Corpus ID: 920532

Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly

@article{Popa2011GoingBP,
  title={Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly},
  author={R. Popa and A. Chiesa and Tural Badirkhanli and M. M{\'e}dard},
  journal={ArXiv},
  year={2011},
  volume={abs/1108.2080}
}
  • R. Popa, A. Chiesa, +1 author M. Médard
  • Published 2011
  • Computer Science
  • ArXiv
  • Network coding achieves optimal throughput in multicast networks. However, throughput optimality relies on the network nodes or routers to code correctly. A Byzantine node may introduce junk packets in the network (thus polluting downstream packets and causing the sinks to receive the wrong data) or may choose coding coecients 
    7 Citations
    Thwarting pollution attacks in network coding for delay tolerant mobile social networks
    Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach
    • 1
    • Highly Influenced
    TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding
    • 27
    • Highly Influenced
    Secure Multi-Source Multicast
    • 9
    • PDF
    An Efficient Edge-Based Authentication for Network Coding against Entropy Attacks
    • Ryo Iguchi, Y. Manabe
    • Computer Science
    • 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)
    • 2014
    • 4
    • PDF
    Research Statement
    • PDF

    References

    SHOWING 1-10 OF 47 REFERENCES
    Byzantine modification detection in multicast networks using randomized network coding
    • 290
    • PDF
    Preventing Pollution Attacks in Multi-Source Network Coding
    • 43
    • Highly Influential
    • PDF
    When Watchdog Meets Coding
    • 43
    • PDF
    Byzantine Modification Detection in Multicast Networks With Random Network Coding
    • 134
    • PDF
    Resilient network coding in the presence of Byzantine adversaries
    • S. Jaggi, M. Langberg, +4 authors M. Effros
    • Computer Science
    • IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
    • 2007
    • 480
    • PDF
    Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac
    • 36
    • PDF
    Nonlinear network coding is necessary to combat general Byzantine attacks
    • O. Kosut, L. Tong, D. Tse
    • Computer Science
    • 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
    • 2009
    • 64
    • PDF
    The benefits of coding over routing in a randomized setting
    • 1,099
    • PDF