Go to:
Logótipo
Você está em: Start > Publications > View > On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks
Map of Premises
Principal
Publication

On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

Title
On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks
Type
Article in International Scientific Journal
Year
2009
Authors
MinJi Kim
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Luisa Lima
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page Without ORCID
Fang Zhao
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Muriel Médard
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Ralf Koetter
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Ton Kalker
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Keesook J. Han
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 28 No. 5
Pages: 692-702
ISSN: 0733-8716
Publisher: IEEE
Indexing
Publicação em ISI Web of Science ISI Web of Science
Publicação em Scopus Scopus
INSPEC
COMPENDEX
Scientific classification
FOS: Engineering and technology > Electrical engineering, Electronic engineering, Information engineering
CORDIS: Technological sciences > Engineering > Electrical engineering
Other information
Abstract (EN): Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the contamination, and saves bandwidth by allowing nodes to detect and drop the contaminated packets. We compare the net cost of our signature scheme with various other Byzantine schemes, and show that when the probability of Byzantine attacks is high, our scheme is the most bandwidth efficient.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Whether and Where to Code in the Wireless Relay Channel (2012)
Article in International Scientific Journal
Xiaomeng Shi; Muriel Médard; Daniel E. Lucani
Underwater Acoustic Networks: Channel Models and Network Coding based Lower Bound to Transmission Power for Multicast (2008)
Article in International Scientific Journal
Daniel E. Lucani; Muriel Médard; Milica Stojanovic
Secure Network Coding for Multi-Resolution Wireless Video Streaming (2010)
Article in International Scientific Journal
L. Lima; S. Gheorghiu; J. Barros; M. Médard; A. L. Toledo
Real-Time Network Coding for Live Streaming in Hyper-Dense WiFi Spaces (2014)
Article in International Scientific Journal
Diogo Ferreira; Rui Costa; João Barros
On the Delay Distribution of Random Linear Network Coding (2011)
Article in International Scientific Journal
Maricica Nistor; Daniel E. Lucani; Tiago Travassos Vieira Vinhoza; Costa, Rui Filipe Mendes Alves da ; João Francisco Cordeiro de Oliveira Barros

See all (9)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-31 at 15:10:38 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book