We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Stealthy Communication over Adversarially Jammed Multipath Networks

Abstract: We consider the problem of stealthy communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. We consider two types of jamming---erasure jamming and overwrite jamming. We require the communication to be both stealthy and reliable, i.e., the adversary should be unable to detect whether or not meaningful communication is taking place, while the legitimate receiver should reconstruct any potential messages from the transmitter with high probability simultaneously. We provide inner bounds on the stealthy capacities under both adversarial erasure and adversarial overwrite jamming.
Comments: To appear in the IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)
Cite as: arXiv:1805.03095 [cs.IT]
  (or arXiv:1805.03095v3 [cs.IT] for this version)

Submission history

From: Qiaosheng Zhang [view email]
[v1] Tue, 8 May 2018 15:13:10 GMT (88kb,D)
[v2] Sun, 10 Nov 2019 15:10:51 GMT (73kb,D)
[v3] Mon, 31 Aug 2020 06:07:42 GMT (148kb,D)

Link back to: arXiv, form interface, contact.