Networking Investigate

Counteracting Byzantine Adversaries With Network Coding: An Overhead Analysis

Download now Free registration required

Executive Summary

Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet generated by a Byzantine attacker can easily contaminate the information to multiple destinations. In this paper, the authors study the transmission overhead associated with three different schemes for detecting Byzantine adversaries at a node using network coding: end-to-end error correction, packet-based Byzantine detection scheme, and generation-based Byzantine detection scheme. In end-to-end error correction, it is known that they can correct up to the min-cut between the source and destinations.

  • Format: PDF
  • Size: 195.8 KB