TY - GEN
T1 - Gaussian diamond network with adversarial jammer
AU - Mohajer, Soheil
AU - Diggavi, Suhas N.
PY - 2010
Y1 - 2010
N2 - In this paper we consider communication from a source to a destination over a wireless network with the help of a set of authenticated relays. We focus on a special diamond network, where there is no direct link between the source and the destination; however the relay nodes help to establish such a communication. There is a single adversarial node which injects signals to disrupt this communication. Like the source, it can only influence the destination through the relays. We develop an approximate characterization of the reliable transmission rate in the presence of such an adversary. This is done by developing an outer bound, and demonstrating an achievable strategy that is within a constant number of bits of the outer bound, regardless of the channel values. A deterministic version of the same problem is solved exactly, yielding insights which are used in the approximate characterization.
AB - In this paper we consider communication from a source to a destination over a wireless network with the help of a set of authenticated relays. We focus on a special diamond network, where there is no direct link between the source and the destination; however the relay nodes help to establish such a communication. There is a single adversarial node which injects signals to disrupt this communication. Like the source, it can only influence the destination through the relays. We develop an approximate characterization of the reliable transmission rate in the presence of such an adversary. This is done by developing an outer bound, and demonstrating an achievable strategy that is within a constant number of bits of the outer bound, regardless of the channel values. A deterministic version of the same problem is solved exactly, yielding insights which are used in the approximate characterization.
UR - http://www.scopus.com/inward/record.url?scp=80051952545&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80051952545&partnerID=8YFLogxK
U2 - 10.1109/CIG.2010.5592650
DO - 10.1109/CIG.2010.5592650
M3 - Conference contribution
AN - SCOPUS:80051952545
SN - 9781424482641
T3 - 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings
BT - 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings
T2 - 2010 IEEE Information Theory Workshop, ITW 2010
Y2 - 30 August 2010 through 3 September 2010
ER -