16,174 research outputs found
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
We propose a secure scheme for wireless network coding, called the algebraic
watchdog. By enabling nodes to detect malicious behaviors probabilistically and
use overheard messages to police their downstream neighbors locally, the
algebraic watchdog delivers a secure global self-checking network. Unlike
traditional Byzantine detection protocols which are receiver-based, this
protocol gives the senders an active role in checking the node downstream. The
key idea is inspired by Marti et al.'s watchdog-pathrater, which attempts to
detect and mitigate the effects of routing misbehavior.
As an initial building block of a such system, we first focus on a two-hop
network. We present a graphical model to understand the inference process nodes
execute to police their downstream neighbors; as well as to compute, analyze,
and approximate the probabilities of misdetection and false detection. In
addition, we present an algebraic analysis of the performance using an
hypothesis testing framework that provides exact formulae for probabilities of
false detection and misdetection.
We then extend the algebraic watchdog to a more general network setting, and
propose a protocol in which we can establish trust in coded systems in a
distributed manner. We develop a graphical model to detect the presence of an
adversarial node downstream within a general multi-hop network. The structure
of the graphical model (a trellis) lends itself to well-known algorithms, such
as the Viterbi algorithm, which can compute the probabilities of misdetection
and false detection. We show analytically that as long as the min-cut is not
dominated by the Byzantine adversaries, upstream nodes can monitor downstream
neighbors and allow reliable communication with certain probability. Finally,
we present simulation results that support our analysis.Comment: 10 pages, 10 figures, Submitted to IEEE Journal on Selected Areas in
Communications (JSAC) "Advances in Military Networking and Communications
On the binary codes with parameters of triply-shortened 1-perfect codes
We study properties of binary codes with parameters close to the parameters
of 1-perfect codes. An arbitrary binary code ,
i.e., a code with parameters of a triply-shortened extended Hamming code, is a
cell of an equitable partition of the -cube into six cells. An arbitrary
binary code , i.e., a code with parameters of a
triply-shortened Hamming code, is a cell of an equitable family (but not a
partition) from six cells. As a corollary, the codes and are completely
semiregular; i.e., the weight distribution of such a code depends only on the
minimal and maximal codeword weights and the code parameters. Moreover, if
is self-complementary, then it is completely regular. As an intermediate
result, we prove, in terms of distance distributions, a general criterion for a
partition of the vertices of a graph (from rather general class of graphs,
including the distance-regular graphs) to be equitable. Keywords: 1-perfect
code; triply-shortened 1-perfect code; equitable partition; perfect coloring;
weight distribution; distance distributionComment: 12 page
Some Applications of Coding Theory in Computational Complexity
Error-correcting codes and related combinatorial constructs play an important
role in several recent (and old) results in computational complexity theory. In
this paper we survey results on locally-testable and locally-decodable
error-correcting codes, and their applications to complexity theory and to
cryptography.
Locally decodable codes are error-correcting codes with sub-linear time
error-correcting algorithms. They are related to private information retrieval
(a type of cryptographic protocol), and they are used in average-case
complexity and to construct ``hard-core predicates'' for one-way permutations.
Locally testable codes are error-correcting codes with sub-linear time
error-detection algorithms, and they are the combinatorial core of
probabilistically checkable proofs
- …