IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.78
|View full text |Cite
|
Sign up to set email alerts
|

Resilient network coding in the presence of Byzantine adversaries

Abstract: Abstract-Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
365
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 335 publications
(366 citation statements)
references
References 27 publications
1
365
0
Order By: Relevance
“…The scheme provides only a partial solution, as it does not specify any mechanisms to recover from pollution attacks. Another approach [36] provides a distributed protocol to allow the receiver to recover native packets in the presence of pollution attacks. However, given that polluted packets are not filtered out, the throughput that can be achieved by the protocol is upper-bounded by the information-theoretic optimal rate of C − zO, where C is the network capacity from the source to the receiver and zO is the network capacity from the adversary to the receiver.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme provides only a partial solution, as it does not specify any mechanisms to recover from pollution attacks. Another approach [36] provides a distributed protocol to allow the receiver to recover native packets in the presence of pollution attacks. However, given that polluted packets are not filtered out, the throughput that can be achieved by the protocol is upper-bounded by the information-theoretic optimal rate of C − zO, where C is the network capacity from the source to the receiver and zO is the network capacity from the adversary to the receiver.…”
Section: Related Workmentioning
confidence: 99%
“…While these are elegant approaches from a theoretical perspective, they are highly inefficient when applied in practice in wireless networks, even under benign conditions when no attacks take place. Non-cryptographic solutions have also been proposed [35][36][37]. These solutions either provide only a partial solution by detecting the attacks without any response mechanism [35], or add data redundancy at the source, resulting in throughput degradation proportionally to the bandwidth available to the attacker [36,37].…”
Section: Introductionmentioning
confidence: 99%
“…Additional coding schemes that operate under complexity constraints, such as fixed, finite memory at intermediate nodes have also been investigated by Pakzad et al [64] and Lun et al [57]. Non-ergodic failures were studied by Jaggi et al [41] and Ho et al [36], and for unicsat by El Rouayheb et al [73] from which the example shown in Figure 6.4 is taken. Network error correcting codes and bounds have been considered by Yeung and Cai [8,90], Zhang [92] and Yang et al [87,88].…”
Section: Notesmentioning
confidence: 99%
“…The Byzantine modification detection in networks implementing random network coding was studied by Ho et al [35]. The algorithm we presented comes from Jaggi et al [41], where achievable rates and algorithms for other cases can be found as well.…”
Section: Notesmentioning
confidence: 99%
“…They added a simple polynomial hash value into each packet, and a receiver node can detect the presence of a Byzantine attacker with high probability, given that the attacker is unable to design and supply modified packets with complete knowledge of other packets received by other nodes. Jaggi et al [10] proposed a distributed network coding scheme for multicast network that is resilient in the presence of Byzantine adversaries. They view the adversarial nodes as a second source, and judiciously add redundancy at the real source to help the receivers distill out the source information from the received mixtures.…”
Section: Introductionmentioning
confidence: 99%