• DocumentCode
    80888
  • Title

    Allocation of Network Error Correction Flow to Combat Byzantine Attacks

  • Author

    Zhiqing Xiao ; Yunzhou Li ; Ming Zhao ; Xibin Xu ; Jing Wang

  • Author_Institution
    Dept. of Electron. Eng., Tsinghua Univ., Beijing, China
  • Volume
    63
  • Issue
    7
  • fYear
    2015
  • fDate
    Jul-15
  • Firstpage
    2605
  • Lastpage
    2618
  • Abstract
    This paper studies the allocation of information flows in noiseless, memoryless communication networks in the presence of omniscient Byzantine adversary. In such networks, adversary may maliciously modify some edge-flows, and legitimate users should resort to network error correction strategies to transmit data reliably. Unlike prior papers, which focused on the capacities of the networks, we consider the expense of resources used by the flow. Hereby, this paper uses an optimization problem to define the concept of minimum cost network error correction flows. We provide a necessary and sufficient condition of feasibility of the allocation problem, and derive a cut-set outer bound on the feasible region. Using this cut-set bound, we can find the minimum cost network error correction flow in some instances. Moreover, we also consider the relationship between incoming edge-flows and outgoing edge-flows of a vertex. As for the directed acyclic graphs, we propose an algorithm to allocate the network error correction flow. This algorithm is with polynomial time complexity, and proves to be optimal when recoding at intermediate nodes is forbidden. Additionally, in order to justify the necessity of recoding at intermediate nodes, we analyze the benefit of intermediate recoding. On the one hand, we construct a series of instances to prove that intermediate recoding can bring enormous benefits in some networks. On the other hand, numerical analysis shows that the benefit is modest in small random graphs.
  • Keywords
    directed graphs; error correction codes; network coding; polynomials; byzantine attacks; cut-set outer bound; directed acyclic graphs; edge-flows; information flows; legitimate users; network error correction flow; noiseless memoryless communication networks; omniscient Byzantine adversary; optimization problem; polynomial time complexity; random graphs; Cost function; Error correction; Error correction codes; Network coding; Network topology; Resource management; Adversarial errors; Byzantine adversary; cut-set bound; minimum cost; network error correction; resource allocation;
  • fLanguage
    English
  • Journal_Title
    Communications, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0090-6778
  • Type

    jour

  • DOI
    10.1109/TCOMM.2015.2438811
  • Filename
    7114269