References & Citations
Computer Science > Information Theory
Title: Stealthy Communication over Adversarially Jammed Multipath Networks
(Submitted on 8 May 2018 (v1), last revised 31 Aug 2020 (this version, v3))
Abstract: We consider the problem of stealthy communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. We consider two types of jamming---erasure jamming and overwrite jamming. We require the communication to be both stealthy and reliable, i.e., the adversary should be unable to detect whether or not meaningful communication is taking place, while the legitimate receiver should reconstruct any potential messages from the transmitter with high probability simultaneously. We provide inner bounds on the stealthy capacities under both adversarial erasure and adversarial overwrite jamming.
Submission history
From: Qiaosheng Zhang [view email][v1] Tue, 8 May 2018 15:13:10 GMT (88kb,D)
[v2] Sun, 10 Nov 2019 15:10:51 GMT (73kb,D)
[v3] Mon, 31 Aug 2020 06:07:42 GMT (148kb,D)
Link back to: arXiv, form interface, contact.