CaltechAUTHORS
  A Caltech Library Service

Byzantine Modification Detection in Multicast Networks With Random Network Coding

Ho, Tracey and Leong, Ben and Koetter, Ralf and Médard, Muriel and Effros, Michelle and Karger, David R. (2008) Byzantine Modification Detection in Multicast Networks With Random Network Coding. IEEE Transactions on Information Theory, 54 (6). pp. 2798-2803. ISSN 0018-9448. http://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08

[img]
Preview
PDF - Published Version
See Usage Policy.

215Kb

Use this Persistent URL to link to this item: http://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08

Abstract

An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each exogenous source packet is augmented with a flexible number of hash symbols that are obtained as a polynomial function of the data symbols. This approach depends only on the adversary not knowing the random coding coefficients of all other packets received by the sink nodes when designing its adversarial packets. We show how the detection probability varies with the overhead (ratio of hash to data symbols), coding field size, and the amount of information unknown to the adversary about the random code.


Item Type:Article
Related URLs:
URLURL TypeDescription
http://dx.doi.org/10.1109/TIT.2008.921894DOIUNSPECIFIED
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4529261&arnumber=4529273PublisherUNSPECIFIED
Additional Information:© Copyright 2008 IEEE. Reprinted with permission. Manuscript received November 24, 2006; revised February 16, 2008. [Date Published in Issue: 2008-05-23] This work was supported in part by AFOSR under Grant 5710001972, the Caltech Lee Center for Networking, and a gift from Microsoft Research. The material in this correspondence was presented in part at the IEEE International Symposium on Information Theory, Chicago, IL, June/July 2004. Communicated by U. Maurer, Guest Editor for Special Issue on Information Theoretic Security. The authors would like to thank the Associate Editor and reviewers for their valuable comments and suggestions.
Funders:
Funding AgencyGrant Number
Air Force Office of Scientific Research5710001972
Lee Center for Advanced Networking, CaltechUNSPECIFIED
Microsoft ResearchUNSPECIFIED
Subject Keywords:Byzantine adversary, multicast, network coding, network error detection
Record Number:CaltechAUTHORS:HOTieeetit08
Persistent URL:http://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08
Usage Policy:No commercial reproduction, distribution, display or performance rights in this work are provided.
ID Code:11451
Collection:CaltechAUTHORS
Deposited By: Archive Administrator
Deposited On:15 Aug 2008 22:30
Last Modified:22 Jun 2016 23:05

Repository Staff Only: item control page