TY - GEN
T1 - Capacity of a Binary Channel with a Time-Bounded Adversary
AU - Ying, Mingjun
AU - Sarpkaya, Fatih Berkay
AU - Bakirtas, Serhat
AU - Erkip, Elza
AU - Rappaport, Theodore S.
AU - Rangan, Sundeep
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This paper addresses the challenge of ensuring reliable communication over binary input memoryless channel under the influence of a time-bounded adversary. The adversary can arbitrarily overwrite a fraction δ of the received symbols. This model can be used for intermittent hardware errors or adversarial attacks in the receiver processing. The worst-case adversarial capacity is derived using infinite shared randomness to enable coordinated interleaving against the adversary. It is shown that the capacity can be achieved simply with a random interleaver along with a thresholded log-likelihood ratio (LLR) decoder, which can be readily implemented on top of most standard decoder architectures in use in practical systems today. We show that the worst-case adversary targets highly reliable bits to maximize disruption. Simulations are presented on AWGN channels with M-QAM modulation for both the theoretical capacity as well as the practical capacity with LDPC codes with the proposed thresholded LLR method.
AB - This paper addresses the challenge of ensuring reliable communication over binary input memoryless channel under the influence of a time-bounded adversary. The adversary can arbitrarily overwrite a fraction δ of the received symbols. This model can be used for intermittent hardware errors or adversarial attacks in the receiver processing. The worst-case adversarial capacity is derived using infinite shared randomness to enable coordinated interleaving against the adversary. It is shown that the capacity can be achieved simply with a random interleaver along with a thresholded log-likelihood ratio (LLR) decoder, which can be readily implemented on top of most standard decoder architectures in use in practical systems today. We show that the worst-case adversary targets highly reliable bits to maximize disruption. Simulations are presented on AWGN channels with M-QAM modulation for both the theoretical capacity as well as the practical capacity with LDPC codes with the proposed thresholded LLR method.
KW - Adversarial capacity
KW - LLR thresholding
KW - Minimax optimality
KW - Random interleaving
KW - Shared randomness
KW - Time-bounded adversary
UR - http://www.scopus.com/inward/record.url?scp=105002685787&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=105002685787&partnerID=8YFLogxK
U2 - 10.1109/IEEECONF60004.2024.10942906
DO - 10.1109/IEEECONF60004.2024.10942906
M3 - Conference contribution
AN - SCOPUS:105002685787
T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers
SP - 801
EP - 805
BT - Conference Record of the 58th Asilomar Conference on Signals, Systems and Computers, ACSSC 2024
A2 - Matthews, Michael B.
PB - IEEE Computer Society
T2 - 58th Asilomar Conference on Signals, Systems and Computers, ACSSC 2024
Y2 - 27 October 2024 through 30 October 2024
ER -