill, Inc., 1994.
  • [2] D. Torrieri, Principles of Spread-Spectrum Communication Systems, 4th ed.   Springer International Publishing, 2018.
  • [3] R. N. Bracewell, The Fourier Transform and Its Applications, 3rd ed.   New York: McGraw-Hill, 2000, ch. “Heaviside’s Unit Step Function, H(x)H(x)”, pp. 61–65.
  • [4] P. A. M. Dirac, The Principles of Quantum Mechanics, 4th ed.   London: Oxford University Press, 1958.
  • [5] A. V. Nikitin and R. L. Davidchack, “Hidden outlier noise and its mitigation,” IEEE Access, vol. 7, 2019.
  • [6] ——, “Complementary intermittently nonlinear filtering for mitigation of hidden outlier interference,” in Proc. IEEE Military Commun. Conf. 2019 (MILCOM 2019), Norfolk, VA, 12-14 Nov. 2019.
  • [7] ——, “Utilizing pileup effect and intermittently nonlinear filtering in synthesis of covert and hard-to-intercept communication links,” preprint, http://arxiv.org/abs/2004.13610, 2020.
  • [8] A. V. Nikitin, “Pulse pileup effects in counting detectors,” PhD thesis, University of Kansas, Lawrence, 1998.
  • [9] A. D. Aleksandrov, A. N. Kolmogorov, and M. A. Lavrent’ev, Eds., Mathematics: Its Content, Methods, and Meaning.   Dover, 1999, unabridged reprint in one volume of the second edition of Mathematics: Its Content, Methods, and Meaning, published in three volumes by The M.I.T. Press, Cambridge, MA, in 1969. Translated from 1956 Russian edition.
  • [10] P. A. Regalia, S. K. Mitra, and P. P. Vaidyanathan, “The digital all-pass filter: A versatile signal processing building block,” Proc. IEEE, vol. 76, no. 1, 1988.
  • [11] C. E. Shannon, “Communication in the presence of noise,” Proc. Institute of Radio Engineers, vol. 37, no. 1, pp. 10–21, Jan. 1949.
  • [12] D. E. Knuth, “Two notes on notation,” American Mathematical Monthly, vol. 99, no. 5, pp. 403–422, May 1992.