Inicio  /  Information  /  Vol: 9 Par: 9 (2018)  /  Artículo
ARTÍCULO
TITULO

Individual Security and Network Design with Malicious Nodes

Tomasz Janus    
Mateusz Skomra and Marcin Dziubinski    

Resumen

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes.

 Artículos similares

       
 
Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev and Larisa Bulysheva    
Despite of tourism infrastructure and software, the development of tourism is hampered due to the lack of information support, which encapsulates various aspects of travel implementation. This paper highlights a demand for integrating various approaches ... ver más
Revista: Algorithms

 
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li    
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil... ver más
Revista: Applied Sciences

 
Xueping Song, Shuyu Zhang, Jianming Yang and Jicun Zhang    
Many security detectors do not have the ability to output individual luggage package images and are not compatible with deep learning algorithms. In this paper, a luggage package extraction of X-ray images based on the ES-MBD (Edge Sensitive Multi-channe... ver más
Revista: Applied Sciences

 
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles    
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi... ver más
Revista: Applied Sciences

 
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences