Loading…

Codes against online adversaries

In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (xi,..., x n ) symbol-by-symbol over a communication channel. The adversarial j...

Full description

Saved in:
Bibliographic Details
Main Authors: Dey, B.K., Jaggi, S., Langberg, M.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1176
container_issue
container_start_page 1169
container_title
container_volume
creator Dey, B.K.
Jaggi, S.
Langberg, M.
description In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (xi,..., x n ) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x t one at a time, and can change up to a p-fraction of them. However, for each symbol x t the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on Xj for j ¿ i. This is in contrast to the ¿classical¿ adversarial jammer which may base its decisions on its complete knowledge of x. More generally, for a delay parameter d ¿ (0,1), we study the scenario in which the jammer's decision on the corruption of Xi must depend solely on xj for j ¿ i - dn. In this work, the transmitted symbols are assumed to be over a sufficiently large field F. We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the d-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of d, we consider two types of jamming, additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it.
doi_str_mv 10.1109/ALLERTON.2009.5394553
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5394553</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5394553</ieee_id><sourcerecordid>5394553</sourcerecordid><originalsourceid>FETCH-LOGICAL-i222t-e26e8cb3655f282dab7cc8cf1d81cbbaba73225cf5e2a1d394e19efa0fe65dc03</originalsourceid><addsrcrecordid>eNpVj8FKAzEURSMiKHW-QIT5gRmTl7yZZFmGqoXBgtR1eUleJFKnMimCf2_Bbryby9lczhXiXslWKekeluO4et1uXlqQ0rWonUHUF6JyvVUGjEHbK3P5j2V_LapSPuQpBsFpdSPq4RC51PROeSrH-jDt88Q1xW-eC82Zy624SrQvXJ17Id4eV9vhuRk3T-thOTYZAI4NQ8c2eN0hJrAQyfch2JBUtCp4T556DYAhIQOpeNJl5TiRTNxhDFIvxN3fbmbm3decP2n-2Z1_6V-pKEHZ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Codes against online adversaries</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dey, B.K. ; Jaggi, S. ; Langberg, M.</creator><creatorcontrib>Dey, B.K. ; Jaggi, S. ; Langberg, M.</creatorcontrib><description>In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (xi,..., x n ) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x t one at a time, and can change up to a p-fraction of them. However, for each symbol x t the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on Xj for j ¿ i. This is in contrast to the ¿classical¿ adversarial jammer which may base its decisions on its complete knowledge of x. More generally, for a delay parameter d ¿ (0,1), we study the scenario in which the jammer's decision on the corruption of Xi must depend solely on xj for j ¿ i - dn. In this work, the transmitted symbols are assumed to be over a sufficiently large field F. We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the d-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of d, we consider two types of jamming, additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it.</description><identifier>ISBN: 9781424458707</identifier><identifier>ISBN: 1424458706</identifier><identifier>EISBN: 9781424458714</identifier><identifier>EISBN: 1424458714</identifier><identifier>DOI: 10.1109/ALLERTON.2009.5394553</identifier><language>eng</language><publisher>IEEE</publisher><subject>Additives ; Communication channels ; Decoding ; Delay ; Displays ; Galois fields ; Jamming ; Reed-Solomon codes</subject><ispartof>2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009, p.1169-1176</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5394553$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5394553$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dey, B.K.</creatorcontrib><creatorcontrib>Jaggi, S.</creatorcontrib><creatorcontrib>Langberg, M.</creatorcontrib><title>Codes against online adversaries</title><title>2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)</title><addtitle>ALLERTON</addtitle><description>In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (xi,..., x n ) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x t one at a time, and can change up to a p-fraction of them. However, for each symbol x t the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on Xj for j ¿ i. This is in contrast to the ¿classical¿ adversarial jammer which may base its decisions on its complete knowledge of x. More generally, for a delay parameter d ¿ (0,1), we study the scenario in which the jammer's decision on the corruption of Xi must depend solely on xj for j ¿ i - dn. In this work, the transmitted symbols are assumed to be over a sufficiently large field F. We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the d-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of d, we consider two types of jamming, additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it.