Fault-Tolerant and Secure Data Transmission Using Random Linear - - PowerPoint PPT Presentation

fault tolerant and secure data transmission using random
SMART_READER_LITE
LIVE PREVIEW

Fault-Tolerant and Secure Data Transmission Using Random Linear - - PowerPoint PPT Presentation

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu Agenda Introduction


slide-1
SLIDE 1

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding

Pouya Ostovari and Jie Wu

Computer & Information Sciences Temple University

Center for Networked Computing http://www.cnc.temple.edu

slide-2
SLIDE 2

Agenda

— Introduction

  • Multi-path network coding
  • Fault tolerance and security

— Fault-tolerant and secure data transmission

  • Problem definition
  • Problem formulation

— Evaluations — Conclusions

2

slide-3
SLIDE 3

Introduction

— Multi-path transmission

  • Fault tolerance (FT) via redundancy

– Transmitting data through multiple paths – Paths with different reliabilities – More redundancy increases FT, but increases the cost as well

  • Security

– Encryption, public/private keys – Overhead of encryption methods

3

slide-4
SLIDE 4

Network Coding

4

No coding Coding XOR network coding

— Single multicast

  • Two packets
  • Two destinations

𝑒"and 𝑒#

  • Capacity of each

link: one packet

Source Destinatinos

slide-5
SLIDE 5

Simple System Setting

5

— Transmission a file with m packets

via n disjoint paths

— Path failure model

  • If a path fails, all of the transmitted packets over that

path fail

— Eavesdropper probability: fixed

  • e.g. in wireless networks depends on location of the

eavesdropper

— Objective

  • Balance fault tolerance and security

s d 𝛷

1

𝜗1 𝜗2 𝛷

2

𝜗𝑜 𝛷

𝑜

...

slide-6
SLIDE 6

— Random linear network coding

  • Linear combinations of the packets
  • m=3 linearly independent coded packets are sufficient

for decoding, using Gaussian elimination

— If we code m packets, eavesdropper/destination needs m

coded packets to retrieve the original packets

— m and n can be different numbers

Linear Coding

6

𝑟" = 𝛽","𝑞" + 𝛽",#𝑞# + 𝛽",6𝑞6 𝑟# = 𝛽#,"𝑞" + 𝛽#,#𝑞# + 𝛽#,6𝑞6 𝑟7 = 𝛽8,"𝑞" + 𝛽8,#𝑞# + 𝛽7,6𝑞6

… Failure prob. Eavesdropping prob.

s d 𝛷

1

𝜗1 𝜗2 𝛷

2

𝜗𝑜 𝛷

𝑜

...

slide-7
SLIDE 7

Fault Tolerance and Security

— FT

  • m linearly independent coded packets are

sufficient for retrieving the original data

— Security

  • Eavesdropper cannot decode the coded packets

unless it has m linearly independent packets

— Challenge

More transmitted coded packets

7

More robust against failures More vulnerable against eavesdropping

slide-8
SLIDE 8

Problem Formulation

8

— With n paths, there are 2: possible

failure/eavesdropping cases

  • 𝑺𝒌: set of paths that do not fail
  • 𝑻𝒌: set of overheared paths by eavesdropper
  • Prob. of paths in set not to fail

and the rest fail

  • Prob. that an eavesdropper has only

access to data transmitted on the set

  • f paths in

Failure prob. of the path 𝑒H Eavesdropping prob.

  • f the ith path

𝑗th path

slide-9
SLIDE 9

Problem Formulation- Case 1

9

— Objective function as a function of FT and security.

  • 𝒚𝒋: rate of transmitted packets over path 𝑒H
  • Sum of 𝑦H can be greater than 1
  • R and S: power set of the paths

Weighted sum Vulnerability Reliability

: Boolean variable to show if packets transmitted over paths in Rj suffice for decoding by destination : Boolean variable to show if packets transmitted over paths in Sj suffice for decoding by eavesdropper

𝒛𝒌 𝒜𝒌

slide-10
SLIDE 10

Problem Formulation- Case 2

10

— We set reliability threshold as a constraint. — We then minimize the eavesdropping probability.

Minimizing prob. of successful eavesdropping Reliability threshold t

slide-11
SLIDE 11

Problem Formulation- Case 3

11

— This is the reverse of Case 2.

  • We set eavesdropping prob. threshold as a constraint.
  • We maximize the reliability.

Maximizing the reliability Security threshold t

slide-12
SLIDE 12

Relaxation to Linear Programming, Case 1 (LP)

12

— NP-complete

  • mixed integer and linear programming optimizations

— Modifying the integer variables to real variables

Relaxing integer variables to real

slide-13
SLIDE 13

Heuristic Solution- HR

13

— Complexity of the relaxed linear programming

  • Liner to the number of variables and constraints
  • With n paths, there are 2: possible failure/eavesdropping cases

— Heuristic

  • Distribution of the transmissions proportional to the failure rate

and eavesdropping prob. of the paths

Reliability of the ith path Eavesdropping prob.

  • f the ith path

Reward Punishment

slide-14
SLIDE 14

Evaluations

14

— Simulator in Matlab environment — We use Linprog tool of Matlab to find the

solution of the optimizations

— 100 simulation runs — Two settings

  • LP-n: relaxed optimization case 1(linear

programming) with n paths

  • HR-n: heuristic solution with n paths
slide-15
SLIDE 15

— Path failure prob. of each path: [0,0.1] — Eavesdropping prob. of each path: [0,0.3] — Reliability of heuristic (HR) is close to LP — HR over-estimates the reliability — More paths enhances the reliability

Evaluations- FT

15

slide-16
SLIDE 16

Evaluations- Security

16

— Security of HR is close to LP — HR under-estimates the security — More paths reduces the security

slide-17
SLIDE 17

Evaluations- Utility

17

— The utility of HR and LP is close — More paths reduces utility (because of the higher

eavesdropping prob. selected compared to the path failure prob.)

slide-18
SLIDE 18

Future Work

18

— Using the idea of critical path

  • Finding a critical path in a general graph

— Impact of multi-path on FT and security

  • More realistic and heterogeneous prob.

distributions

— Impact of correlation

  • Failure prob. and eavesdropping prob.
slide-19
SLIDE 19

Thank you

19