Network error correction coding for time-varying adversarial errors in a unicast network

被引:0
作者
Guo, Wangmei [1 ]
He, Dan [1 ]
Cai, Ning [2 ]
机构
[1] Xidian Univ, Xian 710071, Shaanxi, Peoples R China
[2] ShanghaiTech Univ, Shanghai 201210, Peoples R China
来源
2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2018年
基金
中国国家自然科学基金;
关键词
network error correction; network coding; stochastic code; time-varying attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a unicast network with an adversary who is able to attack a proportion of edges, which is no more than p for 0 < p < 1. Based on the knowledge of the adversary, three cases of attacks are considered: 1) the adversary knows nothing about the source message; 2) the adversary knows the source message but does not know the transmitted codeword; 3) the adversary knows the transmitted codeword. Two classes of code schemes, deterministic code and stochastic code, are designed to assure reliable transmission against the adversarial attack. It is concluded that stochastic code does not provide any more benefit than the deterministic code against the attacking cases 1 and 3. However, when the attacking case 2 is considered, stochastic code would achieve a higher capacity than the deterministic code.
引用
收藏
页码:836 / 840
页数:5
相关论文
共 10 条
  • [1] [Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
  • [2] Chen ZT, 2016, IEEE INT SYMP INFO, P915
  • [3] Codes Against Online Adversaries: Large Alphabets
    Dey, Bikash Kumar
    Jaggi, Sidharth
    Langberg, Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (06) : 3304 - 3316
  • [4] A random linear network coding approach to multicast
    Ho, Tracey
    Medard, Muriel
    Koetter, Ralf
    Karger, David R.
    Effros, Michelle
    Shi, Jun
    Leong, Ben
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) : 4413 - 4430
  • [5] Resilient network coding in the presence of Byzantine adversaries
    Jaggi, Sidharth
    Langberg, Michael
    Katti, Sachin
    Ho, Tracey
    Katabi, Dina
    Medard, Muriel
    Effros, Michelle
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2596 - 2603
  • [6] Kadhe S, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS)
  • [7] Coding for errors and erasures in random network coding
    Koetter, Ralf
    Kschischang, Frank R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) : 3579 - 3591
  • [8] Linear network coding
    Li, SYR
    Yeung, RW
    Cai, N
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) : 371 - 381
  • [9] Qiwen Wang, 2011, IEEE Information Theory Workshop (ITW 2011), P498, DOI 10.1109/ITW.2011.6089511
  • [10] Yeung RW, 2006, COMMUN INF SYST, V6, P19