Owner: @Alexander Mozeika @Mehmet @Marcin Pawlowski

Attack scenario: Subnetwork control by the encoder/adversary

Architecture assumption

Adversary goal and capabilities

Goal: influence DA outcomes by controlling the subnetworks involved in sampling and/or storage.

We distinguish capabilities:

  1. Subnetwork capture (hard control).

    The adversary controls all DA nodes in some subset of subnetworks, so it can:

  2. Partial presence (soft control).

    The adversary controls some DA nodes in many subnetworks, but honest DA nodes also exist and can answer.

  3. Encoder equivocation / strategic behavior.

    The adversary behaves honestly during dispersal to get the blob included, then later attempts to reduce availability by dropping/changing data on controlled subnetworks, or by DoS-ing answers from those subnetworks.

This is the model I have in mind @Mehmet @Marcin Pawlowski. We have the number $n$ of DA nodes in total and out of these the number $n_A$ of nodes are controlled by adversary (red circles). The DA nodes are distributed (randomly)  into $N$subnetworks (squares) in such way that each subnetwork has $R$ nodes.  By chance all $R$ nodes of a subnetwork can be controlled by adversary (red square).

This is the model I have in mind @Mehmet @Marcin Pawlowski. We have the number $n$ of DA nodes in total and out of these the number $n_A$ of nodes are controlled by adversary (red circles). The DA nodes are distributed (randomly) into $N$subnetworks (squares) in such way that each subnetwork has $R$ nodes. By chance all $R$ nodes of a subnetwork can be controlled by adversary (red square).