• DocumentCode
    253298
  • Title

    Efficient pooling against strategic adversary with applications in anonymous and reliable networking

  • Author

    Heidarzadeh, A. ; Shiyu Zhao ; Ho, T. ; Effros, M.

  • Author_Institution
    Dept. of Electr. Eng., California Inst. of Technol., Pasadena, CA, USA
  • fYear
    2014
  • fDate
    Sept. 30 2014-Oct. 3 2014
  • Firstpage
    1317
  • Lastpage
    1324
  • Abstract
    In many anonymous peer-based networking schemes, it is difficult to identify adversarial participants who drop or corrupt packets they are supposed to forward. This paper considers a pooling problem which models the strategic interaction between an adversary and a sender who chooses relay nodes from a pool of participants, a subset of which is controlled by the adversary. The sender adaptively chooses sets of relay nodes over a number of rounds, while the adversary chooses whether or not to attack in rounds where adversarial nodes are chosen. We introduce a class of strategies, called random pooling strategies, over which it is tractable to optimize and whose performance is within a factor of 1.4 of the optimal strategy when the number of adversaries is given.
  • Keywords
    relay networks (telecommunication); telecommunication network reliability; anonymous peer based networking schemes; optimal strategy; random pooling strategies; relay nodes; reliable networking; strategic adversary; strategic interaction; Measurement; Network coding; Peer-to-peer computing; Redundancy; Relays; Throughput; Uncertainty;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on
  • Conference_Location
    Monticello, IL
  • Type

    conf

  • DOI
    10.1109/ALLERTON.2014.7028608
  • Filename
    7028608