On locating Byzantine attackers

被引:0
作者
Siavoshani, Mahdi Jafari [1 ]
Fragouli, Christina [1 ]
Diggavi, Suhas [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
来源
2008 FOURTH WORKSHOP ON NETWORK CODING, THEORY, AND APPLICATIONS: NETCOD 2008, PROCEEDINGS | 2008年
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We examine networks that employ network coding and are subject to Byzantine attacks. We assume that an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 10 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]   Performance and microbial diversity of a trickle-bed air biofilter under interchanging contaminants [J].
Cai, Z ;
Kim, D ;
Sorial, GA ;
Saikaly, R ;
Zein, MM ;
Oerther, DB .
ENGINEERING IN LIFE SCIENCES, 2006, 6 (01) :37-42
[3]  
HO T, 2004, ISIT JUN
[4]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430
[5]  
JAFARISIAVOSHAN.M, 2007, ACM SIGCOMM WORKSH I
[6]  
JAFARISIAVOSHAN.M, 2007, ITW JUL, P17
[7]   Resilient network coding in the presence of Byzantine adversaries [J].
Jaggi, S. ;
Langberg, M. ;
Katti, S. ;
Ho, I. ;
Katabi, D. ;
Medard, M. .
INFOCOM 2007, VOLS 1-5, 2007, :616-624
[8]  
KOTTER R, 2007, ISIT JUN
[9]  
Yeung RW, 2006, COMMUN INF SYST, V6, P19
[10]  
ZHANT Z, 2006, ITW OCT