Byzantine Multiple Access Channels – Part II: Communication With Adversary Identification

09/20/2023
by   Neha Sangwan, et al.
0

We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecting deviations which impede the decoding of the non-deviating user's message. When neither user deviates, correct decoding is required. When one user deviates, the decoder must either output a pair of messages of which the message of the non-deviating user is correct or identify the deviating user. The users and the receiver do not share any randomness. The results include a characterization of the set of channels where communication is feasible, and an inner and outer bound on the capacity region. We also show that whenever the rate region has non-empty interior, the capacity region is same as the capacity region under randomized encoding, where each user shares independent randomness with the receiver. We also give an outer bound for this randomized coding capacity region.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/07/2021

Communication With Adversary Identification in Byzantine Multiple Access Channels

We introduce the problem of determining the identity of a byzantine user...
research
04/26/2019

Byzantine Multiple Access

We study communication over multiple access channels (MAC) where one of ...
research
01/09/2020

List Decoding for Oblivious Arbitrarily Varying MACs: Constrained and Gaussian

This paper provides upper and lower bounds on list sizes of list decodin...
research
03/15/2018

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate co...
research
09/14/2023

Permutation Capacity Region of Adder Multiple-Access Channels

Point-to-point permutation channels are useful models of communication n...
research
06/26/2019

On the Common Randomness Capacity of a Special Class of Two-way Channels

In this paper, we would like to study the common randomness (CR) capacit...
research
09/29/2016

Keyless authentication in the presence of a simultaneously transmitting adversary

If Alice must communicate with Bob over a channel shared with the advers...

Please sign up or login with your details

Forgot password? Click here to reset