With the advent of 5G and technologies such as cloud computing, Internet-of-Things (IoT), etc, future communication networks will consist of a large number of heterogeneous devices connected together. A critical aspect will be ensuring that communication is not only fast and reliable, but also resilient to malicious attack. As networks increasingly adopt zero-trust principles in their security frameworks, it is important to consider such attacks from a zero-trust perspective. Motivated by this, we consider the problem of communicating a message reliably across a binary erasure channel (BEC(<inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula>)) or a binary symmetric channel (BSC(<inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula>)) against an adversary actively injecting additional erasures or flips at the channel’s input. The adversary can corrupt up to a fraction <inline-formula> <tex-math notation="LaTeX">$p$ </tex-math></inline-formula> of the transmitted bits and knows the transmission scheme agreed upon by the communicating terminals. Further, he has the capability to causally snoop in on both the transmitter and the receiver in real time, i.e., if <inline-formula> <tex-math notation="LaTeX">${\mathbf {x}}=(x_{1},x_{2},\ldots, x_{n})$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">${\mathbf {y}}=(y_{1},y_{2},\ldots, y_{n})$ </tex-math></inline-formula> denote the transmitted and the received codewords respectively, at each time <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>, he knows <inline-formula> <tex-math notation="LaTeX">$(x_{1},x_{2},\ldots, x_{k})$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$(y_{1},y_{2},\ldots, y_{k-1})$ </tex-math></inline-formula>. Using his side-information, the adversary is free to employ any attack that respects his constraint on the number of corruptible bits. We prove an information-theoretic tight capacity characterization as a function of <inline-formula> <tex-math notation="LaTeX">$p$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula> for (i) the erasure adversary with a BEC(<inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula>) and (ii) the bit-flip adversary with a BSC(<inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula>). A unique feature of our models is the compounding of stochastic and adversarial noise sources. Our analysis reveals the worst-case adversarial attacks for both models and proves the existence of coding schemes that achieve rates equal to the capacity for any adversarial attack. In the case of bit-flips, we show that, interestingly, when <inline-formula> <tex-math notation="LaTeX">$p$ </tex-math></inline-formula> is below a certain threshold (that depends on <inline-formula> <tex-math notation="LaTeX">$q$ </tex-math></inline-formula>), the adversary is no worse than an i.i.d. memory-less noise source.
Read full abstract