Skip to main content

Showing 1–12 of 12 results for author: Agarwal, G K

.
  1. arXiv:2006.15998  [pdf, other

    cs.IT cs.CR

    Distortion based Light-weight Security for Cyber-Physical Systems

    Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada

    Abstract: In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.04580

    Journal ref: Transactions in Automatic Control 2020

  2. arXiv:1901.03216  [pdf, other

    cs.IT

    On Secure Capacity of Multiple Unicast Traffic over Separable Networks

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper studies the problem of information theoretic secure communication when a source has private messages to transmit to $m$ destinations, in the presence of a passive adversary who eavesdrops an unknown set of $k$ edges. The information theoretic secure capacity is derived over unit-edge capacity separable networks, for the cases when $k=1$ and $m$ is arbitrary, or $m=3$ and $k$ is arbitrar… ▽ More

    Submitted 10 April, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: Submitted for ITW

  3. arXiv:1901.02787  [pdf, other

    cs.IT

    On Secure Network Coding for Multiple Unicast Traffic

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  4. arXiv:1809.04580  [pdf, other

    cs.IT

    Distorting an Adversary's View in Cyber-Physical Systems

    Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada

    Abstract: In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidat… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

  5. Secure Communication over 1-2-1 Networks

    Authors: Gaurav Kumar Agarwal, Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli

    Abstract: This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are d… ▽ More

    Submitted 12 January, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: Submitted for ISIT 2018

  6. arXiv:1703.00482  [pdf, ps, other

    cs.IT

    A Distortion Based Approach for Protecting Inferences

    Authors: Chi-Yo Tsai, Gaurav Kumar Agarwal, Christina Fragouli, Suhas Diggavi

    Abstract: Eavesdropping attacks in inference systems aim to learn not the raw data, but the system inferences to predict and manipulate system actions. We argue that conventional information security measures can be ambiguous on the adversary's estimation abilities, and adopt instead a distortion based framework that enables to operate over a metric space. We show that requiring perfect distortion-based sec… ▽ More

    Submitted 6 May, 2017; v1 submitted 1 March, 2017; originally announced March 2017.

  7. On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the ultimate gains that cooperation among sources and sinks can bring. Towards these… ▽ More

    Submitted 24 June, 2016; originally announced June 2016.

  8. On Secure Network Coding for Two Unicast Sessions

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper characterizes the secret message capacity of three networks where two unicast sessions share some of the communication resources. Each network consists of erasure channels with state feedback. A passive eavesdropper is assumed to wiretap any one of the links. The capacity achieving schemes as well as the outer bounds are formulated as linear programs. The proposed strategies are then nu… ▽ More

    Submitted 14 May, 2016; v1 submitted 19 January, 2016; originally announced January 2016.

    Comments: Parts of this work were accepted for publication at ISIT 2016

  9. arXiv:1501.06683  [pdf, other

    cs.IT

    Codes With Hierarchical Locality

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: In this paper, we study the notion of {\em codes with hierarchical locality} that is identified as another approach to local recovery from multiple erasures. The well-known class of {\em codes with locality} is said to possess hierarchical locality with a single level. In a {\em code with two-level hierarchical locality}, every symbol is protected by an inner-most local code, and another middle-le… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: 12 pages, submitted to ISIT 2015

  10. arXiv:1501.06662  [pdf, ps, other

    cs.IT

    A High-Rate MSR Code With Polynomial Sub-Packetization Level

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: We present a high-rate $(n,k,d=n-1)$-MSR code with a sub-packetization level that is polynomial in the dimension $k$ of the code. While polynomial sub-packetization level was achieved earlier for vector MDS codes that repair systematic nodes optimally, no such MSR code construction is known. In the low-rate regime (i. e., rates less than one-half), MSR code constructions with a linear sub-packetiz… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: Submitted to ISIT 2015

  11. arXiv:1501.04760  [pdf, other

    cs.IT

    An Alternate Construction of an Access-Optimal Regenerating Code with Optimal Sub-Packetization Level

    Authors: Gaurav Kumar Agarwal, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: Given the scale of today's distributed storage systems, the failure of an individual node is a common phenomenon. Various metrics have been proposed to measure the efficacy of the repair of a failed node, such as the amount of data download needed to repair (also known as the repair bandwidth), the amount of data accessed at the helper nodes, and the number of helper nodes contacted. Clearly, the… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

    Comments: To appear in National Conference on Communications 2015

  12. arXiv:1410.1339  [pdf, other

    physics.ins-det

    Analysis of boundary point (break point) in Linear Delay Model for nanoscale VLSI standard cell library characterization at PVT corners

    Authors: Gaurav Kumar Agarwal

    Abstract: In VLSI chip design flow, Static Timing Analysis (STA) is used for fast and accurate analysis of data-path delay. This process is fast because delay is picked from Look Up Tables (LUT) rather than conventional SPICE simulations. But accuracy of this method depends upon the underlying delay model with which LUT was characterized. Non Linear Delay Model (NLDM) based LUTs are quite common in industri… ▽ More

    Submitted 6 October, 2014; originally announced October 2014.