2015 10th International Conference on Information, Communications and Signal Processing (ICICS) 2015
DOI: 10.1109/icics.2015.7459910
|View full text |Cite
|
Sign up to set email alerts
|

Reliable and secure communication over adversarial multipath networks: A survey

Abstract: We consider the problem of reliable and information theoretically secure communication over adversarial multi-path networks. The adversary, hidden in the multi-path network, is able to eavesdrop on and jam (possibly distinct) subsets of links. We study three types of problems -communication in the presence of non-causal adversaries, causal adversaries, and causal adversaries with passive feedback to the transmitter. For each of these problems, we further consider two types of jamming -additive jamming (modelin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…As another possibility, we consider the case when the malicious adversary combines eavesdropping and contamination. That is, by contaminating a part of the channels in the network, the malicious adversary might increase the ability of eavesdropping, whereas a parallel network offers no such a possibility [ 12 , 13 , 14 ]. In fact, in arbitrarily varying channel model, noise injection is allowed after Eve’s eavesdropping, but Eve does not eavesdrop the channel after Eve’s noise injection [ 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…As another possibility, we consider the case when the malicious adversary combines eavesdropping and contamination. That is, by contaminating a part of the channels in the network, the malicious adversary might increase the ability of eavesdropping, whereas a parallel network offers no such a possibility [ 12 , 13 , 14 ]. In fact, in arbitrarily varying channel model, noise injection is allowed after Eve’s eavesdropping, but Eve does not eavesdrop the channel after Eve’s noise injection [ 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…As another possibility, we consider the case when the malicious adversary combines eavesdropping and contamination. That is, contaminating a part of the channels, the malicious adversary might improve the ability of eavesdropping while a parallel network offers no such a possibility [12], [13], [14]. In fact, in arbitrarily varying channel model, noise injection is allowed after Eve's eavesdropping, but Eve does not eavesdrop the channel after Eve's noise injection [15], [16], [17], [19] [18, Table I].…”
Section: Introductionmentioning
confidence: 99%