successive network coding snc a mitigating mechanism
play

Successive Network Coding (SNC): A Mitigating Mechanism Against - PowerPoint PPT Presentation

Successive Network Coding (SNC): A Mitigating Mechanism Against Eavesdropping Attacks In Network Coding Based Systems Vahid N. Talooki, University of Aveiro, Portugal Network Coding (NC) allows intermediate nodes not only to store and forward


  1. Successive Network Coding (SNC): A Mitigating Mechanism Against Eavesdropping Attacks In Network Coding Based Systems Vahid N. Talooki, University of Aveiro, Portugal Network Coding (NC) allows intermediate nodes not only to store and forward data packets, but also combine digital messages by performing algebraic operations on such packets. NC mechanism achieves to max-flow min-cut capacity for information flow in multicast communications. zil, Jan. 2015 Three main phases of RLNC should be performed sequentially: the source node(s) encodes the native data packets, the intermediate node(s) recodes and forwards them toward sink node(s), and finally sink node decodes the receiving coded packets. There are several key features for an RLNC based system such as: SPCoding School, Brazi : Number of the native data packets in each generation (input native packets) : Number of the native data packets in each generation (input native packets) : Size of each native data packet (number of the symbols) : Number of the output codewords per generation generated by the source node(s) : Number of the output codewords per generation generated by the intermediate node(s) : Size of finite filed � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � ⨁� � � ⨁� � � � � � � � � � � ⨁� � � � � � ⨁� � � � ⨁� � � � � � � � � ⨁� � � � � ⨁� � � � � � ∗ � � � � � � � � � ⨁� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � (a) (b) (a) (b)

  2. The mentioned parameters can influence many properties of the constructed RLNC, including but not limited to: delay, code rate, code redundancy, coefficients overhead, decoding error probability, security of the code, and complexity (of encoding, recoding, and decoding operations). First target : Analysis of NC mechanism regarding i) throughput of encoding and decoding operations, ii) error decoding probability in an error free channel. zil, Jan. 2015 SPCoding School, Brazi

  3. The fact that transitive packets may be mixed and pass through several relay terminals to get the destination, gives opportunity to attackers for several malicious behaviors. Two main security attacks in RLNC based systems, performing by intermediate malicious node(s), are: i) eavesdropping and unauthorized access to content ii) byzantine modifications and corrupting the transitive packets zil, Jan. 2015 SPCoding School, Brazi

  4. successive network coding (SNC) modifies the encoding and decoding phases of NC via concatenating two network coding schemes (LNC and RLNC). The intermediate nodes in SNC scheme are unaware of coding features and so they cannot reach native data packets without paying a cost due to high computational complexity. A malicious unauthorized intermediate node in SNC, that intends to make an eavesdropping attack by decoding the incoming coded packets, should examine many possibilities to guess the correct features of coding. Therefore the complexity of decoding operation for an eavesdroper is high and, consequently, prepares a level of security for the SNC against eavesdropping attacks. zil, Jan. 2015 Second target : proposing a mitigation technique against eavesdroping attack in NC based systems SPCoding School, Brazi

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend