TY - JOUR
T1 - Codes against online adversaries
T2 - Large alphabets
AU - Dey, Bikash Kumar
AU - Jaggi, Sidharth
AU - Langberg, Michael
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - In this paper, we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x=(x 1,xn) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols xi one at a time and can change up to a p-fraction of them. However, for each symbol x i, the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on xj for j≤ i. This is in contrast to the 'classical' adversarial jammer which may base its decisions on its complete knowledge of {x. More generally, for a delay parameter δin (0,1), we study the scenario in which the jammer's decision on the corruption of xi must depend solely on xj for j≤ i-δn. In this study, the transmitted symbols are assumed to be over a sufficiently large field \BBF. The sender and receiver do not share resources such as common randomness (though the sender is allowed to use stochastic encoding). We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the δ-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of δ , we consider two types of jamming: additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it. We present computationally efficient achievability schemes even against computationally unrestricted jammers.
AB - In this paper, we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x=(x 1,xn) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols xi one at a time and can change up to a p-fraction of them. However, for each symbol x i, the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on xj for j≤ i. This is in contrast to the 'classical' adversarial jammer which may base its decisions on its complete knowledge of {x. More generally, for a delay parameter δin (0,1), we study the scenario in which the jammer's decision on the corruption of xi must depend solely on xj for j≤ i-δn. In this study, the transmitted symbols are assumed to be over a sufficiently large field \BBF. The sender and receiver do not share resources such as common randomness (though the sender is allowed to use stochastic encoding). We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the δ-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of δ , we consider two types of jamming: additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it. We present computationally efficient achievability schemes even against computationally unrestricted jammers.
KW - Arbitrarily varying channels
KW - channel coding
KW - jamming
UR - http://www.scopus.com/inward/record.url?scp=84878157318&partnerID=8YFLogxK
U2 - 10.1109/TIT.2013.2245717
DO - 10.1109/TIT.2013.2245717
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84878157318
SN - 0018-9448
VL - 59
SP - 3304
EP - 3316
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 6
M1 - 6457452
ER -