Network Coding for Delay Tolerant Networks with Byzantine Adversaries

We consider Delay Tolerant mobile adhoc Networks (DTN) with Byzantine nodes and a binary spraying policy. Under such conditions, nefarious packets may propagate and considerably disrupt performance. We use Network Coding (NC) in this context, with a known number of Byzantine nodes. Existing approaches have considered static networks and us ed end-to-end error-correction schemes with fixed rates, or cr yptographic verification of individual packets. Owing to mobility, an adversarial node may have the same throughput to the receiver as the legitimate sender, thus precluding Byzanti ne NC error-correction schemes. Since we consider DTNs, opportu nistic exchanges allow transmission of cryptographic keys from th e source to only a fraction of nodes in a given time. Our protocol marries cryptographic key dissemination and error-correction to ensure message recovery at the receiver. We distribute keys to a sufficiently high proportion of non-Byzantine nodes, refered to as secure nodes, to limit the propagation of nefarious traffic which may have originated from Byzantine nodes or been coded with traffic from such nodes. Given the ensuing limited ability of the adversarial traffic, we are able to perform error-correction at the receiver. For large networks under uniform and stationary mobility model, we present an analysis of the probability of successful recovery with our protocol in terms of parameter s such as proportion of secure nodes, the level of error-corre cting redundancy we provide and the completion time until decoding is possible. We use the technique of Koetter and Kschischang in our error-correction scheme. We provide numerical resultsfor different random and empirically-obtained mobility trace s.

[1]  R. Koetter,et al.  The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[2]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.

[3]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[4]  Zygmunt J. Haas,et al.  A new networking model for biological applications of ad hoc sensor networks , 2006, IEEE/ACM Transactions on Networking.

[5]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[6]  ChaintreauAugustin,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007 .

[7]  F. Kschischang,et al.  Constricting the Adversary : A Broadcast Transformation for Network Coding , 2007 .

[8]  Baochun Li,et al.  Stochastic analysis of network coding in epidemic routing , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Vinton G. Cerf,et al.  Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..

[10]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.

[11]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.

[12]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[13]  Tracey Ho,et al.  Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.

[14]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[15]  Ger Koole,et al.  Message delay in MANET , 2005, SIGMETRICS '05.

[16]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[17]  Zygmunt J. Haas,et al.  A new networking model for biological applications of ad hoc sensor networks , 2006, TNET.

[18]  G. Neglia,et al.  On the Benefits of Random Linear Coding for Unicast Applications in Disruption Tolerant Networks , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[19]  R. Yeung,et al.  NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .

[20]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[21]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[22]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[23]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[24]  K. Jain,et al.  Practical Network Coding , 2003 .

[25]  Baochun Li,et al.  Efficient Network Coded Data Transmissions in Disruption Tolerant Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[26]  Jonathan Katz,et al.  Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..

[27]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[28]  T. Spyropoulos,et al.  Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case , 2008, IEEE/ACM Transactions on Networking.

[29]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[30]  Zygmunt J. Haas,et al.  Resource and performance tradeoffs in delay-tolerant wireless networks , 2005, WDTN '05.

[31]  R. Yeung,et al.  NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .

[32]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[33]  Muriel Medard,et al.  Resilient Network Coding in the Presence of , 2007 .