Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
We consider a non-adaptive controlled sensing sce-nario in which the actions of the decision maker are corrupted by an adversary. The objective of the decision maker is to either detect the presence of the corruption or make a correct decision. Accordingly, the performance of a controlled sensing strategy is measured in terms of the error probability when there is no adversary, denoted PE,0 , and the error probability when an adversary is present, denoted PE,1 . Our main result is Stein-lemma like characterization of the optimal achievable error exponent of PE,0 subject to a constraint on PE,1 . We also illustrate the result with numerical examples.more » « less
-
We study the covert best arm identification problem in which an agent tries to identify the best arm while escaping detection from an adversary. Specifically, the agent should identify the best arm of the bandit with accuracy higher than a predefined requirement as soon as possible and, simultaneously, the adversary’s observations induced by pulling effective arms should remain indistinguishable from the observations obtained when no effective arm is pulled. Our main result is the characterization of the exponent γ, which captures the asymptotic exponential decrease of the confidence level with the square-root of the averaged stopping time.more » « less
-
We consider a communication model in which a transmitter attempts to communicate with a receiver over a state-dependent channel and simultaneously estimate the state using strictly causal noisy state observations. Motivated by joint communication and sensing scenarios in which the physical phenomenon of interest for sensing evolves at a much slower rate than the rate of communication, the state is assumed to remain constant over the duration of the transmission. We derive a complete characterization of the optimal asymptotic trade-off between communication rate and detection-error exponent when coding strategies are open loop. We also show that closed-loop strategies result in strict improvements of the trade-offs.more » « less
-
We consider the problem of covert sequential testing, in which a legitimate party attempts to run a sequential test while escaping detection from an adversary. Specifically, the legitimate party’s decisions should meet prescribed risk constraints and, simultaneously, the adversary’s observations induced by the test should remain indistinguishable from the observations obtained in the absence of a test. Our main result is the characterization of the risk exponent γθ, which captures the asymptotic exponential decrease of the risk with the square-root of the averaged stopping time in the limit of low risk. An example is provided to illustrate how the covertness constraint influences the design of the sequential test.more » « less
-
We consider the problem of authenticating communication over a Myopic Binary Adversarial Channel (MBAC) while maintaining covertness with respect to the myopic adversary. When the main channel between legitimate parties is degraded with respect to the adversary's channel, we show the existence of an integrated scheme that simultaneously exploits secret keys to ensure covertness and authentication. The main technical challenge we address is showing that authentication may be ensured against myopic attacks when using the low-weight codewords mandated by covert communication.more » « less