Change search
ReferencesLink to record
Permanent link

Direct link
Active adversaries from an information-theoretic perspective: Data modification attacks
KTH, School of Electrical Engineering (EES), Communication Networks. (Networked Systems Security Group)
2014 (English)In: IEEE International Symposium on Information Theory - Proceedings, 2014, 791-795 p.Conference paper (Refereed)
Abstract [en]

We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a 'memoryless' and a 'foreseer' adversary. For both models, the adversaries are placing themselves arbitrarily on the routes, keeping their placement fixed throughout the transmission block. This placement may or may not be known to the transmitter. The adversaries can choose their best modification strategy to increase the error at the legitimate receiver, subject to a maximum distortion constraint. We investigate the communication rates that can be achieved in the presence of the two types of adversaries and the channel (benign) stochastic behavior. For memoryless adversaries, the capacity is derived. Our method is to use the typical set of the anticipated received signal for all possible adversarial strategies (including their best one) in a compound channel that also captures adversarial placement. For the foreseer adversaries, which have enhanced observation capabilities compared to the memoryless ones, we propose a new coding scheme to guarantee resilience, i.e., recovery of the codeword independently of the adversarial (best) choice. We derive an achievable rate and we propose an upper bound on the capacity. We evaluate our general results for specific cases (e.g., binary symbol replacement or erasing attacks), to gain insights.

Place, publisher, year, edition, pages
2014. 791-795 p.
, IEEE International Symposium on Information Theory - Proceedings, ISSN 2157-8095 ; 6874941
Keyword [en]
Stochastic systems, Transmitters, Active adversary, Communication path, Communication rate, Data modification, Received signals, Reliable communication, Stochastic behavior, Transmission block, Information theory
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
URN: urn:nbn:se:kth:diva-167552DOI: 10.1109/ISIT.2014.6874941ISI: 000346496100157ScopusID: 2-s2.0-84906539599ISBN: 9781479951864OAI: diva2:818223
2014 IEEE International Symposium on Information Theory, ISIT 2014, 29 June 2014 through 4 July 2014, Honolulu, HI

QC 20150608

Available from: 2015-06-08 Created: 2015-05-22 Last updated: 2015-06-08Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Papadimitratos, Panagiotis
By organisation
Communication Networks
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 4 hits
ReferencesLink to record
Permanent link

Direct link