659 research outputs found

    Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams

    Full text link
    IEEE INFOCOM 2010, San Diego, CA, 14-19 March 2010Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges to be addressed, and security is clearly one of the most important challenges. In this paper, we will address the design of secure linear network coding. Specifically, we will investigate the network coding design that can both satisfy the weakly secure requirements and maximize the transmission data rate of multiple unicast streams between the same source and destination pair, which has not been addressed in the literature. In our study, we first prove that the secure unicast routing problem is equivalent to a constrained link-disjoint path problem. We then develop efficient algorithm that can find the optimal unicast topology in a polynomial amount of time. Based on the topology, we design deterministic linear network code that is weakly secure and can be constructed at the source node. And finally, we investigate the potential of random linear code for weakly secure unicast and prove the low bound of the probability that a random linear code is weakly secure.Department of Computin

    An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network

    Get PDF
    Network coding is a progressive enhancement in natural network routing that increases throughput and reliability for unicast, multicast, and even broadcast transmissions. P2P networks are ideal for implementing network coding algorithms for two reasons: I. A P2P network's topology isn't predetermined. As a result, designing a topology that is compatible with the network coding algorithm is much easier. II. Every peer is an end host in this network.  As a result, instead of saving and sending the message, complex network coding operations, such as encoding and decoding, are now easier to perform. The objective of this work is to use the best features of network coding algorithms and properly apply them to P2P networks to create an efficient and reliable data transmission service. The goal of the network coding algorithm is to make better use of network resources and thus increase P2P network capacity. An encoding algorithm that enables an intermediate peer to produce output messages by encoding (that is, computing a function of the data it receives. The decoder's role is to obtain enough encoded packets so that the original information can be recovered. This research work has measured an amount of hypothetical and applied consequences in which the network coding procedure or a variation of it is used to improve performance parameters such as throughput and reliability in P2P network data transmission based on network coding. The comparison of data transmission between network routing and network coding algorithms was the main focus of this paper.  According to our simulations, the new network coding systems can reach 15% to 20% upper throughput than supplementary P2P network routing systems

    Content delivery over multi-antenna wireless networks

    Get PDF
    The past few decades have witnessed unprecedented advances in information technology, which have significantly shaped the way we acquire and process information in our daily lives. Wireless communications has become the main means of access to data through mobile devices, resulting in a continuous exponential growth in wireless data traffic, mainly driven by the demand for high quality content. Various technologies have been proposed by researchers to tackle this growth in 5G and beyond, including the use of increasing number of antenna elements, integrated point-to-multipoint delivery and caching, which constitute the core of this thesis. In particular, we study non-orthogonal content delivery in multiuser multiple-input-single-output (MISO) systems. First, a joint beamforming strategy for simultaneous delivery of broadcast and unicast services is investigated, based on layered division multiplexing (LDM) as a means of superposition coding. The system performance in terms of minimum required power under prescribed quality-of-service (QoS) requirements is examined in comparison with time division multiplexing (TDM). It is demonstrated through simulations that the non-orthogonal delivery strategy based on LDM significantly outperforms the orthogonal strategy based on TDM in terms of system throughput and reliability. To facilitate efficient implementation of the LDM-based beamforming design, we further propose a dual decomposition-based distributed approach. Next, we study an efficient multicast beamforming design in cache-aided multiuser MISO systems, exploiting proactive content placement and coded delivery. It is observed that the complexity of this problem grows exponentially with the number of subfiles delivered to each user in each time slot, which itself grows exponentially with the number of users in the system. Therefore, we propose a low-complexity alternative through time-sharing that limits the number of subfiles that can be received by a user in each time slot. Moreover, a joint design of content delivery and multicast beamforming is proposed to further enhance the system performance, under the constraint on maximum number of subfiles each user can decode in each time slot. Finally, conclusions are drawn in Chapter 5, followed by an outlook for future works.Open Acces

    Implementation of Majority Based voting protocol in group based system with re-ranking

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel �Ziv � Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad-Hoc Networks

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel –Ziv – Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    Multicast Scheduling and Resource Allocation Algorithms for OFDMA-Based Systems: A Survey

    Get PDF
    Multicasting is emerging as an enabling technology for multimedia transmissions over wireless networks to support several groups of users with flexible quality of service (QoS)requirements. Although multicast has huge potential to push the limits of next generation communication systems; it is however one of the most challenging issues currently being addressed. In this survey, we explain multicast group formation and various forms of group rate determination approaches. We also provide a systematic review of recent channel-aware multicast scheduling and resource allocation (MSRA) techniques proposed for downlink multicast services in OFDMA based systems. We study these enabling algorithms, evaluate their core characteristics, limitations and classify them using multidimensional matrix. We cohesively review the algorithms in terms of their throughput maximization, fairness considerations, performance complexities, multi-antenna support, optimality and simplifying assumptions. We discuss existing standards employing multicasting and further highlight some potential research opportunities in multicast systems
    corecore