The McEliece cryptosystem based on rank-metric codes is presented to offer both security and error-correction simultaneously in random network coding system. In the multicast network, the original messages are encoded...
详细信息
The McEliece cryptosystem based on rank-metric codes is presented to offer both security and error-correction simultaneously in random network coding system. In the multicast network, the original messages are encoded with McEliece cryptosystem based on Gabidulin codes. Key distribution will be done one time. The rank codes decoding is performed in the sink. As long as t < d(R) (C) /2, the decoding is guaranteed, where t is the number of corrupted packets and d(R) (C) is the minimum rank distance of the rank codesC. Original messages are protected based on the cryptosystem. Compared with the rate n - mu - 2t in traditional SEC network codes, the rate approaches n-2t where mu is the number of eavesdroppers. The rate won't decrease as the number of eavesdropped edges increases.
The rate of a network code is the ratio of the block size of the network's messages to that of its edge codewords. We compare the linear capacities and achievable rate regions of networks using finite field alphab...
详细信息
The rate of a network code is the ratio of the block size of the network's messages to that of its edge codewords. We compare the linear capacities and achievable rate regions of networks using finite field alphabets to the more general cases of arbitrary ring and module alphabets. For non-commutative rings, two-sided linearity is allowed. Specifically, we prove the following for directed acyclic networks. First, the linear rate region and the linear capacity of any network over a finite field depend only on the characteristic of the field. Furthermore, any two fields with different characteristics yield different linear capacities for at least one network. Second, whenever the characteristic of a given finite field divides the size of a given finite ring, each network's linear rate region over the ring is contained in its linear rate region over the field. Thus, any network's linear capacity over a field is at least its linear capacity over any other ring of the same size. An analogous result also holds for linear network codes over module alphabets. Third, whenever the characteristic of a given finite field does not divide the size of a given finite ring, there is some network whose linear capacity over the ring is strictly greater than its linear capacity over the field. Thus, for any finite field, there always exist rings over which some networks have higher linear capacities than over the field.
Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence relation between any index-coding instance and a network-coding ...
详细信息
Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence relation between any index-coding instance and a network-coding instance, for which a code for one instance can be translated to a code for the other instance with the same decoding-error performance. The equivalence also showed a surprising result that any network-coding instance can be mapped to an index-coding instance with a properly designed code translation. In this article, we extend the existing equivalence (instance map and code translation) to one between secure index coding and secure network coding, where eavesdroppers are present in the network. In the secure setting, any code construction needs to guarantee security constraints in addition to decoding-error performance. A rate equivalence between these two problems is also established.
Homomorphic (broadcast) message authentication code (MAC for short) scheme is a powerful tool for network coding to resist the pollution attack. However, many existing schemes only support the single generation transm...
详细信息
Homomorphic (broadcast) message authentication code (MAC for short) scheme is a powerful tool for network coding to resist the pollution attack. However, many existing schemes only support the single generation transmission and hence, potentially are vulnerable to multi-generation pollution attacks considered by Cheng et al. in 2016. In this paper, we consider how to securely convert the single generation homomorphic (broadcast) MAC schemes into multi-generation ones so that they can resist the multi-generation attacks. Concretely, We first present the multi-generation pollution attack on the single-generation homomorphic MAC scheme and propose a general transformation from single-generation scheme to one that supports multi-generation transmission. Second, we prove that the multi-generation pollution attack also holds for a kind of homomorphic broadcast MAC schemes and any c-collusion secure single-generation scheme using cover-free set system as its key-distribution strategy, can also be securely converted into one that supports multi generation transmission. Third, as applications of the two transformations, we point out the existing two single-generation schemes can be respectively transformed into ones that are secure against the multi-generation pollution attacks. (C) 2018 Elsevier B.V. All rights reserved.
In this paper, an intelligently cooperative communication network with cognitive users is considered, where in a primary system and a secondary system, respectively, a message is communicated to their respective recei...
详细信息
In this paper, an intelligently cooperative communication network with cognitive users is considered, where in a primary system and a secondary system, respectively, a message is communicated to their respective receiver over a packet-based wireless link. The secondary system assists in the transmission of the primary message employing network coding, on the condition of maintaining or improving the primary performance, and is granted limited access to the transmission resources as a reward. The users in both systems exploit their previously received information in encoding and decoding the binary combined packets. Considering the priority of legitimate users, a selective cooperation mechanism is investigated and the system performance based on an optimization problem is analyzed. Both the analytical and numerical results show that the condition for the secondary system accessing the licensed spectrum resource is when the relay link performs better than the direct link of the primary transmission. We also extend the system model into a network with multiple secondary users and propose two relay selection algorithms. Jointly considering the related link qualities, a best relay selection and a best relay group selection algorithm are discussed. Overall, it is found that the throughput performance can be improved with multiple secondary users, especially with more potential users cooperating in the best relay group selection algorithm.
The explosive traffic growths are pushing the transport network close to its capacity limitation, raising critical issues about fiber capacity crunch. In this context, network coding has been emerging as the promising...
