TY - GEN
T1 - On generalized active attacks by causal adversaries in networks
AU - Kosut, Oliver
AU - Kao, Li Wei
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.
AB - Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.
UR - http://www.scopus.com/inward/record.url?scp=84929353222&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84929353222&partnerID=8YFLogxK
U2 - 10.1109/ITW.2014.6970830
DO - 10.1109/ITW.2014.6970830
M3 - Conference contribution
AN - SCOPUS:84929353222
T3 - 2014 IEEE Information Theory Workshop, ITW 2014
SP - 247
EP - 251
BT - 2014 IEEE Information Theory Workshop, ITW 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Information Theory Workshop, ITW 2014
Y2 - 2 November 2014 through 5 November 2014
ER -