2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282912
|View full text |Cite
|
Sign up to set email alerts
|

Coding against a limited-view adversary: The effect of causality and feedback

Abstract: Abstract-We consider the problem of communication over a multi-path network in the presence of a causal adversary. The limited-view causal adversary is able to eavesdrop on a subset of links and also jam on a potentially overlapping subset of links based on the current and past information. To ensure that the communication takes place reliably and secretly, resilient network codes with necessary redundancy are needed. We study two adversarial models -additive and overwrite jamming and we optionally assume pass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
22
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 17 publications
0
22
0
Order By: Relevance
“…Adaptive Node Linearity attack attack randomness Papers [1], [2], [3], [6] not allowed not allowed not allowed scalar Paper [4] not allowed not allowed allowed non-linear Papers [9], [10], [23], [24], [25] not allowed not allowed allowed scalar Papers [5], [8] not allowed not allowed not allowed scalar Papers [13], [14], [11] not allowed not allowed not allowed vector Papers [12], [35] semi active attack not allowed not allowed vector…”
Section: Activementioning
confidence: 99%
“…Adaptive Node Linearity attack attack randomness Papers [1], [2], [3], [6] not allowed not allowed not allowed scalar Paper [4] not allowed not allowed allowed non-linear Papers [9], [10], [23], [24], [25] not allowed not allowed allowed scalar Papers [5], [8] not allowed not allowed not allowed scalar Papers [13], [14], [11] not allowed not allowed not allowed vector Papers [12], [35] semi active attack not allowed not allowed vector…”
Section: Activementioning
confidence: 99%
“…, [2], [6] give a characterization of the optimal rate-region for reliable (and secure) communication problem over multipath networks. The non-causal adversary setting is considered in [1], and some aspects of the causal adversary setting in [2], [6].…”
mentioning
confidence: 99%
“…The non-causal adversary setting is considered in [1], and some aspects of the causal adversary setting in [2], [6]. The causality constraint on Calvin limits his adversarial power since he can only choose the jamming strategy based on the observations up to the current time slot.…”
mentioning
confidence: 99%
See 2 more Smart Citations