Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding

Similar documents
MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING

Cooperative Mobile Internet Access with Opportunistic Scheduling

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

Dynamic Grouping Strategy in Cloud Computing

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Trade-off between Redundancy and Feedback in Wireless Network Communication

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004

Near Optimal Broadcast with Network Coding in Large Sensor Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs

Resource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

Virtual Network Embedding with Substrate Support for Parallelization

Diversity Coded 5G Fronthaul Wireless Networks

Energy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms

Protocol Design and Optimization for

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

Flow Based XOR Network Coding for Lossy Wireless Networks

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher

CE693: Adv. Computer Networking

Utility-Based Data-Gathering in Wireless Sensor Networks with Unstable Links

Physical Layer Security from Inter-Session Interference in Large Wireless Networks

Routing protocols in WSN

A New CDMA Encoding/Decoding Method for on- Chip Communication Network

The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks

Scalable Video Streaming with Helper Nodes using Random Linear Network Coding

Extending SLURM with Support for GPU Ranges

Cooperative Private Searching in Clouds

Parallel Algorithm Design. Parallel Algorithm Design p. 1

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport

Chapter 1 - Introduction

CS 268: Computer Networking. Taking Advantage of Broadcast

13 Sensor networks Gathering in an adversarial environment

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing

Improving Packing Algorithms for Server Consolidation

Channel Dynamics Matter: Forwarding Node Set Selection in Cognitive Radio Networks

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016

Load Balancing with Minimal Flow Remapping for Network Processors

SpaceWire DC-Balanced Character Encoding for SpaceWire

Wireless Network Security Spring 2011

Lec 19 - Error and Loss Control

Communication Fundamentals in Computer Networks

Improving the Efficiency of Multi-site Web Search Engines

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Traffic Engineering with Forward Fault Correction

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Multicasting in ad hoc networks: Energy efficient

The City School Liaquat Campus Class:08 Reinforcement worksheet

Fault-Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks

The Simplex Algorithm for LP, and an Open Problem

Outsourcing Privacy-Preserving Social Networks to a Cloud

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Spoofing Detection in Wireless Networks

An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks

Protecting Network Quality of Service Against Denial of Service Attacks

Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu

Summary of Raptor Codes

Discrete Bandwidth Allocation Considering Fairness and. Transmission Load in Multicast Networks

PRESENTED BY SARAH KWAN NETWORK CODING

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Some Optimization Trade-offs in Wireless Network Coding

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

A Dynamic Channel Allocation Mechanism for IEEE Networks

Optimal Transmission and Scheduling in Delay Tolerant Network

Research on Transmission Based on Collaboration Coding in WSNs

Last topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far:

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks

The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks

Advanced Topics on Wireless Ad Hoc Networks. Lecture 4: Energy-aware Routing Algorithms

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore

Simulation of Scale-Free Networks

An Introduction to Dual Ascent Heuristics

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Chapter 11 Chapter 6

References. Forwarding. Introduction...

XORs in the Air: Practical Wireless Network Coding

Quality of Service Routing. Anunay Tiwari Anirudha Sahoo

Towards Construction of Efficient and Optimally Resilient VPN Topologies by Exactly Calculating Maximum Disjoint Paths

Spectral Graph Multisection Through Orthogonality. Huanyang Zheng and Jie Wu CIS Department, Temple University

On Demand secure routing protocol resilient to Byzantine failures

International Journal of Engineering Trends and Technology (IJETT) Volume 21 Number 10 March 2015

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Transcription:

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

Agenda Introduction Multi-path network coding Fault tolerance and security Fault-tolerant and secure data transmission Problem definition Problem formulation Evaluations Conclusions 2

Introduction Multi-path transmission Fault tolerance (FT) via redundancy Transmitting data through multiple paths Paths with different reliabilities More redundancy increases FT, but increases the cost as well Security Encryption, public/private keys Overhead of encryption methods 3

