dc.contributor.author | Kim, MinJi | |
dc.contributor.author | Medard, Muriel | |
dc.contributor.author | Barros, Joao | |
dc.date.accessioned | 2012-09-28T17:34:08Z | |
dc.date.available | 2012-09-28T17:34:08Z | |
dc.date.issued | 2010-09 | |
dc.date.submitted | 2010-09 | |
dc.identifier.isbn | 978-1-4244-8263-4 | |
dc.identifier.isbn | 978-1-4244-8262-7 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/73484 | |
dc.description.abstract | In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, we focused on a two-hop network, and presented a graphical model to understand the inference process by which nodes police their downstream neighbors and to compute the probabilities of misdetection and false detection. In this paper, we extend the Algebraic Watchdog to a more general network setting, and propose a protocol in which we can establish trust in coded systems in a distributed manner. We develop a graphical model to detect the presence of an adversarial node downstream within a general two-hop network. The structure of the graphical model (a trellis) lends itself to well-known algorithms, such as Viterbi algorithm, that can compute the probabilities of misdetection and false detection. Using this as a building block, we generalize our scheme to multi-hop networks. We show analytically that as long as the min-cut is not dominated by the Byzantine adversaries, upstream nodes can monitor downstream neighbors and allow reliable communication with certain probability. Finally, we present preliminary simulation results that support our analysis. | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/CIG.2010.5592893 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | IEEE | en_US |
dc.title | A multi-hop multi-source Algebraic Watchdog | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Kim, MinJi, Muriel Medard, and Joao Barros. “A Multi-hop Multi-source Algebraic Watchdog.” IEEE Information Theory Workshop (ITW), 2010. 1–5. © Copyright 2010 IEEE | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Research Laboratory of Electronics | en_US |
dc.contributor.mitauthor | Kim, MinJi | |
dc.contributor.mitauthor | Medard, Muriel | |
dc.relation.journal | Proceedings of the IEEE Information Theory Workshop (ITW), 2010 | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Kim, MinJi; Medard, Muriel; Barros, Joao | en |
dc.identifier.orcid | https://orcid.org/0000-0003-4059-407X | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |