TY - GEN

T1 - The Byzantine CEO Problem

AU - Kosut, Oliver

AU - Tong, Lang

PY - 2008/9/29

Y1 - 2008/9/29

N2 - The CEO Problem is considered when a subset of the agents are under Byzantine attack; that is, they have been taken over and reprogrammed by a malicious intruder. Inner and outer bounds are given for the error exponent with respect to the sum rate, as a function of the fraction of reprogrammed, or traitor, agents. The inner bound is proved by introducing a coding scheme that takes advantage of the fact that the set of honest (non-traitor) agents will report jointly typical information. The CEO looks for a group with the same size as the set of honest agents that appear to do so. Even if not all the agents in this group are honest, the fact that they all agree keeps the probability of error in check. The outer bound is given in two parts, based on two different possible attacks by the traitors. The first is a black hole attack, in which the traitors simply transmit no information at all. The second is one in which they fabricate false data such that the CEO cannot determine which of two possibilities is the truth.

AB - The CEO Problem is considered when a subset of the agents are under Byzantine attack; that is, they have been taken over and reprogrammed by a malicious intruder. Inner and outer bounds are given for the error exponent with respect to the sum rate, as a function of the fraction of reprogrammed, or traitor, agents. The inner bound is proved by introducing a coding scheme that takes advantage of the fact that the set of honest (non-traitor) agents will report jointly typical information. The CEO looks for a group with the same size as the set of honest agents that appear to do so. Even if not all the agents in this group are honest, the fact that they all agree keeps the probability of error in check. The outer bound is given in two parts, based on two different possible attacks by the traitors. The first is a black hole attack, in which the traitors simply transmit no information at all. The second is one in which they fabricate false data such that the CEO cannot determine which of two possibilities is the truth.

KW - Byzantine attack

KW - Distributed source coding

KW - Network security

KW - Sensor fusion

UR - http://www.scopus.com/inward/record.url?scp=52349100560&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=52349100560&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2008.4594945

DO - 10.1109/ISIT.2008.4594945

M3 - Conference contribution

AN - SCOPUS:52349100560

SN - 9781424422579

T3 - IEEE International Symposium on Information Theory - Proceedings

SP - 46

EP - 50

BT - Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008

T2 - 2008 IEEE International Symposium on Information Theory, ISIT 2008

Y2 - 6 July 2008 through 11 July 2008

ER -