Corruption Detection on Networks

نویسندگان

  • Noga Alon
  • Elchanan Mossel
  • Robin Pemantle
چکیده

We consider the problem of corruption detection on networks. In this model each vertex of a directed graph can be either truthful or corrupt. Each vertex reports about the types (truthful or corrupt) of all his out-neighbors. If he is truthful, he reports the truth, whereas if he is corrupt he reports adversarially. This model, considered in [15] motivated by the desire to identify the faulty components of a digital system by having the other components checking them, became known as the PMC model. The main known results for this model characterize networks in which all corrupt (that is, faulty) vertices can be identified, when there is a known upper bound on their number. We are interested in the investigation of networks in which most of the corrupt vertices can be identified. We show that the main relevant parameter here is graph expansion. This implies that in contrast to the known results about the PMC model that imply that in order to identify all corrupt vertices when their number is t all indegrees have to be at least t, there are bounded degree graphs in which almost all corrupt and almost all truthful vertices can be identified, whenever there is a majority of truthful vertices. We also show that expansion is necessary for obtaining such a corruption detection and discuss algorithms and the computational hardness of the problem. Sackler School of Mathematics and Blavatnik School of Computer Science, Tel Aviv University, Tel Aviv 69978, Israel and School of Mathematics, Institute for Advanced Study, Princeton, NJ 08540. [email protected]. Research supported in part by a USA-Israeli BSF grant 2012/107, by an ISF grant 620/13, by the Israeli I-Core program and by the Fund for Mathematics. Department of Statistics, University of Pennsylvania, 3730 Walnut Street, Philadelphia, PA 19104 and Departments of Statistics and Computer Science, U.C. Berkeley, 367 Evans Hall, Berkeley CA 94720. [email protected]. Research supported by NSF grant CCF 1320105, DOD ONR grant N0001414-1-0823, and grant 328025 from the Simons Foundation. Department of Mathematics, University of Pennsylvania, 209 South 33rd Street, Philadelphia, PA 19104, USA, [email protected]. Research supported in part by NSF grant # DMS-1209117

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Institutional Analysis of Corruption Configurations in South-West Asian Countries: A Fuzzy-Set Qualitative Comparative Analysis (fsQCA)

Considering corruption as one of the chronic harms of the administrative system,and the social factor affecting economic growth, the present study sought toexplain, for the first time, the differences in the perceived levels of corruptionamong 16 Southwest Asian countries, relying on the sociological “newinstitutionalism” theory in analyzing organizations, describing cau...

متن کامل

Handling Memory Corruption Faults In Sensor Networks

Typical sensor nodes use resource constrained micro-controllers where user level applications, operating system components, device drivers, etc., reside within a single address space with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. To protect against such errors, we propose a ...

متن کامل

A Group Testing Approach to Improved Corruption Localizing Hashing

Efficient detection of integrity violations is crucial for the reliability of both data at rest and data in transit. While ideally one would want to always find all changes in the input data, in practice this capability may be expensive, and one may be content with localizing or finding a superset of any changes. Corruption-localizing hashing [5] is a cryptographic primitive that enhances colli...

متن کامل

Overlapping Community Detection in Social Networks Based on Stochastic Simulation

Community detection is a task of fundamental importance in social network analysis. Community structures enable us to discover the hidden interactions among the network entities and summarize the network information that can be applied in many applied domains such as bioinformatics, finance, e-commerce and forensic science. There exist a variety of methods for community detection based on diffe...

متن کامل

On modeling and tolerating incorrect software

Distributed systems have to deal with the following scenarios in practice: bugs in components; incorrect specifications of components and, therefore, incorrect use of components; unanticipated faults due to complex interactions or to not containing the effects of faults in lower-level components; and evolution of components. Extant fault tolerance models deal with such scenarios in only a limit...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1505.05637  شماره 

صفحات  -

تاریخ انتشار 2015