A multiple relays aided secret key generation algorithm is proposed to improve the generated secret key rate for Internet of things when the wireless channels change slowly. First, the two legitimate users and relays ...
详细信息
A multiple relays aided secret key generation algorithm is proposed to improve the generated secret key rate for Internet of things when the wireless channels change slowly. First, the two legitimate users and relays send training sequences in turn to estimate the channels. Then, the relays employ secure network coding technique to help the two legitimate users exploit the randomness of relay channels. Finally, the two legitimate users agree on a secret key without the help of relays. In addition, the optimal relays selection with optimal power allocation algorithm is present to further improve the secret key rate when relay selection is needed. The performances of the proposed algorithms are verified by Monte Carlo simulation results.
In this study the authors consider the scenario of multiple unicast flows intersecting a common router in an opportunistic wireless network. Instead of forwarding packets in each of the flows independently, the router...
详细信息
In this study the authors consider the scenario of multiple unicast flows intersecting a common router in an opportunistic wireless network. Instead of forwarding packets in each of the flows independently, the router can perform inter-session network coding and transmit codewords to improve the network throughput. Unlike coding for multicast data flow for which an optimal code can be constructed in polynomial time, coding for unicast data flows is a more complicated coding problem and has been shown to be an NP-hard problem. Opportunities for inter-session network coding have also been shown to exist in single-hop wireless data dissemination network such as Wi-Fi and WiMAX networks. In this study the authors propose an efficient coding scheme for unicast flows and demonstrate its higher coding gain over previously proposed state-of-the-art coding schemes, validated using simulation results and wireless sensor network testbed packet reception traces. The authors also show that the proposed algorithm is optimal for all 238 non-isomorphic coding instances for instances for n 4, and for 9500 of the 9608 non-isomorphic coding instances for n = 5, where n is the number of unicast packets.
A matrix is termed superregular if all of its possible submatrices are non-singular. Superregular lower triangular Toeplitz matrices are useful for MDS convolutional codes and (sequential) network codes. In this paper...
详细信息
A matrix is termed superregular if all of its possible submatrices are non-singular. Superregular lower triangular Toeplitz matrices are useful for MDS convolutional codes and (sequential) network codes. In this paper, we present the explicit matrix constructions for superregular lower triangular Toeplitz matrices in GF(2(p))(kxk), k <= 5. For k > 5 we providea greedy algorithm, which (over sufficiently large fields) is guaranteed to find a superregular lower triangular Toeplitz matrix. We introduce (product preserving) joint superregularity, and extend our explicit matrix constructions to these cases. We provide methods for deriving the exact symbol loss probability and delay for any deterministic block code. We derive the exact symbol loss probability and delay for codes using a superregular lower triangular matrix and for codes using two (product preserving) jointly superregular lower triangular matrices. We then compare these results with those obtained from both simulations and our practical implementation, and for each case we also compare with random-based codes. Furthermore, our experiments show a gain in coding throughput above 40% for superregular lower triangular Toeplitz matrices over random matrices.
Data dissemination is a fundamental service offered by low-power wireless networks. Sender selection is the key to the dissemination performance and has been extensively studied. Sender impact metric plays a significa...
详细信息
Data dissemination is a fundamental service offered by low-power wireless networks. Sender selection is the key to the dissemination performance and has been extensively studied. Sender impact metric plays a significant role in sender selection, since it determines which senders are selected for transmission. Recent studies have shown that spatial link diversity has a significant impact on the efficiency of broadcast. However, the existing metrics overlook such impact. Besides, they consider only gains but ignore the costs of sender candidates. As a result, existing works cannot achieve accurate estimation of the sender impact. Moreover, they cannot well support data dissemination with network coding, which is commonly used for lossy environments. In this paper, we first propose a novel sender impact metric, namely,., which jointly exploits link quality and spatial link diversity to calculate the gain/cost ratio of the sender candidates. Then, we develop a generic sender selection scheme based on the. metric (called.-component) that can generally support both types of dissemination using native packets and network coding. Extensive evaluations are conducted through real testbed experiments and large-scale simulations. The performance results and analysis show that. achieves far more accurate impact estimation than the existing works. In addition, the dissemination protocols based on.-component outperform the existing protocols in terms of completion time and transmissions (by 20.5% and 23.1%, respectively).
Retrieving data from mobile source vehicles is a crucial routine operation for a wide spectrum of applications of vehicular networks, such as road surface monitoring and sharing. The key to improving the data retrieva...
