Abstract

Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.

Highlights

  • Mobile Ad-hoc Networks (MANET) constitute an infrastructure-less network architecture for mobile devices

  • [5] presents the protocol to cope with this vulnerability and identifies some bounds on the number of transmissions, a precise analytical model to characterize the performance of cache coding in multi-relay networks is missing

  • We focus on a simple relay policy from the cache coding protocol, future work can exploit the Markov chain structure of the problem to derive optimal policies using Markov Decision Processes (MDP) as in recent Random Linear Network Coding (RLNC) work (e.g., [12,13,14])

Read more

Summary

Introduction

Mobile Ad-hoc Networks (MANET) constitute an infrastructure-less network architecture for mobile devices. A pollution attack occurs when a malicious or faulty node injects invalid linear combinations of generation into the network [5] These invalid coded packets can quickly propagate into other packets via recoding in relay nodes and can prevent the destination node from decoding properly [6]. Homomorphic signatures, which are preserved through linear combination and recoding, can be used [7,8,9] This method allows the system to check the integrity of network coded data and to track and find malicious nodes in the network. [5] presents the protocol to cope with this vulnerability and identifies some bounds on the number of transmissions, a precise analytical model to characterize the performance of cache coding in multi-relay networks is missing.

System Model
Heuristic
Source Coding
Unrestricted Coding
Cache Coding
Absorbing Markov Chain Model
Transition Probabilities
Cost of Transitions
Calculation of the Number of Transitions
Calculation of the Number of Transmissions in All Links
Results
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call