Cyber security is a vital performance metric for networks. Wiretap attacks belong to passive attacks. It commonly exists in wired or wireless networks, where an eavesdropper steals useful information by wiretapping me...
详细信息
ISBN:
(纸本)9781728139364
Cyber security is a vital performance metric for networks. Wiretap attacks belong to passive attacks. It commonly exists in wired or wireless networks, where an eavesdropper steals useful information by wiretapping messages being shipped on network links. It seriously damages the confidentiality of communications. This paper proposed a secure network coding system architecture against wiretap attacks. It combines and collaborates network coding with cryptography technology. Sonic illustrating examples are given to show how to build such a system and prove its defense is much stronger than a system with a single defender, either network coding or cryptography. Moreover, the system is characterized by flexibility, simplicity, and easy to set up. Finally, it could be used for both deterministic and random network coding system.
The 5G cellular network is projected to be introduced in 2020 and takes advantage of the small cell technology to deliver ubiquitous 5G services in an energy efficient manner. The next logical step is the introduction...
详细信息
ISBN:
(纸本)9781728136271
The 5G cellular network is projected to be introduced in 2020 and takes advantage of the small cell technology to deliver ubiquitous 5G services in an energy efficient manner. The next logical step is the introduction of network coding-enabled mobile small cells (NC-MSCs). These are networks of mobile devices which can be set up on-the-fly, based on demand, and cover the urban landscape. Furthermore, they allow network offloading through multi-hop device-to-device (D2D) communication to provide high data rate services. In this paper we introduce DISTANT, a decentralized key management scheme specifically designed to provide security in a network which takes advantage of the benefits of NC-MSCs. In our key management scheme, we distribute the certification authority (CA) functions using threshold secret sharing. Each network node is provided with a share of the master private key such that key management services are available "anywhere, anytime". Finally, our distributed CA takes advantage of the self-generated certificate paradigm. Certificates can therefore be issued and renewed without the interaction of the distributed CA which minimizes the communication overhead.
In the paradigm of network coding, informationtheoretic security is considered in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, referred to as the security level. Secure n...
详细信息
ISBN:
(纸本)9781538692912
In the paradigm of network coding, informationtheoretic security is considered in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, referred to as the security level. Secure network coding is applied to prevent the leakage of the source information to the wiretappers. In this paper, we consider the problem of secure network coding for flexible pairs of information rate and security level with any fixed dimension (equal to the sum of rate and security level). We present a novel approach for designing a secure linear network code (SLNC) such that the same SLNC can be applied for all the rate and security-level pairs with the fixed dimension. We further develop a polynomial-time algorithm for efficient implementation and prove that there is no penalty on the required field size for the existence of SLNCs in terms of the best known lower bound by Guang and Yeung. Finally, by applying our approach as a crucial building block, we can construct a family of SLNCs that not only can be applied to all possible pairs of rate and security level but also share a common local encoding kernel at each intermediate node in the network.
This paper studies a new application of deep learning (DL) for optimizing constellations in two-way relaying with physical-layer network coding (PNC), where deep neural network (DNN)-based modulation and demodulation ...
详细信息
ISBN:
(纸本)9781538680889
This paper studies a new application of deep learning (DL) for optimizing constellations in two-way relaying with physical-layer network coding (PNC), where deep neural network (DNN)-based modulation and demodulation are employed at each terminal and relay node. We train DNNs such that the cross entropy loss is directly minimized, and thus it maximizes the likelihood, rather than considering the Euclidean distance of the constellations. The proposed scheme can be extended to higher level constellations with slight modification of the DNN structure. Simulation results demonstrate a significant performance gain in terms of the achievable sum rate over conventional relaying schemes. Furthermore, since our DNN demodulator directly outputs bit-wise probabilities, it is straightforward to concatenate with soft-decision channel decoding.
Due to an explosive growing demand for higher data rates that have led to the 5th generation of mobile networks, network coding-enabled mobile small cells are observed as a promising technology for 5G networks that ca...
详细信息
ISBN:
(纸本)9781728136271
Due to an explosive growing demand for higher data rates that have led to the 5th generation of mobile networks, network coding-enabled mobile small cells are observed as a promising technology for 5G networks that can cover the urban landscape by being set up on-demand at any place, and at any time on any device. Despite the benefits of network coding technology on these networks, pollution attacks should be addressed before network coding technology reaches its full potential in 5G mobile small cells. In this paper, we have proposed an intrusion detection and prevention scheme which is able not only to detect and prevent pollution attacks but also to detect the exact location of adversary nodes which are the source of pollution attacks.
