Adversarial Network Coding

被引:10
作者
Ravagnani, Alberto [1 ]
Kschischang, Frank R. [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
瑞士国家科学基金会;
关键词
Network coding; multi-source networks; adversarial models; one-shot capacity; zero-error capacity; compound zero-error capacity; capacity region; ERROR-CORRECTION; CODES; ERASURES;
D O I
10.1109/TIT.2018.2865936
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A combinatorial framework for adversarial network coding is presented. Channels are described by specifying the possible actions that one or more (possibly coordinated) adversaries may take. Upper bounds on three notions of capacity-the one-shot capacity, the zero-error capacity, and the compound zero-error capacity-are obtained for point-to-point channels, and generalized to corresponding capacity regions appropriate for multi-source networks. A key result of this paper is a general method by which bounds on these capacities in point-to-point channels may be ported to networks. This technique is illustrated in detail for Hamming-type channels with multiple adversaries operating on specific coordinates, which correspond, in the context of networks, to multiple adversaries acting on specific network edges. Capacity-achieving coding schemes are described for some of the considered adversarial models.
引用
收藏
页码:198 / 219
页数:22
相关论文
共 35 条
  • [1] Cai N, 2006, COMMUN INF SYST, V6, P37
  • [2] Cormen T. H., 2009, Introduction to algorithms, VThird
  • [4] Multiple-Access Network Information-Flow and Correction Codes
    Dikaliotis, Theodoros K.
    Ho, Tracey
    Jaggi, Sidharth
    Vyetrenko, Svitlana
    Yao, Hongyi
    Effros, Michelle
    Kliewer, Joerg
    Erez, Elona
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (02) : 1067 - 1079
  • [6] Gabidulin E. M., 1985, Problems of Information Transmission, V21, P1
  • [7] Byzantine modification detection in multicast networks with random network coding
    Ho, Tracey
    Leong, Ben
    Koetter, Ralf
    Medard, Muriel
    Effros, Michelle
    Karger, David R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2798 - 2803
  • [8] Huffman WC., 2010, FUNDAMENTALS ERROR C
  • [9] Jafari M, 2009, MOBIHOC S3 09, P21
  • [10] Jaggi S, 2005, 2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, P1455