详细信息
ISBN:
(纸本)9781467358088
Retrieving data from mobile source vehicles is a crucial routine operation for a wide spectrum of applications of vehicular networks, such as road surface monitoring and sharing. The key to improving the data retrieval performance is to increase the data availability such that a retrieving node can easily acquire its desired data from the vehicles that it contacts. network coding has widely been exploited as an effective technique for defusing information over a network. In this paper we explore the exploitation of network coding for improving data availability in vehicular networks. By random linear codes, simple replication is avoided, and instead a node forwards a coded block which is a random combination of all data received by the node. We implement a network coding based approach for improving data availability in vehicular networks. To understand the performance of this approach, we have conducted empirical study with extensive simulations based on real vehicular GPS traces from around 2,000 taxis in Shanghai, China. We make the important observation that in spite of significant improvement up to 300% in data availability, there is a serious issue with linear correlation among the received codes, which degrades the performance of data retrieval success rate. By analyzing the real vehicular traces, we reveal that there is strong community structure with a real vehicular network and then explain that such community structure may contribute to the issue of linear dependence. Then, we point out the opportunities for improving the network coding based approach by developing community aware codes distribution techniques.
Regenerating codes focus on the efficient repair of node failures. In an [n, k, d] regenerating code system, any k nodes can retrieve the original data and any d nodes can repair a failed node by giving out beta piece...
详细信息
Regenerating codes focus on the efficient repair of node failures. In an [n, k, d] regenerating code system, any k nodes can retrieve the original data and any d nodes can repair a failed node by giving out beta pieces of data per node. For minimum storage regenerating (MSR) codes, d >= 2k - 3 has been proved. However, as far as we know, there is no construction of exact-repair MSR codes with d = 2k - 3 and beta = 1 at present. In this letter, we give the first construction of [6, 4, 5] MSR codes with beta = 1, which can perform exact repair of all nodes. Employing the technique of linearly dependent vectors, our codes can be constructed over a small finite field F-4.
We consider a K user deterministic broadcast channel where the receivers have apriori side information of a set of messages. The (deterministic) broadcast channel defined by the identity function on {0; 1}, i.e., all ...
详细信息
ISBN:
(纸本)9781467331395
We consider a K user deterministic broadcast channel where the receivers have apriori side information of a set of messages. The (deterministic) broadcast channel defined by the identity function on {0; 1}, i.e., all the receivers receive the input bit free-of-noise. The message set is inspired by the multi-way relay channel which has K users communicating through a relay, where each user has an independent message for the remaining K - 1 users. The multi-way relay channel can be converted to a broadcast channel with side information if the relay is able to decode all the messages. Thus, in the broadcast set up, there are K(K - 1) messages, with K - 1 messages intended for each receiver. Each receiver has apriori side information of a (different) set of K-1 messages. In this set up, when there are K= 2 users, it is well known that the optimal strategy for sum-capacity is to use network coding, i.e., to send an XOR of the two messages since each receiver can cancel the interfering message using its side information. The main result of this note is an outerbound for the K user version of this channel showing that scheduling users pairwise and using network coding for the scheduled pair is optimal.
network coding, the notion of performing coding operations on the contents of packets while in transit through the network, was originally developed for wired networks; recently, however, it has been also applied with...
详细信息
ISBN:
(纸本)9781457714146
network coding, the notion of performing coding operations on the contents of packets while in transit through the network, was originally developed for wired networks; recently, however, it has been also applied with success also to mobile ad hoc networks (MANET). In this paper, we compare the performance of different protocols for ad hoc networks - Multipath routing based on fresnel zone routing (FZR), and Energy aware Node Disjoint Multipath Routing (ENDMR) protocol. Simulation results show that, with the proposed network coding in ad hoc network multipath routing protocol (NC-MR), packet delivery ratio, network lifetime and packet loss can be improved in most of cases. It is an available approach to multipath routing decision.
This letter considers two groups of source nodes. Each group transmits packets to its own designated destination node over single-hop links and via a cluster of relay nodes shared by both groups. In an effort to boost...
详细信息
This letter considers two groups of source nodes. Each group transmits packets to its own designated destination node over single-hop links and via a cluster of relay nodes shared by both groups. In an effort to boost reliability without sacrificing throughput, a scheme is proposed, whereby packets at the relay nodes are combined using two methods;packets delivered by different groups are mixed using non-orthogonal multiple access principles, while packets originating from the same group are mixed using random linear network coding. An analytical framework that characterizes the performance of the proposed scheme is developed, compared to simulation results, and benchmarked against a counterpart scheme that is based on orthogonal multiple access.
The index coding problem is a fundamental transmission problem which occurs in a wide range of multicast networks. network coding over a large finite field size has been shown to be a theoretically efficient solution ...
详细信息
The index coding problem is a fundamental transmission problem which occurs in a wide range of multicast networks. network coding over a large finite field size has been shown to be a theoretically efficient solution to the index coding problem. However the high computational complexity of packet encoding and decoding over a large finite field size, and its subsequent penalty on encoding and decoding throughput and higher energy cost makes it unsuitable for practical implementation in processor and energy constraint devices like mobile phones and wireless sensors. While network coding over GF(2) can alleviate these concerns, it comes at a tradeoff cost of degrading throughput performance. To address this tradeoff, we propose a throughput optimal triangular network coding scheme over GF(2). We show that such a coding scheme can supply unlimited number of innovative packets and the decoding involves the simple back substitution. Such a coding scheme provides an efficient solution to the index coding problem and its lower computation and energy cost makes it suitable for practical implementation on devices with limited processing and energy capacity.
暂无评论