TY - JOUR
T1 - Resilient network coding in the presence of byzantine adversaries
AU - Jaggi, Sidharth
AU - Langberg, Michael
AU - Katti, Sachin
AU - Ho, Tracey
AU - Katabi, Dina
AU - Medard, Muriel
AU - Effros, Michelle
PY - 2008/6
Y1 - 2008/6
N2 - Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam zo links, our first algorithm achieves a rate of C- 2zo, where C is the network capacity. In contrast, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of C - zo. Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomial time. Furthermore, only the source and destination need to be modified; nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.
AB - Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam zo links, our first algorithm achieves a rate of C- 2zo, where C is the network capacity. In contrast, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of C - zo. Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomial time. Furthermore, only the source and destination need to be modified; nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.
KW - Byzantine adversaries
KW - Distributed network error-correcting codes
KW - Eavesdroppers
KW - Information-theoretically optimal
KW - List decoding
KW - Polynomial-time algorithms
UR - http://www.scopus.com/inward/record.url?scp=45249101743&partnerID=8YFLogxK
U2 - 10.1109/TIT.2008.921711
DO - 10.1109/TIT.2008.921711
M3 - Article (Academic Journal)
AN - SCOPUS:45249101743
SN - 0018-9448
VL - 54
SP - 2596
EP - 2603
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 6
ER -