A new method is presented, consisting of exclusively simple linear algebra computations, for computing the linear programming Shannon outer bound to the network coding capacity region of a directed hypergraph network....
详细信息
ISBN:
(纸本)9781538692912
A new method is presented, consisting of exclusively simple linear algebra computations, for computing the linear programming Shannon outer bound to the network coding capacity region of a directed hypergraph network. This linear algebraic formulation enables a new upper bound on the worst case complexity of computing the Shannon outer bound to a network coding capacity region to be determined.
In this work, the concept of network coding (NC) is used in conjunction with the routing and spectrum allocation (RSA) problem to jointly provide security and protection in elastic optical networks (EONs). Specificall...
详细信息
ISBN:
(纸本)9781728146980
In this work, the concept of network coding (NC) is used in conjunction with the routing and spectrum allocation (RSA) problem to jointly provide security and protection in elastic optical networks (EONs). Specifically, to provide security against eavesdropping attacks, a number of XOR operations are performed at specific network nodes using already established connections, enabling the confidential connections to transmit an encrypted version of their data. In order to protect and maintain the security of the confidential connections in the event of any single link failure, a protection mechanism is further proposed, enabling the receiver at the destination nodes to decode the signals during normal network operation as well as network operation under fault conditions. NC-based RSA algorithms are proposed for different classes of demands and their efficiency is examined in terms of spectrum utilization, network blocking, and the level of security they provide.
Satellite networks are capable of contenting a variety of data transmission needs of users in geographically diverse locations throughout the world. Multi-layered satellite networks (MLSNs) can construct efficient com...
详细信息
Satellite networks are capable of contenting a variety of data transmission needs of users in geographically diverse locations throughout the world. Multi-layered satellite networks (MLSNs) can construct efficient communications networks due to their extensive coverage and high network capacity. However, throughput degradation and severe end-to-end delay could occur in MLSNs because of the traffic congestion. To resolve these problems, the authors first propose a novel MEO/LEO satellite network architecture that construct effective inter-satellite links. Then the authors present a network coding-based multi-path routing algorithm to deliver traffic through the hybrid satellite network. The analysis of characteristics of the proposed scheme are addressed by performance evaluations in simulation.
There has been an increasing demand for providing real-time video streaming services in the next-generation cellular networks. To improve the quality of such services without additional infrastructure, neighboring dev...
详细信息
There has been an increasing demand for providing real-time video streaming services in the next-generation cellular networks. To improve the quality of such services without additional infrastructure, neighboring devices can recover missing packets by using network coding aided collaborative transmission via device-to-device (D2D) communication. However, most existing work in this area had not considered the issue of how to schedule such coding aided collaborative transmissions effectively for supporting real-time scalable video applications in such environment. In this paper, we study how to improve the quality of real-time scalable video services by efficiently scheduling coding aided collaborative transmissions. We first formulate the problem of optimal collaborative transmission scheduling that determines the optimal transmitting sequence and coding pattern at each transmitting device, which is shown to be NP-hard. To address this problem, we propose a new weight function for measuring the quality of a coding pattern by considering packet recovery gain and potential video decoding gain at receivers. Based on this new weight function, we propose a low complexity centralized algorithm using global state information and an efficient distributed mechanism supporting localized operations in dynamic environment. We deduce their computational complexities. Simulation results verify that the proposed solution outperforms the representative work in the literature.
Industrial applications introduce new and complex requirements in terms of reliability and latency for wireless communication systems. In particular, 3GPP has recently identified the need for communications being ultr...
详细信息
ISBN:
(数字)9781728152073
ISBN:
(纸本)9781728140537
Industrial applications introduce new and complex requirements in terms of reliability and latency for wireless communication systems. In particular, 3GPP has recently identified the need for communications being ultra reliable as well as robust against consecutive packet errors. These requirements call for new approaches that span multiple layers to encompass the latency-reliability trade-offs compared to classical error correction schemes like (Hybrid) ARQ. For this purpose, techniques like puncturing, power boosting, and data duplication have been introduced in 5G NR to enable transmission preemption and overriding, and data redundancy. To alleviate their radio inefficiency cost, this paper presents network coding schemes that proactively correct packet errors caused by simultaneous or consecutive leg transmission failures. In particular, we demonstrate that the proposed schemes are able to increase the reliability of single and consecutive packet transmissions while reducing the associated traffic increase as compared to data duplication.
暂无评论