Individual Security and Network Design with Malicious Nodes

04/19/2018
by   Tomasz Janus, et al.
0

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be fully mitigated, despite the presence of the byzantine nodes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/21/2022

An Information-theoretical Secured Byzantine-fault Tolerance Consensus in Quantum Key Distribution Network

Quantum key distribution (QKD) networks is expected to provide informati...
research
05/25/2021

VerLoc: Verifiable Localization in Decentralized Systems

This paper tackles the challenge of reliably determining the geo-locatio...
research
02/20/2020

Towards Byzantine-resilient Learning in Decentralized Systems

With the proliferation of IoT and edge computing, decentralized learning...
research
01/27/2020

Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks

Malicious co-residency in virtualized networks poses a real threat. The ...
research
12/29/2021

Challenges and approaches for mitigating byzantine attacks in federated learning

Recently emerged federated learning (FL) is an attractive distributed le...
research
01/19/2021

On Provable Backdoor Defense in Collaborative Learning

As collaborative learning allows joint training of a model using multipl...
research
05/24/2023

From Shortcuts to Triggers: Backdoor Defense with Denoised PoE

Language models are often at risk of diverse backdoor attacks, especiall...

Please sign up or login with your details

Forgot password? Click here to reset