• DocumentCode
    715475
  • Title

    Talking reliably, secretly, and efficiently: A “complete” characterization

  • Author

    Qiaosheng Zhang ; Kadhe, Swanand ; Bakshi, Mayank ; Jaggi, Sidharth ; Sprintson, Alex

  • Author_Institution
    Chinese Univ. of Hong Kong, Hong Kong, China
  • fYear
    2015
  • fDate
    April 26 2015-May 1 2015
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    We consider reliable and secure communication of information over a multipath network. A transmitter Alice sends messages to the receiver Bob in the presence of a hidden adversary Calvin. The adversary Calvin can both eavesdrop and jam on (possibly non-identical) subsets of transmission links. The goal is to communicate reliably (intended receiver can understand the messages) and secretly (adversary cannot understand the messages). Two kinds of jamming, additive and overwrite, are considered. Additive jamming corresponds to wireless network model while overwrite jamming corresponds to wired network model and storage systems. The multipath network consists of C parallel links. Calvin can both jam and eavesdrop any zio number of links, can eavesdrop (but not jam) any zi/o number of links, and can jam (but not eavesdrop) any zo/i number of links. We present the first “complete” information-theoretic characterization of maximum achievable rate as a function of the number of links that can be jammed and/or eavesdropped for equal and unequal link capacity multipath networks under additive and overwrite jamming in the large alphabet regime. Our achievability and converse proofs require non-trivial combination of information theoretic and coding theoretic ideas and our achievability schemes are computationally efficient. The PHaSE-Saving techniques1 are used for achievability while a “stochastic” singleton bound is obtained for converse.
  • Keywords
    jamming; network coding; radio networks; telecommunication security; C parallel links; PHaSE-Saving techniques; additive jamming; coding theory; communication security; first complete information-theoretic characterization; hidden adversary Calvin; overwrite jamming; stochastic singleton bound; storage systems; transmission links; unequal link capacity multipath networks; wired network model; wireless network model; Additives; Computer hacking; Computers; Decoding; Jamming; Reliability theory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2015 IEEE
  • Conference_Location
    Jerusalem
  • Print_ISBN
    978-1-4799-5524-4
  • Type

    conf

  • DOI
    10.1109/ITW.2015.7133143
  • Filename
    7133143