메뉴 건너뛰기




Volumn 28, Issue 5, 2010, Pages 692-702

On counteracting Byzantine attacks in network coded peer-to-peer networks

Author keywords

Byzantine; Content distribution; Distributed storage; Network coding; Peer to peer; Security

Indexed keywords

BYZANTINE; CONTENT DISTRIBUTION; DISTRIBUTED STORAGE; PEER TO PEER; SECURITY;

EID: 82055199252     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2010.100607     Document Type: Article
Times cited : (31)

References (34)
  • 5
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • R. Koetter and M. Médard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, pp. 782-795, 2003.
    • (2003) IEEE/ACM Trans. Netw. , vol.11 , pp. 782-795
    • Koetter, R.1    Médard, M.2
  • 6
    • 41749121006 scopus 로고    scopus 로고
    • On coding for reliable communication over packet networks
    • D. Lun, M. Medard, R. Koetter, and M. Effros, "On coding for reliable communication over packet networks," Physical Communication, vol. 1, no. 1, pp. 3-20, 2008.
    • (2008) Physical Communication , vol.1 , Issue.1 , pp. 3-20
    • Lun, D.1    Medard, M.2    Koetter, R.3    Effros, M.4
  • 8
    • 36248991171 scopus 로고    scopus 로고
    • How good is random linear coding based distributed network storage?
    • Riva del Garda, Italy, April
    • S. Acedański, S. Deb, M. Médard, and R. Koetter, "How good is random linear coding based distributed network storage?" in Proc. 1st Netcod, Riva del Garda, Italy, April 2005.
    • (2005) Proc. 1st Netcod
    • Acedański, S.1    Deb, S.2    Médard, M.3    Koetter, R.4
  • 9
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale content distribution
    • Miami, FL, March
    • C. Gkantsidis and P. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM, Miami, FL, March 2005.
    • (2005) Proc. IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 12
    • 0003828107 scopus 로고
    • Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October
    • R. Perlman, "Network layer protocols with Byzantine robustness," Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October 1988.
    • (1988) Network Layer Protocols with Byzantine Robustness
    • Perlman, R.1
  • 15
    • 34548349361 scopus 로고    scopus 로고
    • Resilient network coding in the presence of Byzantine adversaries
    • DOI 10.1109/INFCOM.2007.78, 4215660, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Médard, "Resilient network coding in the presence of Byzantine adversaries," in Proc. IEEE INFOCOM, March 2007, pp. 616 - 624. (Pubitemid 47334278)
    • (2007) Proceedings - IEEE INFOCOM , pp. 616-624
    • Jaggi, S.1    Langberg, M.2    Katti, S.3    Ho, T.4    Katabi, D.5    Medard, M.6
  • 16
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • April
    • C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. IEEE INFOCOM, April 2006.
    • (2006) Proc. IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 17
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, p. 509, 1999.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509
    • Barabási, A.1    Albert, R.2
  • 19
    • 0035794256 scopus 로고    scopus 로고
    • Epidemic spreading in scale-free networks
    • DOI 10.1103/PhysRevLett.86.3200
    • R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Phys. Rev. Lett., vol. 86, no. 14, pp. 3200-3203, Apr 2001. (Pubitemid 32317894)
    • (2001) Physical Review Letters , vol.86 , Issue.14 , pp. 3200-3203
    • Pastor-Satorras, R.1    Vespignani, A.2
  • 20
    • 0035689341 scopus 로고    scopus 로고
    • Infection dynamics on scale-free networks
    • Nov
    • R. M. May and A. L. Lloyd, "Infection dynamics on scale-free networks," Phys. Rev. E, vol. 64, no. 6, p. 066112, Nov 2001.
    • (2001) Phys. Rev. e , vol.64 , Issue.6 , pp. 066112
    • May, R.M.1    Lloyd, A.L.2
  • 21
    • 51649125221 scopus 로고    scopus 로고
    • Signatures for content distribution with network coding
    • June
    • F. Zhao, T. Kalker, M. Médard, and K. J. Han, "Signatures for content distribution with network coding," in Proc. IEEE ISIT, June 2007.
    • (2007) Proc. IEEE ISIT
    • Zhao, F.1    Kalker, T.2    Médard, M.3    Han, K.J.4
  • 22
    • 62349095697 scopus 로고    scopus 로고
    • Countering byzantine adversaries with network coding: An overhead analysis
    • November
    • M. Kim, M. Médard, and J. Barros, "Countering byzantine adversaries with network coding: An overhead analysis," in Proc. IEEE MILCOM, November 2008.
    • (2008) Proc. IEEE MILCOM
    • Kim, M.1    Médard, M.2    Barros, J.3
  • 23
    • 70449516066 scopus 로고    scopus 로고
    • Byzantine attacks against network coding in peer to peer distributed storage
    • June
    • L. Lima, J. Barros, and R. Koetter, "Byzantine attacks against network coding in peer to peer distributed storage," in Proc. IEEE ISIT, June 2009.
    • (2009) Proc. IEEE ISIT
    • Lima, L.1    Barros, J.2    Koetter, R.3
  • 26
    • 48849089497 scopus 로고    scopus 로고
    • Coding for errors and erasures in random network coding
    • R. Koetter and F. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, pp. 3579-3591, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 3579-3591
    • Koetter, R.1    Kschischang, F.2
  • 28
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine modification detection in multicast networks using randomized network coding
    • June
    • T. Ho, B. Leong, R. Koetter, M. Médard, and M. Effros, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. IEEE ISIT, June 2004.
    • (2004) Proc. IEEE ISIT
    • Ho, T.1    Leong, B.2    Koetter, R.3    Médard, M.4    Effros, M.5
  • 30
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • March
    • N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Designs, Codes and Cryptography, vol. 19, no. 2-3, pp. 173-193, March 2000.
    • (2000) Designs, Codes and Cryptography , vol.19 , Issue.2-3 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.3
  • 31
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signaturebased scheme for securing network coding against pollution attacks
    • Pheonix, AZ, April
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proceedings of IEEE INFOCOM, Pheonix, AZ, April 2008.
    • (2008) Proceedings of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 33
    • 0003508562 scopus 로고    scopus 로고
    • Digital signature standard (DSS)
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, "Digital signature standard (DSS)," FIBS PUB 186-2, 2000.
    • (2000) FIBS PUB , vol.186 , Issue.2
  • 34
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Springer-Verlag
    • D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," in Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, 1999, pp. 338-353.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.