Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Information  /  Vol: 9 Par: 9 (2018)  /  Artículo
ARTÍCULO
TITULO

Individual Security and Network Design with Malicious Nodes

Tomasz Janus    
Mateusz Skomra and Marcin Dziubinski    

Resumen

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes.

 Artículos similares

       
 
Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev and Larisa Bulysheva    
Despite of tourism infrastructure and software, the development of tourism is hampered due to the lack of information support, which encapsulates various aspects of travel implementation. This paper highlights a demand for integrating various approaches ... ver más
Revista: Algorithms

 
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li    
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil... ver más
Revista: Applied Sciences

 
Cordelia Onyinyechi Omodero and Philip Olasupo Alege    
Local governments are the motors that drive the lives of their citizens. There is no human individual who does not live under a local government, regardless of where they are situated. This is why every local authority?s environment requires a wide range... ver más

 
Weijie Zhang, Kai Feng, Fei Wang, Wenjun Wang, Zezhong Zhang, Yingying Wang and Shengzhi Huang    
Meteorological drought is a continuous spatiotemporal phenomenon that poses a serious threat to water resource security. Dynamic evolution and multivariable frequency analysis of meteorological drought are important for effective drought mitigation and r... ver más
Revista: Water

 
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish    
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur... ver más
Revista: Computers