Codes against online adversaries

B. K. Dey, S. Jaggi, M. Langberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x1; : : : ; xn) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols xi one at a time, and can change up to a p-fraction of them. However, for each symbol xi the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on xj for j ≤ i. This is in contrast to the "classical" adversarial jammer which may base its decisions on its complete knowledge of x. More generally, for a delay parameter d ∈ 2 (0; 1), we study the scenario in which the jammer's decision on the corruption of xi must depend solely on xj for j ≤ i dn. In this work, the transmitted symbols are assumed to be over a sufficiently large field F. We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the d-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of d, we consider two types of jamming, additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it.

Original languageEnglish
Title of host publication2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Pages1169-1176
Number of pages8
DOIs
StatePublished - 2009
Event2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009 - Monticello, IL, United States
Duration: 30 Sep 20092 Oct 2009

Publication series

Name2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009

Conference

Conference2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Country/TerritoryUnited States
CityMonticello, IL
Period30/09/092/10/09

Fingerprint

Dive into the research topics of 'Codes against online adversaries'. Together they form a unique fingerprint.

Cite this