Show simple item record

Resilient Network Coding In the Presence of Byzantine Adversaries

dc.date.accessioned2006-08-14T12:43:17Z
dc.date.accessioned2018-11-24T10:25:00Z
dc.date.available2006-08-14T12:43:17Z
dc.date.available2018-11-24T10:25:00Z
dc.date.issued2006-08-05
dc.identifier.urihttp://hdl.handle.net/1721.1/33790
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/33790
dc.description.abstractNetwork coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces the first distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam Z links , our first algorithm achieves a rate of C-2Z, where C is the network capacity. In contrast, when the adversary has limited snooping capabilities, we provide algorithms that achieve the higher rate of C-Z.
dc.format.extent9 p.
dc.format.extent347172 bytes
dc.format.extent1152836 bytes
dc.language.isoen_US
dc.subjectCoding Theory
dc.subjectSecurity, trust, & privacy
dc.subjectNetwork Coding
dc.subjectByzantine Adversarie
dc.titleResilient Network Coding In the Presence of Byzantine Adversaries


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2006-053.pdf347.1Kbapplication/pdfView/Open
MIT-CSAIL-TR-2006-053.ps1.152Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record