A multi-hop multi-source Algebraic Watchdog

Minji Kim, M. Médard, J. Barros
{"title":"A multi-hop multi-source Algebraic Watchdog","authors":"Minji Kim, M. Médard, J. Barros","doi":"10.1109/CIG.2010.5592893","DOIUrl":null,"url":null,"abstract":"In our previous work (‘An Algebraic Watchdog for Wireless Network Coding’), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, we focused on a two-hop network, and presented a graphical model to understand the inference process by which nodes police their downstream neighbors and to compute the probabilities of misdetection and false detection. In this paper, we extend the Algebraic Watchdog to a more general network setting, and propose a protocol in which we can establish trust in coded systems in a distributed manner. We develop a graphical model to detect the presence of an adversarial node downstream within a general two-hop network. The structure of the graphical model (a trellis) lends itself to well-known algorithms, such as Viterbi algorithm, that can compute the probabilities of misdetection and false detection. Using this as a building block, we generalize our scheme to multi-hop networks. We show analytically that as long as the min-cut is not dominated by the Byzantine adversaries, upstream nodes can monitor downstream neighbors and allow reliable communication with certain probability. Finally, we present preliminary simulation results that support our analysis.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Information Theory Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIG.2010.5592893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

In our previous work (‘An Algebraic Watchdog for Wireless Network Coding’), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, we focused on a two-hop network, and presented a graphical model to understand the inference process by which nodes police their downstream neighbors and to compute the probabilities of misdetection and false detection. In this paper, we extend the Algebraic Watchdog to a more general network setting, and propose a protocol in which we can establish trust in coded systems in a distributed manner. We develop a graphical model to detect the presence of an adversarial node downstream within a general two-hop network. The structure of the graphical model (a trellis) lends itself to well-known algorithms, such as Viterbi algorithm, that can compute the probabilities of misdetection and false detection. Using this as a building block, we generalize our scheme to multi-hop networks. We show analytically that as long as the min-cut is not dominated by the Byzantine adversaries, upstream nodes can monitor downstream neighbors and allow reliable communication with certain probability. Finally, we present preliminary simulation results that support our analysis.
多跳多源代数看门狗
在我们之前的工作(“无线网络编码的代数监督”)中,我们提出了一种新方案,其中节点可以概率地检测恶意行为,使用无意中听到的消息在本地监督其下游邻居;因此,提供了一个安全的全局自检网络。作为该系统的第一个构建块,我们专注于一个两跳网络,并提出了一个图形模型来理解节点监督其下游邻居的推理过程,并计算误检和误检的概率。在本文中,我们将代数看门狗扩展到更一般的网络环境中,并提出了一种可以在编码系统中以分布式方式建立信任的协议。我们开发了一个图形模型来检测一般两跳网络中下游对抗节点的存在。图形模型的结构(网格)适合于众所周知的算法,例如Viterbi算法,它可以计算误检测和误检测的概率。以此为基础,我们将该方案推广到多跳网络中。我们分析表明,只要最小切割不被拜占庭对手控制,上游节点就可以监控下游邻居,并以一定的概率允许可靠的通信。最后,我们给出了初步的仿真结果来支持我们的分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信