</description><subject>Additives</subject><subject>Communication channels</subject><subject>Decoding</subject><subject>Delay</subject><subject>Displays</subject><subject>Galois fields</subject><subject>Jamming</subject><subject>Reed-Solomon codes</subject><isbn>9781424458707</isbn><isbn>1424458706</isbn><isbn>9781424458714</isbn><isbn>1424458714</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVj8FKAzEURSMiKHW-QIT5gRmTl7yZZFmGqoXBgtR1eUleJFKnMimCf2_Bbryby9lczhXiXslWKekeluO4et1uXlqQ0rWonUHUF6JyvVUGjEHbK3P5j2V_LapSPuQpBsFpdSPq4RC51PROeSrH-jDt88Q1xW-eC82Zy624SrQvXJ17Id4eV9vhuRk3T-thOTYZAI4NQ8c2eN0hJrAQyfch2JBUtCp4T556DYAhIQOpeNJl5TiRTNxhDFIvxN3fbmbm3decP2n-2Z1_6V-pKEHZ</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Dey, B.K.</creator><creator>Jaggi, S.</creator><creator>Langberg, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20090101</creationdate><title>Codes against online adversaries</title><author>Dey, B.K. ; Jaggi, S. ; Langberg, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i222t-e26e8cb3655f282dab7cc8cf1d81cbbaba73225cf5e2a1d394e19efa0fe65dc03</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Additives</topic><topic>Communication channels</topic><topic>Decoding</topic><topic>Delay</topic><topic>Displays</topic><topic>Galois fields</topic><topic>Jamming</topic><topic>Reed-Solomon codes</topic><toplevel>online_resources</toplevel><creatorcontrib>Dey, B.K.</creatorcontrib><creatorcontrib>Jaggi, S.</creatorcontrib><creatorcontrib>Langberg, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dey, B.K.</au><au>Jaggi, S.</au><au>Langberg, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Codes against online adversaries</atitle><btitle>2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)</btitle><stitle>ALLERTON</stitle><date>2009-01-01</date><risdate>2009</risdate><spage>1169</spage><epage>1176</epage><pages>1169-1176</pages><isbn>9781424458707</isbn><isbn>1424458706</isbn><eisbn>9781424458714</eisbn><eisbn>1424458714</eisbn><abstract>In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (xi,..., x n ) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x t one at a time, and can change up to a p-fraction of them. However, for each symbol x t the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on Xj for j ¿ i. This is in contrast to the ¿classical¿ adversarial jammer which may base its decisions on its complete knowledge of x. More generally, for a delay parameter d ¿ (0,1), we study the scenario in which the jammer's decision on the corruption of Xi must depend solely on xj for j ¿ i - dn. In this work, the transmitted symbols are assumed to be over a sufficiently large field F. We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the d-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of d, we consider two types of jamming, additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it.</abstract><pub>IEEE</pub><doi>10.1109/ALLERTON.2009.5394553</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424458707
ispartof 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009, p.1169-1176
issn
language eng
recordid cdi_ieee_primary_5394553
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Additives
Communication channels
Decoding
Delay
Displays
Galois fields
Jamming
Reed-Solomon codes
title Codes against online adversaries
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T09%3A00%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Codes%20against%20online%20adversaries&rft.btitle=2009%2047th%20Annual%20Allerton%20Conference%20on%20Communication,%20Control,%20and%20Computing%20(Allerton)&rft.au=Dey,%20B.K.&rft.date=2009-01-01&rft.spage=1169&rft.epage=1176&rft.pages=1169-1176&rft.isbn=9781424458707&rft.isbn_list=1424458706&rft_id=info:doi/10.1109/ALLERTON.2009.5394553&rft.eisbn=9781424458714&rft.eisbn_list=1424458714&rft_dat=%3Cieee_6IE%3E5394553%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i222t-e26e8cb3655f282dab7cc8cf1d81cbbaba73225cf5e2a1d394e19efa0fe65dc03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5394553&rfr_iscdi=true