On generalized active attacks by causal adversaries in networks

Oliver Kosut, Li Wei Kao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.

Original languageEnglish (US)
Title of host publication2014 IEEE Information Theory Workshop, ITW 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages247-251
Number of pages5
ISBN (Electronic)9781479959990
DOIs
StatePublished - Dec 1 2014
Event2014 IEEE Information Theory Workshop, ITW 2014 - Hobart, Australia
Duration: Nov 2 2014Nov 5 2014

Publication series

Name2014 IEEE Information Theory Workshop, ITW 2014

Other

Other2014 IEEE Information Theory Workshop, ITW 2014
Country/TerritoryAustralia
CityHobart
Period11/2/1411/5/14

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Cite this