Byzantine Multiple Access Channels – Part I: Reliable Communication

11/23/2022
by   Neha Sangwan, et al.
0

We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. When all users are non-adversarial, we want their messages to be decoded reliably. When a user behaves adversarially, we require that the honest users' messages be decoded reliably. An adversarial user can mount an attack by sending any input into the channel rather than following the protocol. It turns out that the 2-user MAC capacity region follows from the point-to-point Arbitrarily Varying Channel (AVC) capacity. For the 3-user MAC in which at most one user may be malicious, we characterize the capacity region for deterministic codes and randomized codes (where each user shares an independent random secret key with the receiver). These results are then generalized for the k-user MAC where the adversary may control all users in one out of a collection of given subsets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/26/2019

Byzantine Multiple Access

We study communication over multiple access channels (MAC) where one of ...
research
03/15/2018

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate co...
research
01/09/2020

List Decoding for Oblivious Arbitrarily Varying MACs: Constrained and Gaussian

This paper provides upper and lower bounds on list sizes of list decodin...
research
05/03/2022

A Model of Random Multiple Access in Unlicensed Spectrum Systems

We consider a classical multiple access system with a single transmissio...
research
05/07/2021

Communication With Adversary Identification in Byzantine Multiple Access Channels

We introduce the problem of determining the identity of a byzantine user...
research
01/29/2021

Zero-Error Communication over Adversarial MACs

We consider zero-error communication over a two-transmitter deterministi...
research
09/15/2019

Reversible Models for Wireless Multi-Channel Multiple Access

This paper presents a network layer model for a wireless multiple access...

Please sign up or login with your details

Forgot password? Click here to reset