Capacity Assurance in Hostile Networks

Similar documents
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Modern Erasure Codes for Distributed Storage Systems

Modern Erasure Codes for Distributed Storage Systems

Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF)

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Reliable Communications over Multihop Networks Under Routing Attacks

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

PUBLICATIONS. Journal Papers

The Encoding Complexity of Network Coding

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Scalable Data Center Multicast. Reporter: 藍于翔 Advisor: 曾學文

Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks

Schemes against Pollution Attack in Network Coding: A Survey

Link-Based Wormhole Detection in Wireless Sensor Networks

NECO: Network Coding Simulator

Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Insecure Provable Secure Network Coding

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

Enabling Node Repair in Any Erasure Code for Distributed Storage

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. Tianli Zhou & Chao Tian Texas A&M University

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

IN recent years, the amount of traffic has rapidly increased

Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

A Survey on Message Authentication Schemes in Wireless Sensor Networks

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

A New Enhancement for Security Mechanism in Routers

International Journal of Intellectual Advancements and Research in Engineering Computations

Introduction to Sync

Low Complexity Opportunistic Decoder for Network Coding

Energy Aware Node Placement Algorithm for Wireless Sensor Network

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs

Information-theoretically Secure Regenerating Codes for Distributed Storage

All About Erasure Codes: - Reed-Solomon Coding - LDPC Coding. James S. Plank. ICL - August 20, 2004

Coding Techniques for Distributed Storage Systems

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

Erasure Codes for Heterogeneous Networked Storage Systems

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

UIUC. Application of Game Theory to High Assurance Cloud Computing. 20 September 2016

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

PERFORMANCE ANALYSIS OF HIGH EFFICIENCY LOW DENSITY PARITY-CHECK CODE DECODER FOR LOW POWER APPLICATIONS

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks

Your Data is in the Cloud: Who Exactly is Looking After It?

Cascaded Coded Distributed Computing on Heterogeneous Networks

On Data Parallelism of Erasure Coding in Distributed Storage Systems

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Raptor Codes for P2P Streaming

Heterogeneity Increases Multicast Capacity in Clustered Network

Multi-Tier Mobile Ad Hoc Routing

Sleep/Wake Aware Local Monitoring (SLAM)

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

IMPROVEMENT OF PATH IN DSR IN MANET USING AN INVERTED LIST BASED NODE ANALYSIS

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

MOBILE VIDEO COMMUNICATIONS IN WIRELESS ENVIRONMENTS. Jozsef Vass Shelley Zhuang Jia Yao Xinhua Zhuang. University of Missouri-Columbia

A Novel Network Coded Parallel Transmission Framework for High-Speed Ethernet

A Study on Issues Associated with Mobile Network

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Mai Abdelhakim PROFESSIONAL EXPERIENCE

Web Security Vulnerabilities: Challenges and Solutions

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

Wireless Networks Research Seminar April 22nd 2013

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Coded Distributed Computing: Fundamental Limits and Practical Challenges

Impacts of Brooks Iyengar Algorithm on PhD Dissertations

On Secret Sharing Schemes based on Regenerating Codes

An Efficient Key Management Scheme for Heterogeneous Sensor Networks

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

Research on Transmission Based on Collaboration Coding in WSNs

Research Directions in Low-Power Wireless Networks

IEEE Data Storage Technical Committee Update. Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee

Optimally-balanced Hash Tree Generation in Ad Hoc Networks

AVALANCHE: A NETWORK CODING ANALYSIS

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

CERIAS Tech Report VERIFYING DATA INTEGRITY IN PEER-TO-PEER VIDEO STREAMING. by Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Enhancements and Performance Evaluation of Wireless Local Area Networks

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Error Control Coding for MLC Flash Memories

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing

Transcription:

PhD Dissertation Defense Wednesday, October 7, 2015 3:30 pm - 5:30 pm 3112 Engineering Building Capacity Assurance in Hostile Networks By: Jian Li Advisor: Jian Ren ABSTRACT Linear network coding provides a new communication diagram to significantly increase the network capacity by allowing the relay nodes to encode the incoming messages. However, this communication diagram is fragile to communication errors and pollution attacks. How to combat errors while maintaining the network efficiency is a challenging research problem. In this dissertation, we study how to combat the attacks in both fixed network coding and random network coding. For fixed network coding, we provide a novel methodology to characterize linear network coding through error control coding. We propose to map each linear network coding to an error control coding. Under this mapping, these two codes are essentially identical in algebraic aspects. This methodology provides a new approach to understand network coding scheme. Meanwhile, we propose a novel methodology to characterize a linear network coding through a series of cascaded linear error control codes, and to develop network coding schemes that can combat node compromising attacks. This representation enables us to determine the independent source of errors in the cascaded network level. It could lead to a successful decoding of the original message and locating of the malicious network nodes. We provide a comprehensive theoretical analysis on network coding in both unicast and multicast scenarios. 1

