Back to Search
Start Over
Counteracting Byzantine adversaries with network coding: An overhead analysis
- Source :
- MILCOM 2008 - 2008 IEEE Military Communications Conference.
- Publication Year :
- 2008
- Publisher :
- IEEE, 2008.
-
Abstract
- Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet generated by a Byzantine attacker can easily contaminate the information to multiple destinations. In this paper, we study the transmission overhead associated with three different schemes for detecting Byzantine adversaries at a node using network coding: end-to-end error correction, packet-based Byzantine detection scheme, and generation-based Byzantine detection scheme. In end-to-end error correction, it is known that we can correct up to the min-cut between the source and destinations. However, if we use Byzantine detection schemes, we can detect polluted data, drop them, and therefore, only transmit valid data. For the dropped data, the destinations perform erasure correction, which is computationally lighter than error correction. We show that, with enough attackers present in the network, Byzantine detection schemes may improve the throughput of the network since we choose to forward only reliable information. When the probability of attack is high, a packet-based detection scheme is the most bandwidth efficient; however, when the probability of attack is low, the overhead involved with signing each packet becomes costly, and the generation-based scheme may be preferred. Finally, we characterize the tradeoff between generation size and overhead of detection in bits as the probability of attack increases in the network.<br />7 pages, 5 figures, MILCOM 2008
- Subjects :
- FOS: Computer and information sciences
021110 strategic, defence & security studies
Computer Science - Cryptography and Security
Computer science
business.industry
Network packet
Information Theory (cs.IT)
Computer Science - Information Theory
0211 other engineering and technologies
020206 networking & telecommunications
Fault tolerance
02 engineering and technology
Public-key cryptography
Quantum Byzantine agreement
Linear network coding
0202 electrical engineering, electronic engineering, information engineering
Erasure
Error detection and correction
business
Cryptography and Security (cs.CR)
Byzantine architecture
Computer network
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- MILCOM 2008 - 2008 IEEE Military Communications Conference
- Accession number :
- edsair.doi.dedup.....d0e1b598ecc64bf35ddb2ad1e3113208