As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques ca...
详细信息
As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques can help authenticate whether a modified packet in files is injected or not. However, in an IoT system, there are often multiple source devices each of which has its own authentication key, where existing single-source network coding signature schemes cannot work. In this paper, we study the problem of designing secure network coding signatures in the network with multiple sources and propose the multisource homomorphic network coding signature. We also give construction and prove its security.
network coding-based caching at base stations (BSs) is a promising caching approach to support massive content delivery over wireless networks. However, existing network coding-based caching designs do not fully explo...
详细信息
ISBN:
(纸本)9781467389990
network coding-based caching at base stations (BSs) is a promising caching approach to support massive content delivery over wireless networks. However, existing network coding-based caching designs do not fully explore and exploit the potential advantages. In this paper, we consider the analysis and optimization of a random linear network coding-based caching design in large-scale successive interference cancelation (SIC)enabled wireless networks. By utilizing tools from stochastic geometry, we derive a tractable expression for the successful transmission probability in the general file size regime. To further obtain design insights, we also derive closed-form expressions for the successful transmission probability in the small and large file size regimes, respectively. Then, we consider the successful transmission probability maximization by optimizing a design parameter, which is a complex discrete optimization problem. We propose a two-stage optimization framework and obtain a near optimal solution with superior performance and manageable complexity. The analysis and optimization results provide valuable design insights for practical cache and SIC enabled wireless networks. Finally, by numerical results, we show that the proposed near optimal caching design achieves a significant performance gain over some baseline caching designs.
In order to rapidly response to users request in highspeed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism bas...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In order to rapidly response to users request in highspeed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism based on network coding(MRNC). By using network coding technology, users Interest packet is divided into multiple child interest packet, and the content is divide and random linear codes and the content, thus the content is cache fragmentation. Content retrieval process is become into more child content retrieval process by the multipath routing technology. The simulation results show that the proposed mechanism can effectively improve the node success delivery rate, reduce the total road network redundancy, improve the transmission efficiency
In this paper, we consider a multi-way relay system with network coding (NC) in multi-spot beam satellite networks. In particular, we focus on multiparty video conferencing via a satellite. Our proposed protocol uses ...
详细信息
In this paper, we consider a multi-way relay system with network coding (NC) in multi-spot beam satellite networks. In particular, we focus on multiparty video conferencing via a satellite. Our proposed protocol uses the multicasting routing information and number of video frame packets to generate coded packets. The proposed protocol ensures the reliable transmission of multicasting data for mobile users using the decoding error rate for the random linear network coding batch. To minimize the delay in the link layer, we propose a resource allocation scheme for multiparty video conferencing with NC in satellite communications. For the resource allocation, we use application information acquired by a performance enhancing proxy. The simulation results show that the achievable rate can be increased by the proposed protocol. The proposed protocol can also reduce the number of packet transmissions, resulting in the efficient usage of satellite radio resources. Furthermore, it is shown that the proposed protocol ensures the reliable transmission of multicasting data for mobile users by using resources saved by NC. The average peak signal-to-noise of the video streaming for mobile users is better than that of the conventional system. As a result, the visual quality of video streaming services is improved.
Catering to the public nature of Ad hoc network in open channel and data communication being easily eavesdropped,this paper proposed an antieavesdropping algorithm which is based on network *** algorithm is based on t...
详细信息
Catering to the public nature of Ad hoc network in open channel and data communication being easily eavesdropped,this paper proposed an antieavesdropping algorithm which is based on network *** algorithm is based on the RSA signature algorithm introducing the timestamp and homomorphic mechanism to detect tampering and replay attacks,as the basis for calculating safety,being used as one of measurement indicators in router by node safety to establish t pieces of routing *** generates encoding vectors by introducing the random number when the source node is encoded and the random number will be divided into n *** long as the sink node receives t pieces of fragments,we can restore the original encoding vector and decode *** the eavesdropper wiretaps are less than t,they can not get any meaningful *** is designed for increasing the number of linearly independent coded *** can improve the decoding efficiency by adopting generational grouping strategy while being *** and theoretical analysis shows that the anti-eavesdropping algorithm based on network coding improves network performance and security by coding gain.
Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical com...
详细信息
Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper's power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.
As one of the most promising future Internet, Information-Centric networking (ICN) is attracting more attention. However, the previous works which have achieved either single-source transmission or low-efficiency mult...
