Resilient network codes in the presence of eavesdropping Byzantine adversaries

S. Jaggi, M. Langberg
{"title":"Resilient network codes in the presence of eavesdropping Byzantine adversaries","authors":"S. Jaggi, M. Langberg","doi":"10.1109/ISIT.2007.4557281","DOIUrl":null,"url":null,"abstract":"Network coding can substantially improve network throughput and performance. However, these codes have a major drawback if the network contains hidden malicious nodes that can eavesdrop on transmissions and inject fake information. In this scenario, even a small amount of information injected by a single malicious hidden node could mix with and contaminate much of the information inside the network, causing a decoding error. We improve on previous work by providing a polynomial- time, rate-optimal distributed network code design that functions even in the presence of a Byzantine adversary with substantial eavesdropping capabilities. As long as the sum of the adversary's jamming rate Zo and his eavesdropping rate ZI is less than the network capacity C, (Zo + ZI < C), our codes attain the optimal rate of C - Zo. The network codes we design are information-theoretically secure and assume no knowledge of network topology. Prior to transmission, no honest node knows the location or strength of the adversary. In our code design, interior nodes are oblivious to the presence of adversaries and implement a classical low- complexity distributed network code design; only the source and destination need to be changed. Finally, our codes work for both wired and wireless networks.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Symposium on Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2007.4557281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

Abstract

Network coding can substantially improve network throughput and performance. However, these codes have a major drawback if the network contains hidden malicious nodes that can eavesdrop on transmissions and inject fake information. In this scenario, even a small amount of information injected by a single malicious hidden node could mix with and contaminate much of the information inside the network, causing a decoding error. We improve on previous work by providing a polynomial- time, rate-optimal distributed network code design that functions even in the presence of a Byzantine adversary with substantial eavesdropping capabilities. As long as the sum of the adversary's jamming rate Zo and his eavesdropping rate ZI is less than the network capacity C, (Zo + ZI < C), our codes attain the optimal rate of C - Zo. The network codes we design are information-theoretically secure and assume no knowledge of network topology. Prior to transmission, no honest node knows the location or strength of the adversary. In our code design, interior nodes are oblivious to the presence of adversaries and implement a classical low- complexity distributed network code design; only the source and destination need to be changed. Finally, our codes work for both wired and wireless networks.
弹性网络代码在窃听拜占庭对手的存在
网络编码可以大大提高网络吞吐量和性能。然而,如果网络中包含隐藏的恶意节点,这些代码有一个主要缺点,这些节点可以窃听传输并注入虚假信息。在这种情况下,即使单个恶意隐藏节点注入的少量信息也可能与网络内的大部分信息混合并污染,从而导致解码错误。我们改进了以前的工作,提供了一个多项式时间,速率最优的分布式网络代码设计,即使在具有大量窃听能力的拜占庭对手存在的情况下也能正常工作。只要对手的干扰率Zo和窃听率ZI的总和小于网络容量C, (Zo + ZI < C),我们的编码就能达到C - Zo的最优速率。我们设计的网络代码在理论上是信息安全的,并且不需要了解网络拓扑结构。在传输之前,没有一个诚实的节点知道对手的位置或实力。在我们的代码设计中,内部节点忽略了对手的存在,实现了经典的低复杂度分布式网络代码设计;只需要更改源和目标。最后,我们的代码适用于有线和无线网络。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信