### Abstract

Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.

Original language | English (US) |
---|---|

Title of host publication | 2014 IEEE Information Theory Workshop, ITW 2014 |

Publisher | Institute of Electrical and Electronics Engineers Inc. |

Pages | 247-251 |

Number of pages | 5 |

ISBN (Electronic) | 9781479959990 |

DOIs | |

State | Published - Dec 1 2014 |

Event | 2014 IEEE Information Theory Workshop, ITW 2014 - Hobart, Australia Duration: Nov 2 2014 → Nov 5 2014 |

### Publication series

Name | 2014 IEEE Information Theory Workshop, ITW 2014 |
---|

### Other

Other | 2014 IEEE Information Theory Workshop, ITW 2014 |
---|---|

Country | Australia |

City | Hobart |

Period | 11/2/14 → 11/5/14 |

### ASJC Scopus subject areas

- Information Systems
- Computer Networks and Communications

## Cite this

*2014 IEEE Information Theory Workshop, ITW 2014*(pp. 247-251). [6970830] (2014 IEEE Information Theory Workshop, ITW 2014). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITW.2014.6970830