Multiple Access Channels with Adversarial Users

被引:0
|
作者
Sangwan, Nara [1 ]
Bakshi, Mayank [2 ]
Dey, Bikash Kurnar [3 ]
Prahliakaran, Vinod M. [1 ]
机构
[1] TIFR, Mumbai, Maharashtra, India
[2] CUHK, Hong Kong, Peoples R China
[3] Indian Inst Technol, Mumbai, Maharashtra, India
关键词
multiple access channels; adversary; authentication; authenticated communication; identification; IDENTIFICATION; AUTHENTICATION; CAPACITY;
D O I
10.1109/isit.2019.8849729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study authenticated communication over two-user multiple access channels (MAC) where one of the users is possibly adversarial. When both users behave non-adversarially, we want their messages to be decoded reliably. However, we also want to ensure that an adversarial user cannot cause an undetected error on the other (honest) user's message. We show that the following three-phase scheme is rate-optimal: a standard MAC code is first used to achieve unauthenticated communication; this is followed by two authentication phases where each user authenticates their message treating the other user as a possible adversary. We show that the authentication phases can be very short since this form of authentication itself, when possible, can be achieved for message sets whose size grow doubly exponentially in blocklength. This leads to our result that the authenticated communication capacity region of a discrete memoryless MAC is either zero or the (unauthenticated) MAC capacity region itself. This also, arguably, explains the similar nature of authenticated communication capacity of a discrete memoryless point-to-point adversarial channel recently found by Kosut and Kliewer (ITW, 2018). We also obtain analogous results for additive Gaussian noise channels.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [21] Cognitive Access Algorithms For Multiple Access Channels
    Hu, Yichuan
    Ribeiro, Alejandro
    2013 IEEE 14TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2013, : 120 - 124
  • [22] Random Multiple Access With Hierarchical Users
    Heydaryan, Faeze
    Luo, Jie
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (10) : 6622 - 6633
  • [23] Throughput analysis in wireless networks with multiple users and multiple channels
    Arora, Amrinder
    Jin, Fanchun
    Sahin, Gokhan
    Mahmoud, Hosam
    Choi, Hyeong-Ah
    ACTA INFORMATICA, 2006, 43 (03) : 147 - 164
  • [24] Multiple access on narrowband interference channels
    Sari, Hikmet
    Conference Record / IEEE Global Telecommunications Conference, 1998, 6 : 3270 - 3275
  • [25] Multiple Access Gaussian Channels with Feedback
    Freudenberg, J. S.
    Middleton, R. H.
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 3203 - 3208
  • [26] Throughput analysis in wireless networks with multiple users and multiple channels
    Amrinder Arora
    Fanchun Jin
    Gokhan Sahin
    Hosam Mahmoud
    Hyeong-Ah Choi
    Acta Informatica, 2006, 43 : 147 - 164
  • [27] Multiple access on narrowband interference channels
    Sari, H
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 3270 - 3275
  • [28] Homologous Codes for Multiple Access Channels
    Sen, Pinar
    Kim, Young-Han
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (03) : 1549 - 1571
  • [29] Resource allocation in multiple access channels
    ParandehGheibi, Ali
    Eryilmaz, Atilla
    Ozdaglar, Asuman
    Medard, Muriel
    CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 878 - +
  • [30] Playing games with multiple access channels
    Felix Leditzky
    Mohammad A. Alhejji
    Joshua Levin
    Graeme Smith
    Nature Communications, 11