Communication With Adversary Identification in Byzantine Multiple Access Channels

05/07/2021
by   Neha Sangwan, et al.
0

We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecting deviations which impede the decoding of the non-deviating user's message. When neither user deviates, correct decoding is required. When one user deviates, the decoder must either output a pair of messages of which the message of the non-deviating user is correct or identify the deviating user. The users and the receiver do not share any randomness. The results include a characterization of the set of channels where communication is feasible, and an inner and outer bound on the capacity region.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/20/2023

Byzantine Multiple Access Channels – Part II: Communication With Adversary Identification

We introduce the problem of determining the identity of a byzantine user...
research
11/23/2022

Byzantine Multiple Access Channels – Part I: Reliable Communication

We study communication over a Multiple Access Channel (MAC) where users ...
research
09/29/2016

Keyless authentication in the presence of a simultaneously transmitting adversary

If Alice must communicate with Bob over a channel shared with the advers...
research
04/26/2019

Byzantine Multiple Access

We study communication over multiple access channels (MAC) where one of ...
research
01/09/2020

List Decoding for Oblivious Arbitrarily Varying MACs: Constrained and Gaussian

This paper provides upper and lower bounds on list sizes of list decodin...
research
09/14/2023

Permutation Capacity Region of Adder Multiple-Access Channels

Point-to-point permutation channels are useful models of communication n...
research
01/29/2021

Zero-Error Communication over Adversarial MACs

We consider zero-error communication over a two-transmitter deterministi...

Please sign up or login with your details

Forgot password? Click here to reset