TY - GEN

T1 - On generalized active attacks by causal adversaries in networks

AU - Kosut, Oliver

AU - Kao, Li Wei

PY - 2014/12/1

Y1 - 2014/12/1

N2 - Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.

AB - Active attacks are studied on noise-free graphical multicast networks. A malicious adversary may enter the network and arbitrarily corrupt transmissions. A very general model is adopted for the scope of attack: a collection of sets of edges is specified, and the adversary may control any one set of edges in this collection. The adversary is assumed to be omniscient but causal, such that the adversary is forced to decide on transmissions before knowing random choices by the honest nodes. Four main results are presented. First, a precise characterization of whether any positive rate can be achieved. Second, a simple erasure upper bound. Third, an achievable bound wherein random hashes are generated and distributed, so that nodes in the network can filter out adversarial corruption. Finally, an example network is presented that has capacity strictly between the general upper and lower bounds.

UR - http://www.scopus.com/inward/record.url?scp=84929353222&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84929353222&partnerID=8YFLogxK

U2 - 10.1109/ITW.2014.6970830

DO - 10.1109/ITW.2014.6970830

M3 - Conference contribution

AN - SCOPUS:84929353222

T3 - 2014 IEEE Information Theory Workshop, ITW 2014

SP - 247

EP - 251

BT - 2014 IEEE Information Theory Workshop, ITW 2014

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 2014 IEEE Information Theory Workshop, ITW 2014

Y2 - 2 November 2014 through 5 November 2014

ER -