{"title":"弹性网络代码在窃听拜占庭对手的存在","authors":"S. Jaggi, M. Langberg","doi":"10.1109/ISIT.2007.4557281","DOIUrl":null,"url":null,"abstract":"Network coding can substantially improve network throughput and performance. However, these codes have a major drawback if the network contains hidden malicious nodes that can eavesdrop on transmissions and inject fake information. In this scenario, even a small amount of information injected by a single malicious hidden node could mix with and contaminate much of the information inside the network, causing a decoding error. We improve on previous work by providing a polynomial- time, rate-optimal distributed network code design that functions even in the presence of a Byzantine adversary with substantial eavesdropping capabilities. As long as the sum of the adversary's jamming rate Zo and his eavesdropping rate ZI is less than the network capacity C, (Zo + ZI < C), our codes attain the optimal rate of C - Zo. The network codes we design are information-theoretically secure and assume no knowledge of network topology. Prior to transmission, no honest node knows the location or strength of the adversary. In our code design, interior nodes are oblivious to the presence of adversaries and implement a classical low- complexity distributed network code design; only the source and destination need to be changed. Finally, our codes work for both wired and wireless networks.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Resilient network codes in the presence of eavesdropping Byzantine adversaries\",\"authors\":\"S. Jaggi, M. Langberg\",\"doi\":\"10.1109/ISIT.2007.4557281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network coding can substantially improve network throughput and performance. However, these codes have a major drawback if the network contains hidden malicious nodes that can eavesdrop on transmissions and inject fake information. In this scenario, even a small amount of information injected by a single malicious hidden node could mix with and contaminate much of the information inside the network, causing a decoding error. We improve on previous work by providing a polynomial- time, rate-optimal distributed network code design that functions even in the presence of a Byzantine adversary with substantial eavesdropping capabilities. As long as the sum of the adversary's jamming rate Zo and his eavesdropping rate ZI is less than the network capacity C, (Zo + ZI < C), our codes attain the optimal rate of C - Zo. The network codes we design are information-theoretically secure and assume no knowledge of network topology. Prior to transmission, no honest node knows the location or strength of the adversary. In our code design, interior nodes are oblivious to the presence of adversaries and implement a classical low- complexity distributed network code design; only the source and destination need to be changed. Finally, our codes work for both wired and wireless networks.\",\"PeriodicalId\":193467,\"journal\":{\"name\":\"2007 IEEE International Symposium on Information Theory\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Symposium on Information Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT.2007.4557281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Symposium on Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2007.4557281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36
摘要
网络编码可以大大提高网络吞吐量和性能。然而,如果网络中包含隐藏的恶意节点,这些代码有一个主要缺点,这些节点可以窃听传输并注入虚假信息。在这种情况下,即使单个恶意隐藏节点注入的少量信息也可能与网络内的大部分信息混合并污染,从而导致解码错误。我们改进了以前的工作,提供了一个多项式时间,速率最优的分布式网络代码设计,即使在具有大量窃听能力的拜占庭对手存在的情况下也能正常工作。只要对手的干扰率Zo和窃听率ZI的总和小于网络容量C, (Zo + ZI < C),我们的编码就能达到C - Zo的最优速率。我们设计的网络代码在理论上是信息安全的,并且不需要了解网络拓扑结构。在传输之前,没有一个诚实的节点知道对手的位置或实力。在我们的代码设计中,内部节点忽略了对手的存在,实现了经典的低复杂度分布式网络代码设计;只需要更改源和目标。最后,我们的代码适用于有线和无线网络。
Resilient network codes in the presence of eavesdropping Byzantine adversaries
Network coding can substantially improve network throughput and performance. However, these codes have a major drawback if the network contains hidden malicious nodes that can eavesdrop on transmissions and inject fake information. In this scenario, even a small amount of information injected by a single malicious hidden node could mix with and contaminate much of the information inside the network, causing a decoding error. We improve on previous work by providing a polynomial- time, rate-optimal distributed network code design that functions even in the presence of a Byzantine adversary with substantial eavesdropping capabilities. As long as the sum of the adversary's jamming rate Zo and his eavesdropping rate ZI is less than the network capacity C, (Zo + ZI < C), our codes attain the optimal rate of C - Zo. The network codes we design are information-theoretically secure and assume no knowledge of network topology. Prior to transmission, no honest node knows the location or strength of the adversary. In our code design, interior nodes are oblivious to the presence of adversaries and implement a classical low- complexity distributed network code design; only the source and destination need to be changed. Finally, our codes work for both wired and wireless networks.