Skip to main content

Showing 1–7 of 7 results for author: Sangwan, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.11174  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part II: Communication With Adversary Identification

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.03380

  2. arXiv:2304.14166  [pdf, ps, other

    cs.IT

    Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents

    Authors: Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study the Chernoff-Stein exponent of the following binary hypothesis testing problem: Associated with each hypothesis is a set of channels. A transmitter, without knowledge of the hypothesis, chooses the vector of inputs to the channel. Given the hypothesis, from the set associated with the hypothesis, an adversary chooses channels, one for each element of the input vector. Based on the channel… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: This is a slightly edited version of the extended manuscript submitted to ISIT 2023 for review on February 5, 2023; the paper has been accepted for presentation

  3. arXiv:2211.12769  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part I: Reliable Communication

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. The receiver is unaware of the identity of the adversarial users (if any). When all users are non-adversarial, we want their messages to be decoded reliably. When a user behaves adversarially, we require that the honest users' messages be decoded reliably. An adversarial user can mount an attack by… ▽ More

    Submitted 11 September, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: This supercedes Part I of arxiv:1904.11925

  4. arXiv:2205.06073  [pdf, ps, other

    cs.IT cs.CR cs.DC

    Consensus Capacity of Noisy Broadcast Channels

    Authors: Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran

    Abstract: We study communication with consensus over a broadcast channel - the receivers reliably decode the sender's message when the sender is honest, and their decoder outputs agree even if the sender acts maliciously. We characterize the broadcast channels which permit this byzantine consensus and determine their capacity.

    Submitted 16 June, 2022; v1 submitted 12 May, 2022; originally announced May 2022.

  5. arXiv:2105.03420  [pdf, other

    cs.IT

    Compound Arbitrarily Varying Channels

    Authors: Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We propose a communication model, that we call compound arbitrarily varying channels (CAVC), which unifies and generalizes compound channels and arbitrarily varying channels (AVC). A CAVC can be viewed as a noisy channel with a fixed, but unknown, compound-state and an AVC-state which may vary with every channel use. The AVC-state is controlled by an adversary who is aware of the compound-state. W… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  6. arXiv:2105.03380  [pdf, ps, other

    cs.IT

    Communication With Adversary Identification in Byzantine Multiple Access Channels

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  7. arXiv:1904.11925  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over multiple access channels (MAC) where one of the users is possibly adversarial. When all users are non-adversarial, we want their messages to be decoded reliably. When an adversary is present, we consider two different decoding guarantees. In part I, we require that the honest users' messages be decoded reliably. We study the 3-user MAC; 2-user MAC capacity follows fro… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: Part II is an extended version of the paper titled "Multiple Access Channels with Adversarial Users" to be presented at IEEE International Symposium on Information Theory 2019