Byzantine modification detection in multicast networks using randomized network coding

Distributed randomized network coding, a robust approach to multicasting in distributed network settings, can be extended to provide Byzantine modification detection without the use of cryptographic functions is presented in this paper.

[1]  Fang Zhao,et al.  Minimum-cost multicast over coded packet networks , 2005, IEEE Transactions on Information Theory.

[2]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[3]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[4]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[5]  Babak Hassibi,et al.  Capacity of wireless erasure networks , 2006, IEEE Transactions on Information Theory.

[6]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[7]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[8]  Yvo Desmedt Unconditionally private and reliable communication in an untrusted network , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..

[9]  Muriel Medard,et al.  On Randomized Network Coding , 2003 .

[10]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[11]  Yoram Moses,et al.  Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds , 1998, SIAM J. Comput..

[12]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[13]  R. Koetter,et al.  The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[14]  Michael K. Reiter,et al.  A high-throughput secure reliable multicast protocol , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[15]  Muriel Médard,et al.  On coding for reliable communication over packet networks , 2005, Phys. Commun..

[16]  Louise E. Moser,et al.  The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[17]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[18]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[19]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[20]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[21]  K. Jain,et al.  Practical Network Coding , 2003 .

[22]  K. K. Chi,et al.  Analysis of network error correction based on network coding , 2005 .

[23]  Jon Feldman,et al.  On the Capacity of Secure Network Coding , 2004 .