DocumentCode :
1232580
Title :
Resilient Network Coding in the Presence of Byzantine Adversaries
Author :
Jaggi, Sidharth ; Langberg, Michael ; Katti, Sachin ; Ho, Tracey ; Katabi, Dina ; Médard, Muriel ; Effros, Michelle
Author_Institution :
Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Hong Kong
Volume :
54
Issue :
6
fYear :
2008
fDate :
6/1/2008 12:00:00 AM
Firstpage :
2596
Lastpage :
2603
Abstract :
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam links, our first algorithm achieves a rate of , where is the network capacity. In contrast, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of . Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomial time. Furthermore, only the source and destination need to be modified; nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.
Keywords :
decoding; encoding; telecommunication network topology; telecommunication security; Byzantine adversary; decoding; distributed polynomial-time rate-optimal network codes; eavesdropping capability; network capacity; network topology; resilient network coding; Artificial intelligence; Computer science; Decoding; Error correction codes; Laboratories; Network coding; Network topology; Polynomials; Throughput; Wireless networks; Byzantine adversaries; distributed network error-correcting codes; eavesdroppers; information-theoretically optimal; list decoding; polynomial-time algorithms;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2008.921711
Filename :
4529276
Link To Document :
بازگشت