Network Coding No coding Coding XOR network coding Single multicast Two packets Two destinations d " and d # Capacity of each link: one packet Source Destinatinos 4

Simple System Setting Transmission a file with m packets via n disjoint paths Path failure model If a path fails, all of the transmitted packets over that path fail s ε 1 Υ 1 ε 2 Υ 2... ε n Υ n d Eavesdropper probability: fixed e.g. in wireless networks depends on location of the eavesdropper Objective Balance fault tolerance and security 5

Linear Coding Random linear network coding Linear combinations of the packets q " = α "," p " + α ",# p # + α ",6 p 6 q # = α #," p " + α #,# p # + α #,6 p 6 q 7 = α 8," p " + α 8,# p # + α 7,6 p 6 m=3 linearly independent coded packets are sufficient for decoding, using Gaussian elimination If we code m packets, eavesdropper/destination needs m coded packets to retrieve the original packets m and n can be different numbers Failure prob. s ε 1 Eavesdropping prob. Υ 1 ε 2 Υ 2... ε n Υ n d 6

Fault Tolerance and Security FT m linearly independent coded packets are sufficient for retrieving the original data Security Eavesdropper cannot decode the coded packets unless it has m linearly independent packets Challenge More transmitted coded packets More robust against failures More vulnerable against eavesdropping 7

Problem Formulation With n paths, there are 2 : possible failure/eavesdropping cases R j : set of paths that do not fail S j : set of overheared paths by eavesdropper ith path Failure prob. of the path d H Prob. of paths in set and the rest fail not to fail Prob. that an eavesdropper has only access to data transmitted on the set of paths in Eavesdropping prob. of the ith path 8

Problem Formulation- Case 1 Objective function as a function of FT and security. x i : rate of transmitted packets over path d H Sum of x H can be greater than 1 R and S: power set of the paths Reliability Vulnerability Weighted sum z j y j : Boolean variable to show if packets transmitted over paths in Rj suffice for decoding by destination : Boolean variable to show if packets transmitted over paths in Sj suffice for decoding by eavesdropper 9

Problem Formulation- Case 2 We set reliability threshold as a constraint. We then minimize the eavesdropping probability. Minimizing prob. of successful eavesdropping Reliability threshold t 10

Problem Formulation- Case 3 This is the reverse of Case 2. We set eavesdropping prob. threshold as a constraint. We maximize the reliability. Maximizing the reliability Security threshold t 11

Relaxation to Linear Programming, Case 1 (LP) NP-complete mixed integer and linear programming optimizations Modifying the integer variables to real variables Relaxing integer variables to real 12

Heuristic Solution- HR Complexity of the relaxed linear programming Liner to the number of variables and constraints With n paths, there are 2 : possible failure/eavesdropping cases Heuristic Distribution of the transmissions proportional to the failure rate and eavesdropping prob. of the paths Reward Punishment Reliability of the ith path Eavesdropping prob. of the ith path 13

Evaluations Simulator in Matlab environment We use Linprog tool of Matlab to find the solution of the optimizations 100 simulation runs Two settings LP-n: relaxed optimization case 1(linear programming) with n paths HR-n: heuristic solution with n paths 14

Evaluations- FT Path failure prob. of each path: [0,0.1] Eavesdropping prob. of each path: [0,0.3] Reliability of heuristic (HR) is close to LP HR over-estimates the reliability More paths enhances the reliability 15

Evaluations- Security Security of HR is close to LP HR under-estimates the security More paths reduces the security 16

Evaluations- Utility The utility of HR and LP is close More paths reduces utility (because of the higher eavesdropping prob. selected compared to the path failure prob.) 17

Future Work Using the idea of critical path Finding a critical path in a general graph Impact of multi-path on FT and security More realistic and heterogeneous prob. distributions Impact of correlation Failure prob. and eavesdropping prob. 18

Thank you 19