DocumentCode
1502964
Title
On counteracting Byzantine attacks in network coded peer-to-peer networks
Author
Kim, MinJi ; Lima, Luísa ; Zhao, Fang ; Barros, João ; Médard, Muriel ; Koetter, Ralf ; Kalker, Ton ; Han, Keesook J.
Author_Institution
Res. Lab. of Electron., Massachusetts Inst. of Technol., Cambridge, MA, USA
Volume
28
Issue
5
fYear
2010
fDate
6/1/2010 12:00:00 AM
Firstpage
692
Lastpage
702
Abstract
Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the contamination, and saves bandwidth by allowing nodes to detect and drop the contaminated packets. We compare the net cost of our signature scheme with various other Byzantine schemes, and show that when the probability of Byzantine attacks is high, our scheme is the most bandwidth efficient.
Keywords
computer network security; network coding; peer-to-peer computing; Byzantine attacks; network code; one hop containment; packet level Byzantine detection; peer-to-peer networks; random linear network coding; signature scheme; Bandwidth; Contamination; Costs; Laboratories; Network coding; Peer to peer computing; Robustness; Secure storage; Telecommunications; Throughput; Byzantine; Network coding; content distribution; distributed storage; peer to peer; security;
fLanguage
English
Journal_Title
Selected Areas in Communications, IEEE Journal on
Publisher
ieee
ISSN
0733-8716
Type
jour
DOI
10.1109/JSAC.2010.100607
Filename
5472425
Link To Document