Title :
Network Court Protocol and Malicious Node Conviction
Author :
Li, Na ; Lee, David
Author_Institution :
Ohio State Univ., Columbus
Abstract :
A network court protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebraic operators. It is shown that the malicious node conviction is equivalent to the uniqueness of the solution of a system of Boolean equations and that is equivalent to the uniqueness of a corresponding satisfiability problem. A linear time algorithm is presented for the conviction process using a graph search.
Keywords :
Boolean algebra; security of data; telecommunication security; transport protocols; Boolean equation; algebraic operator; graph search; linear time algorithm; malicious node conviction; network court protocol; network node; satisfiability problem; Computer science; Decision making; Design engineering; Distributed computing; Equations; Mathematical model; Protocols; System testing; Telecommunication traffic; Traffic control;
Conference_Titel :
Network Protocols, 2007. ICNP 2007. IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-1588-5
Electronic_ISBN :
978-1-4244-1588-5
DOI :
10.1109/ICNP.2007.4375869