DocumentCode
715475
Title
Talking reliably, secretly, and efficiently: A “complete” characterization
Author
Qiaosheng Zhang ; Kadhe, Swanand ; Bakshi, Mayank ; Jaggi, Sidharth ; Sprintson, Alex
Author_Institution
Chinese Univ. of Hong Kong, Hong Kong, China
fYear
2015
fDate
April 26 2015-May 1 2015
Firstpage
1
Lastpage
5
Abstract
We consider reliable and secure communication of information over a multipath network. A transmitter Alice sends messages to the receiver Bob in the presence of a hidden adversary Calvin. The adversary Calvin can both eavesdrop and jam on (possibly non-identical) subsets of transmission links. The goal is to communicate reliably (intended receiver can understand the messages) and secretly (adversary cannot understand the messages). Two kinds of jamming, additive and overwrite, are considered. Additive jamming corresponds to wireless network model while overwrite jamming corresponds to wired network model and storage systems. The multipath network consists of C parallel links. Calvin can both jam and eavesdrop any zio number of links, can eavesdrop (but not jam) any zi/o number of links, and can jam (but not eavesdrop) any zo/i number of links. We present the first “complete” information-theoretic characterization of maximum achievable rate as a function of the number of links that can be jammed and/or eavesdropped for equal and unequal link capacity multipath networks under additive and overwrite jamming in the large alphabet regime. Our achievability and converse proofs require non-trivial combination of information theoretic and coding theoretic ideas and our achievability schemes are computationally efficient. The PHaSE-Saving techniques1 are used for achievability while a “stochastic” singleton bound is obtained for converse.
Keywords
jamming; network coding; radio networks; telecommunication security; C parallel links; PHaSE-Saving techniques; additive jamming; coding theory; communication security; first complete information-theoretic characterization; hidden adversary Calvin; overwrite jamming; stochastic singleton bound; storage systems; transmission links; unequal link capacity multipath networks; wired network model; wireless network model; Additives; Computer hacking; Computers; Decoding; Jamming; Reliability theory;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2015 IEEE
Conference_Location
Jerusalem
Print_ISBN
978-1-4799-5524-4
Type
conf
DOI
10.1109/ITW.2015.7133143
Filename
7133143
Link To Document