On Locating Byzantine Attackers. Jafari Siavoshani, M., Fragouli, C., & Diggavi, S. N. Network Coding Workshop: Theory and Applications, 2008. abstract bibtex We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.
@article{jafari_siavoshani_locating_2008,
abstract = {We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.},
type={4},
author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},
journal = {Network Coding Workshop: Theory and Applications},
tags = {network_coding},
title = {On {Locating} {Byzantine} {Attackers}},
year = {2008}
}
Downloads: 0
{"_id":"xzaHasNRwLC4xT53M","bibbaseid":"jafarisiavoshani-fragouli-diggavi-onlocatingbyzantineattackers-2008","authorIDs":["BovhRrwbYouQ7xD9S"],"author_short":["Jafari Siavoshani, M.","Fragouli, C.","Diggavi, S. N."],"bibdata":{"bibtype":"article","type":"4","abstract":"We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.","author":[{"propositions":[],"lastnames":["Jafari","Siavoshani"],"firstnames":["Mahdi"],"suffixes":[]},{"propositions":[],"lastnames":["Fragouli"],"firstnames":["C."],"suffixes":[]},{"propositions":[],"lastnames":["Diggavi"],"firstnames":["Suhas","N."],"suffixes":[]}],"journal":"Network Coding Workshop: Theory and Applications","tags":"network_coding","title":"On Locating Byzantine Attackers","year":"2008","bibtex":"@article{jafari_siavoshani_locating_2008,\n abstract = {We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},\n journal = {Network Coding Workshop: Theory and Applications},\n tags = {network_coding},\n title = {On {Locating} {Byzantine} {Attackers}},\n year = {2008}\n}\n\n","author_short":["Jafari Siavoshani, M.","Fragouli, C.","Diggavi, S. N."],"key":"jafari_siavoshani_locating_2008","id":"jafari_siavoshani_locating_2008","bibbaseid":"jafarisiavoshani-fragouli-diggavi-onlocatingbyzantineattackers-2008","role":"author","urls":{},"metadata":{"authorlinks":{"fragouli, c":"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F52xaJNXvSgauGDmZR&noBootstrap=1&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner="}},"downloads":0},"bibtype":"article","biburl":"https://bibbase.org/network/files/52xaJNXvSgauGDmZR","creationDate":"2020-11-13T02:21:59.558Z","downloads":0,"keywords":[],"search_terms":["locating","byzantine","attackers","jafari siavoshani","fragouli","diggavi"],"title":"On Locating Byzantine Attackers","year":2008,"dataSources":["ZyBHKCcCyS7Qk9n3w","2BHqTGHtDg7BjRAJQ","XpqzCLvCgsYBqbTpK","QNNZyNQzfeETJyTbL","Z6bBhKezwKd3pPWRc"]}