详细信息
As one of the most promising future Internet, Information-Centric networking (ICN) is attracting more attention. However, the previous works which have achieved either single-source transmission or low-efficiency multisource transmission did not fully exploit the potential of underlying its in-network caching opportunities. We propose Information-Centric networking with Built-in network coding (ICN-NC) where in-network caching can be collaborated with network coding to achieve multisource transmission at network-layer. In ICN-NC, due to network coding, partitioned caching and parallel transmission with multiple data sources can be achieved. Moreover, four schemes are proposed to address the key challenges of ICN-NC: Firstly, a novel signature scheme ensures that signature scheme can be compatible with network coding. Secondly, a communication scheme based on piggyback technology ensures that the number of returned Coded Message (CM) is exactly matched with the desired number. Thirdly, we propose a forwarding plane separated from routing plane to observe the network state, such as network failure, link transmission performance and distribution of CM, where a strategy of forwarding Interest ensures that the probability of returned CM being linearly dependent is low. Fourthly, an acknowledgement mechanism ensures that the choice of Interest exploration direction is reasonable and adaptive. Finally, experiment results shows that ICN-NC can improve transmission efficiency, caching efficiency and robustness compared to original ICN and IP. (C) 2015 Elsevier B.V. All rights reserved.
Cloud storage systems are emerging as the primary solution for online storage and information sharing. As the demand for such a service is increasing at a phenomenal rate, the cost for maintaining and delivering conte...
详细信息
Cloud storage systems are emerging as the primary solution for online storage and information sharing. As the demand for such a service is increasing at a phenomenal rate, the cost for maintaining and delivering content concerns the cloud providers and ISPs. As in other distributed systems, e.g., file sharing and multimedia streaming, network coding can significantly simplify the process for content distribution and retrieval. However, it also raises difficulties in updating portions of a file, as any change in the file will impact all coded content in the system. In this paper, we present the differential update model and its optimization for updating coded blocks by delivering only the changes in a file. We complete the design with an update algorithm and a communication protocol among all participants in the system. Our experimental results verify that our design makes network coding practical for file updates in cloud storage systems. The proposed update model leads to bandwidth saving, compared to conventional update mechanisms, with minimal computational costs.
In this paper, we propose a distributed solution based on game-theoretic approaches to the topology formation problem for mobile wireless sensor networks with multi-source multicast flows. Our solution significantly r...
详细信息
ISBN:
(纸本)9781467389990
In this paper, we propose a distributed solution based on game-theoretic approaches to the topology formation problem for mobile wireless sensor networks with multi-source multicast flows. Our solution significantly reduces computational complexity by taking advantage of network coding. Finding an optimal topology for network coding in multi-source multicast flows is NP-hard problem, so the proposed algorithm provides a suboptimal solution with low computational complexity. We formulate the problem of distributed network topology formation as a network formation game by considering the nodes in the network as players that can take actions for making outgoing links. The proposed game, which consists of multiple players and multicast flows, can be decomposed into independent link formation games played by only two players with a unicast flow. The proposed algorithm is also guaranteed to converge, i.e., a stable network topology can be always formed. Our simulation results confirm that the computational complexity of the proposed solution is low enough for practical deployment in large-scale mobile, wireless sensor networks.
In this paper, we present an asynchronous network coding (ANC) transmission strategy for multiuser co-operative networks. In particular, we consider a relay network comprised of multiple sources and mutiple relays. Th...
详细信息
In this paper, we present an asynchronous network coding (ANC) transmission strategy for multiuser co-operative networks. In particular, we consider a relay network comprised of multiple sources and mutiple relays. The sources all transmit simultaneously. The relay receives a sum of the signals with different delays. The decoded signals at the relay are network-coded by asynchronous delays and transmitted to the destination. We first present a decoding strategy for our ANC. We also compare our proposed ANC to complex field network coding and show the superiority of our proposed scheme in terms of decoding complexity and bit error rate (BER) performance. Next, we develop three relay selection strategies with different complexity in conjunction with the proposed ANC scheme. The proposed full selection and joint selection (JS) schemes consider both channel quality and delay effect in the selection. But the proposed individual selection scheme only considers channel quality in the selection. We derive an end-to-end (E2E) BER expression in terms of worst E2E SNR for the JS scheme. We also theoretically show that the proposed schemes achieve full diversity. In addition, we compare the performance of the three proposed relay selection schemes by simulations.
暂无评论