For random network coding, we propose a new error-detection and error-correction (EDEC) scheme to detect and remove malicious attacks. The proposed EDEC scheme can maintain throughput unchanged when moderate network pollution exists with only a slight increase in computational overhead. Then we propose an improved LEDEC scheme by integrating the low-density parity check (LDPC) decoding. Our theoretical analysis, performance evaluation and simulation results using ns-2 simulator demonstrate that the LEDEC scheme can guarantee a high throughput even for heavily polluted network environment. Distributed storage is a natural application of network coding. It plays a crucial role in the current cloud computing framework in that it can provide a design trade-off between security management and storage. Regenerating code based approach attracted unique attention because it can achieve the minimum storage regeneration (MSR) point and minimum bandwidth regeneration (MBR) point for distributed storage. Since then, Reed-Solomon code based regenerating codes (RS-MSR code and RS-MBR code) were developed. They can also maintain the MDS (maximum distance separable) property in code reconstruction. However, in the hostile network where the storage nodes can be compromised and the packets can be tampered with, the storage capacity of the network can be significantly affected. In this dissertation, we propose a Hermitian code based minimum storage regenerating (H-MSR) code and a Hermitian code based minimum bandwidth regenerating (H-MBR) code. We first prove that they can achieve the theoretical MSR bound and MBR bound respectively. We then propose data regeneration and reconstruction algorithms for the H-MSR code and the H-MBR code in both error-free networks and hostile networks. Theoretical evaluation shows that our proposed schemes can detect the erroneous decodings and correct more errors in the hostile network than the RS-MSR code and the RS-MBR code with the same code rate respectively. Our analysis also demonstrates that the proposed H-MSR/H-MBR codes have lower complexity than the RS-MSR/RS-MBR codes in both code regeneration and code reconstruction. Inspired by the novel construction of Hermitian code based regenerating codes, a natural 2

question is how to construct optimal regenerating codes based on the layered structure like Hermitian code in distributed storage. Compared to the Hermitian based code, these codes have simpler structures and are easier to understand and implement. We propose two optimal constructions of MSR codes through rate-matching in hostile networks: 2-layer rate-matched MSR code and m-layer rate-matched MSR code. For the 2-layer code, we can achieve the optimal storage efficiency for given system requirements. Our comprehensive analysis shows that our code can detect and correct malicious nodes with higher storage efficiency compared to the RS-MSR code. Then we propose the m-layer code by extending the 2-layer code and achieve the optimal error correction efficiency by matching the code rate of each layer s MSR code. We also demonstrate that the optimized parameter can achieve the maximum storage capacity under the same constraint. Compared to the RS-MSR code, our code can achieve much higher error correction efficiency. The optimized m-layer code also has better error correction capability than the H-MSR code. Peer-Reviewed Journal Publications [1] Jian Li, Yun Li, Jian Ren and Jie Wu, Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Volume 25, Issue 5, pp. 1223-1232. [2] Jian Li, Tongtong Li and Jian Ren, Combat Pollution Attacks in Network Coding, submitted to IEEE/ACM Transactions on Networking, under revision. [3] Jian Li, Tongtong Li and Jian Ren, Hermitian Code Based Regenerating Codes - Beyond the MDS Bound in Distributed Cloud Storage, submitted to IEEE Transactions on Information Theory, under revision. [4] Jian Li, Tongtong Li and Jian Ren, Optimal Construction of Regenerating Code in Hostile Networks through Rate-matching, to be submitted to IEEE Transactions on 3

Information Theory. Conference Proceedings [1] Jian Li, Tongtong Li and Jian Ren, Beyond the MDS Bound in Distributed Cloud Storage, IEEE INFOCOM 2014, Apr. 2014, Toronto, Canada, pp. 307-315. (Acceptance Rate: 320/1645=19.4%) [2] Jian Li, Kai Zhou and Jian Ren, Security and Efficiency Trade-offs for Cloud Computing and Storage, submitted to International Symposium on Resilient Communications Systems 2015. [3] Jian Li, Tongtong Li and Jian Ren, Rate-matched Regenerating Code in Hostile Networks, IEEE ICC 2015. [4] Jian Li, Tongtong Li and Jian Ren, Secure Regenerating Code, IEEE Globecom 2014, Austin, TX, USA, pp. 770-774. [5] Jian Li, Tongtong Li and Jian Ren, Combating Network Pollution Attacks: A Cascaded Error-Control Coding Approach, IEEE Globecom 2013, Dec. 2013, Atlanta, GA, USA, pp. 844-848. [6] Jian Li, Chao Yang, Di Tang and Jian Ren, Characterization of Linear Network Coding using Error-Control Coding, IEEE Globecom 2012, Dec. 2012, Anaheim, California, USA, pp. 1066-1071. [7] Yun Li, Jian Li, Jian Ren and Jie Wu, Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks, IEEE INFOCOM 2012, Mar. 2012, Orlando, Florida, USA, pp. 3071-3075. (Acceptance Rate: 378/1547=24.4%) 4

[8] Wenbo Qiao, Jian Li, Jian Ren, An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding, IEEE Globecom 2011, Dec. 2011, Houston, Texas, USA, pp. 1-5. 5