Contact:
Marcus Greferath
School of Math. Sciences
University College Dublin
Belfield, Dublin 4, Ireland
Phone:
+353-1-716-2588 (UCD)
+353-85-153-0951 (mobile)

Joachim Rosenthal
Institut of Mathematics
University of Zurich
Winterthurerstrasse 190
8057 Zurich, Switzerland
Phone:
+41-44-63 55884 (office)

ITW 2010 Dublin
IEEE Information Theory Workshop
Dublin, August 30 - September 3, 2010




Channel uncertainty

Fri 03 Sep, 09.55-13.05, Room 1

Invited session
Organizers: Navin Kashyap and Michael Langberg

Part I: Point-to-Point Communication

Rudolf Ahlswede
Every channel with time structure has a capacity sequence

Fri 03 Sep, 09.55-10.20, Room 1

Anand D. Sarwate
Coding against myopic adversaries

Abstract: A variant on the arbitrarily varying channel (AVC) is proposed in which the jammer is allowed to base its actions on a noisy version of the transmitted codeword. It is shown via a random coding argument that the capacity is the minimum over all discrete memoryless channels (DMCs) that can be induced by memoryless strategies of the adversary. This generalizes two existing models in the AVC literature: the standard AVC in which the jammer does not know the channel input, and the AVC in which the jammer knows the channel input exactly.
Fri 03 Sep, 10.20-10.45, Room 1

Adam Smith
What can cryptography do for coding theory?

Fri 03 Sep, 10.45-11.10, Room 1

Ofer Shayevitz, Yuval Kochman
Estimation-aware coding

Fri 03 Sep, 11.10-11.35, Room 1


Part II: Network Communication and Coding

Sidharth Jaggi, Morteza Alamgir
Network error-correction via obfuscated coding

Fri 03 Sep, 11.50-12.15, Room 1

MinJi Kim, Muriel Médard, and João Barros
A Multi-hop Multi-source Algebraic Watchdog

Abstract: In our previous work ('An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, we focused on a two-hop network, and presented a graphical model to understand the inference process by which nodes police their downstream neighbors and to compute the probabilities of misdetection and false detection.
In this paper, we extend the Algebraic Watchdog to a more general network setting, and propose a protocol in which we can establish trust in coded systems in a distributed manner. We develop a graphical model to detect the presence of an adversarial node downstream within a general two-hop network. The structure of the graphical model (a trellis) lends itself to well-known algorithms, such as Viterbi algorithm, that can compute the probabilities of misdetection and false detection. Using this as a building block, we generalize our scheme to multi-hop networks. We show analytically that as long as the min-cut is not dominated by the Byzantine adversaries, upstream nodes can monitor downstream neighbors and allow reliable communication with certain probability. Finally, we present preliminary simulation results that support our analysis.
Fri 03 Sep, 12.15-12.40, Room 1

Michael Langberg
Succinct fault tolerant network representations

Fri 03 Sep, 12.40-13.05, Room 1

Back to previous page

Return to conference mainpage



Copyright 2009 Claude Shannon Institute. Contact shannon@ucd.ie