Capacity Assurance in Hostile Networks

نویسندگان

  • Jian Li
  • Jian Ren
چکیده

Linear network coding provides a new communication diagram to significantly increase the network capacity by allowing the relay nodes to encode the incoming messages. However, this communication diagram is fragile to communication errors and pollution attacks. How to combat errors while maintaining the network efficiency is a challenging research problem. In this dissertation, we study how to combat the attacks in both fixed network coding and random network coding. For fixed network coding, we provide a novel methodology to characterize linear network coding through error control coding. We propose to map each linear network coding to an error control coding. Under this mapping, these two codes are essentially identical in algebraic aspects. This methodology provides a new approach to understand network coding scheme. Meanwhile, we propose a novel methodology to characterize a linear network coding through a series of cascaded linear error control codes, and to develop network coding schemes that can combat node compromising attacks. This representation enables us to determine the independent source of errors in the cascaded network level. It could lead to a successful decoding of the original message and locating of the malicious network nodes. We provide a comprehensive theoretical analysis on network coding in both unicast and multicast scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Assurance in Wireless Networks

Overview: Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and adhoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security mea...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

GAME OF COORDINATION FOR BACTERIAL PATTERN FORMATION: A FINITE AUTOMATA MODELLING

In this paper, we use game theory to describe the emergence of self-organization and consequent pattern formation through communicative cooperation in Bacillus subtilis colonies. The emergence of cooperative regime is modelled as an n-player Assurance game, with the bacterial colonies as individual players. The game is played iteratively through cooperative communication, and mediated by exchan...

متن کامل

4 Th Iccrts: C2 and Agility " Mission Assurance in a Distributed Environment " Topic 7: C2 Assessment Tools and Metrics Mission Assurance in a Distributed Environment

The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...

متن کامل

High Information Assurance in Wireless Sensor Networks:

Tremendous advancements in embedded systems, sensors and wireless communications technology have made it possible to build wireless sensor networks (WSNs) consisting of a large number of sensor nodes capable of sensing, processing, and communicating wirelessly in a distributed manner. Indeed, WSNs are being deployed for real-time monitoring of various mission critical applications such as borde...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015