Byzantine Attacks against Network Coding in Peer to Peer Distributed Storage

被引:3
|
作者
Lima, Luisa [1 ]
Barros, Joao [2 ]
Koetter, Ralf [3 ]
机构
[1] Univ Porto, Fac Ciencias, Inst Telecommun, Dept Comp Sci, Oporto, Portugal
[2] Univ Porto, Fac Engn, Dept Elect & Comp Engn, Inst Telecommun, Oporto, Portugal
[3] Tech Univ Munich, Inst Commun Engn, Munich, Germany
关键词
security; Byzantine; random graph; network coding; distributed storage; peer to peer;
D O I
10.1109/ISIT.2009.5206005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider the impact of Byzantine attackers on peer-to-peer topologies for distributed storage using network coding. First, the problem is formulated as one of data flow in random evolving graphs, in which a data source and a data collector are connected to data keepers who may behave in a Byzantine fashion. We then derive analytical results for the probability of carrying out a successful distributed denial of service attack (that is, collecting contaminated information from the network), as well as the expected number of contaminated nodes at each timestep. Our results show that, even for a small number of Byzantine attackers in the network, the probability of collecting contaminated information is overwhelming, and that the dissemination of information by peers as opposed to a selected subset of nodes in the network increases the probability of contaminated information collection.
引用
收藏
页码:1164 / +
页数:2
相关论文
共 50 条
  • [1] On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks
    Kim, Minji
    Lima, Luisa
    Zhao, Fang
    Barros, Joao
    Medard, Muriel
    Koetter, Ralf
    Kalker, Ton
    Han, Keesook J.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (05) : 692 - 702
  • [2] Secure Network Coding against Wiretapping and Byzantine Attacks
    Qin Guo
    Mingxing Luo
    Lixiang Li
    Yixian Yang
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [3] Secure Network Coding against Wiretapping and Byzantine Attacks
    Guo, Qin
    Luo, Mingxing
    Li, Lixiang
    Yang, Yixian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [4] Peer pressure: Distributed recovery from attacks in peer-to-peer systems
    Keyani, P
    Larson, B
    Senthil, M
    WEB ENGINEERING AND PEER TO PEER COMPUTING, 2002, 2376 : 306 - 320
  • [5] Layered Network Coding and Hierarchical Network Coding for Peer-to-Peer Streaming
    Si, Jingjing
    Zhuang, Bojin
    Cai, Anni
    Cheng, Yinbo
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 139 - 142
  • [6] Echelon:: Peer-to-peer network diagnosis with network coding
    Wu, Chuan
    Li, Baochun
    2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 20 - +
  • [7] BLACKBOX: DISTRIBUTED PEER TO PEER FILE STORAGE AND BACKUP
    Razaque, Abdul
    Almani, Muder
    Rizvi, Syed S.
    2016 ANNUAL CONNECTICUT CONFERENCE ON INDUSTRIAL ELECTRONICS, TECHNOLOGY AND AUTOMATION (CT-IETA), 2016,
  • [8] A Byzantine-Resilient Distributed Peer-to-Peer Energy Management Approach
    Chang, Xinyue
    Xu, Yinliang
    Guo, Qinglai
    Sun, Hongbin
    Chan, Wai Kin
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (01) : 623 - 634
  • [9] Hierarchical protocol for Byzantine agreement in a peer-to-peer overlay network
    Yoshino, H
    Hayashibara, N
    Enokido, T
    Takizawa, M
    SIXTEENTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2005, : 5 - 9
  • [10] Tree Network Coding for Peer-to-Peer Networks
    Vater, Arne
    Schindelhauer, Christian
    Ortolf, Christian
    SPAA '10: PROCEEDINGS OF THE TWENTY-SECOND ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2010, : 114 - 123