Resilient network coding in the presence of Byzantine adversaries

被引:143
作者
Jaggi, Sidharth [1 ]
Langberg, Michael [2 ]
Katti, Sachin [3 ]
Ho, Tracey [4 ]
Katabi, Dina [3 ]
Medard, Muriel [5 ]
Effros, Michelle [4 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
[2] Open Univ Israel, Div Comp Sci, IL-43107 Raanana, Israel
[3] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
[4] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
[5] MIT, Lab Informat & Decis Syst, Cambridge, MA 02139 USA
基金
美国国家科学基金会;
关键词
Byzantine adversaries; distributed network error-correcting codes; eavesdroppers; information-theoretically optimal; list decoding; polynomial-time algorithms;
D O I
10.1109/TIT.2008.921711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam z(O) links, our first algorithm achieves a rate of C - 2z(O), where C is the network capacity. In contrast,, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of C - z(O). Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomial time. Furthermore, only the source and destination need to be modified; nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.
引用
收藏
页码:2596 / 2603
页数:8
相关论文
共 32 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] [Anonymous], P IEEE C COMP COMM I
  • [3] [Anonymous], 2003, P ANN ALL C COMM CON
  • [4] [Anonymous], P 40 ANN C INF SCI S
  • [5] [Anonymous], 2006, Network Coding Theory
  • [6] [Anonymous], P 43 ANN ALL C COMM
  • [7] [Anonymous], 2007, NETWORK CODING FUNDA
  • [8] Secure network coding
    Cai, N
    Yeung, RW
    [J]. ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 323 - 323
  • [9] Cai N, 2006, COMMUN INF SYST, V6, P37
  • [10] PERFECTLY SECURE MESSAGE TRANSMISSION
    DOLEV, D
    DWORK, C
    WAARTS, O
    YUNG, M
    [J]. JOURNAL OF THE ACM, 1993, 40 (01) : 17 - 47