Network coding with myopic adversaries
Li S, Bitar R, Jaggi S, Zhang Y. 2021. Network coding with myopic adversaries. IEEE Journal on Selected Areas in Information Theory. 2(4), 1108–1119.
Download (ext.)
https://doi.org/10.48550/arXiv.2102.09885
[Preprint]
Journal Article
| Published
| English
Scopus indexed
Author
Li, Sijie;
Bitar, Rawad;
Jaggi, Sidharth;
Zhang, YihanISTA
Department
Abstract
We consider the problem of reliable communication over a network containing a hidden myopic adversary who can eavesdrop on some zro links, jam some zwo links, and do both on some zrw links. We provide the first information-theoretically tight characterization of the optimal rate of communication possible under all possible settings of the tuple (zro,zwo,zrw) by providing a novel coding scheme/analysis for a subset of parameter regimes. In particular, our vanishing-error schemes bypass the Network Singleton Bound (which requires a zero-error recovery criteria) in a certain parameter regime where the capacity had been heretofore open. As a direct corollary we also obtain the capacity of the corresponding problem where information-theoretic secrecy against eavesdropping is required in addition to reliable communication.
Publishing Year
Date Published
2021-12-01
Journal Title
IEEE Journal on Selected Areas in Information Theory
Publisher
IEEE
Acknowledgement
The work of Rawad Bitar was supported in part by the Technical University of Munich—Institute for Advanced Studies, funded by the German Excellence Initiative and European Union Seventh Framework Programme under Grant 291763. The work of Sidharth Jaggi was supported by the Hong Kong UGC GRF under Grant 14304418, Grant 14300617, and Grant 14313116. The work of Yihan Zhang was supported by the European Union’s Horizon 2020 Research and Innovation Programme under Grant 682203-ERC-[Inf-Speed-Tradeoff]. Preliminary results were presented at IEEE International Symposium on information Theory (ISIT).
Volume
2
Issue
4
Page
1108-1119
eISSN
IST-REx-ID
Cite this
Li S, Bitar R, Jaggi S, Zhang Y. Network coding with myopic adversaries. IEEE Journal on Selected Areas in Information Theory. 2021;2(4):1108-1119. doi:10.1109/JSAIT.2021.3126474
Li, S., Bitar, R., Jaggi, S., & Zhang, Y. (2021). Network coding with myopic adversaries. IEEE Journal on Selected Areas in Information Theory. IEEE. https://doi.org/10.1109/JSAIT.2021.3126474
Li, Sijie, Rawad Bitar, Sidharth Jaggi, and Yihan Zhang. “Network Coding with Myopic Adversaries.” IEEE Journal on Selected Areas in Information Theory. IEEE, 2021. https://doi.org/10.1109/JSAIT.2021.3126474.
S. Li, R. Bitar, S. Jaggi, and Y. Zhang, “Network coding with myopic adversaries,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 4. IEEE, pp. 1108–1119, 2021.
Li S, Bitar R, Jaggi S, Zhang Y. 2021. Network coding with myopic adversaries. IEEE Journal on Selected Areas in Information Theory. 2(4), 1108–1119.
Li, Sijie, et al. “Network Coding with Myopic Adversaries.” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 4, IEEE, 2021, pp. 1108–19, doi:10.1109/JSAIT.2021.3126474.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Link(s) to Main File(s)
Access Level
Open Access
Export
Marked PublicationsOpen Data ISTA Research Explorer
Sources
arXiv 2102.09885