详细信息
The explosive traffic growths are pushing the transport network close to its capacity limitation, raising critical issues about fiber capacity crunch. In this context, network coding has been emerging as the promising technique to improve the network capacity efficiency thanks to the capability of better resources utilization. The application of network coding to the realms of failure recovery in optical networks has paved the new way for more efficient protection schemes and indeed, XOR network coding combined with dedicated protection has been proposed, investigated and developed to challenge the well-established understanding of trading capacity efficiency for recovery speed and vice versa. In order to maximize the benefits empowered by network coding in this case, the problem of 1 + 1 routing and network coding assignment (1 + 1 RNCA) has to be optimally solved. Apart from traditional 1 + 1 routing, the decision of network coding information has also to be taken into account including the selection of pair of demands for encoding and the respective coding node and coding links. In this paper, we propose a bi-objective integer linear programming model of the 1 + 1 RNCA problem aiming at minimizing the conventional routing cost as the primary objective and furthermore minimizing the number of nodes with coding capabilities as the secondary objective. Our formulation uses a weighting method to combine two objectives into an integrated one and we provide a rigorous analysis on configuring the weight coefficients to capture the desired priority of individual objectives. The efficiency of our integrated objective model in comparison with reference designs based on the single-objective model, 1 + 1 routing and 1 + 1 RNCA, is numerically evaluated on different realistic topologies and traffic sets. Extensive simulation demonstrates that our proposal outperforms traditional approaches when it could achieve the lowest routing cost while simultaneously employing minimal nu
In this paper, we investigate the problem associated with minimizing the total energy consumption used by all devices when recovering their missing packets. It is accomplished by applying network coding based on the s...
详细信息
In this paper, we investigate the problem associated with minimizing the total energy consumption used by all devices when recovering their missing packets. It is accomplished by applying network coding based on the selection of the transmission rates in a device-to-device network. First, this paper formulates the problem as an integer nonlinear programming optimization by means of constructing a graph model with a limiting parameter to control the number of edges and thereby confirms it as an NPC. Second, this paper investigates the relationship between the energy-saving benefit and the value of the limiting parameter and thereby indicates that the benefit is maximized when the limiting parameter equals 2. Furthermore, two coding algorithms based on the selection of the maximum-weighted clique are proposed. In detail, they are selecting the best clique in terms of the weight of the vertex (SBWV) algorithm and selecting the best clique in terms of the weight of the edge (SBWE) algorithm. The former consider selecting the maximum-weighted clique on the local NC graph which is based on the weight of vertex, while the latter consider selecting the maximum-weighted cliques of the global NC graph based on the weight of the edge. Finally, the simulation results show that both the SBWV and SBWE can significantly reduce the energy of transmission and average delay when compared with COPE, content-and loss-aware IDNC, as well as TS-MIS.
As a promising technology, non-orthogonal multiple access (NOMA) enhances spectral efficiency and system capacity by allocating the same resource to multiple users. network coding (NC) has the advantages of compressin...
详细信息
As a promising technology, non-orthogonal multiple access (NOMA) enhances spectral efficiency and system capacity by allocating the same resource to multiple users. network coding (NC) has the advantages of compressing data and high spectral efficiency, and it plays a crucial role in two-way relay networks. However, conventional two-way relay networks suffer from throughput limitations due to the use of OMA scheme. In this paper, we utilize a hybrid concept to design a two-way relaying system (namely Hybrid-TWRS) which combines NOMA and NC. Furthermore, we investigate the size-mismatch problem caused by asymmetric channel in the NOMA scheme and propose a bit-match scheme and a symbol-match scheme based on the Hybrid-TWRS. Theoretical derivation and numerical results demonstrate that the proposed method distinctly outperforms both (i) traditional two-way relaying system with OMA in the uplink and NC in the downlink (namely NC-TWRS);and (ii) NOMA-based two-way relaying system (namely NOMA-TWRS).
Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communicati...
详细信息
Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) of XOR coding are subsequently derived. Our experiments reveal that both the number of relays and the mechanism of XOR coding can affect the system performance. Specifically, the increase in the number of relays will lower the overall system performance (e.g., an increase in the E2EPLP and end-to-end completion time, and a decrease of the end-to-end rate may follow as a result). On the other hand, although the presence of XOR coding unfortunately raises the system E2EPLP, it can effectively improve the end-to-end completion time and end-to-end rate. It is our belief that the analytical approach proposed in this paper and the results found in our work can be useful to peer studies in the context of applying network coding in multi-hop D2D networks.
This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applicat...
详细信息
This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applications. Unlike the video devices, personal drones with high mobility can track and follow an individual, causing both the identity and location privacy issues. However, IoD devices cannot implement complex cryptographic schemes because of limited computing power. To this end, we develop a secure light-weight network coding pseudonym scheme. Our designed two-tier network coding can decouple the stored IoD cloud data from the owner's pseudonyms. Therefore, our proposed network coding-based pseudonym scheme can simultaneously defend against both outside and inside attackers. We implement our proposed two-tier light-weight network coding mechanism when facing untrusted cloud database. Compared to the computationally secure hash-based pseudonym scheme, our proposed scheme achieves the highest unconditional security level, but also can reduce more than 90% of processing time as well as 10% of energy consumption.
暂无评论