Show simple item record

dc.contributor.authorKim, MinJi
dc.contributor.authorMedard, Muriel
dc.contributor.authorBarros, Joao
dc.date.accessioned2012-09-28T17:34:08Z
dc.date.available2012-09-28T17:34:08Z
dc.date.issued2010-09
dc.date.submitted2010-09
dc.identifier.isbn978-1-4244-8263-4
dc.identifier.isbn978-1-4244-8262-7
dc.identifier.urihttp://hdl.handle.net/1721.1/73484
dc.description.abstractIn our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, we focused on a two-hop network, and presented a graphical model to understand the inference process by which nodes police their downstream neighbors and to compute the probabilities of misdetection and false detection. In this paper, we extend the Algebraic Watchdog to a more general network setting, and propose a protocol in which we can establish trust in coded systems in a distributed manner. We develop a graphical model to detect the presence of an adversarial node downstream within a general two-hop network. The structure of the graphical model (a trellis) lends itself to well-known algorithms, such as Viterbi algorithm, that can compute the probabilities of misdetection and false detection. Using this as a building block, we generalize our scheme to multi-hop networks. We show analytically that as long as the min-cut is not dominated by the Byzantine adversaries, upstream nodes can monitor downstream neighbors and allow reliable communication with certain probability. Finally, we present preliminary simulation results that support our analysis.en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/CIG.2010.5592893en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceIEEEen_US
dc.titleA multi-hop multi-source Algebraic Watchdogen_US
dc.typeArticleen_US
dc.identifier.citationKim, MinJi, Muriel Medard, and Joao Barros. “A Multi-hop Multi-source Algebraic Watchdog.” IEEE Information Theory Workshop (ITW), 2010. 1–5. © Copyright 2010 IEEEen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.departmentMassachusetts Institute of Technology. Research Laboratory of Electronicsen_US
dc.contributor.mitauthorKim, MinJi
dc.contributor.mitauthorMedard, Muriel
dc.relation.journalProceedings of the IEEE Information Theory Workshop (ITW), 2010en_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsKim, MinJi; Medard, Muriel; Barros, Joaoen
dc.identifier.orcidhttps://orcid.org/0000-0003-4059-407X
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record