On the Performance of the Cache Coding Protocol

Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these a...

Full description

Bibliographic Details
Main Authors: Behnaz Maboudi, Hadi Sehat, Peyman Pahlevani, Daniel E. Lucani
Format: Article
Language:English
Published: MDPI AG 2018-03-01
Series:Information
Subjects:
Online Access:http://www.mdpi.com/2078-2489/9/3/62
id doaj-506a5bbcb40040499085c2d35d100252
record_format Article
spelling doaj-506a5bbcb40040499085c2d35d1002522020-11-24T22:26:45ZengMDPI AGInformation2078-24892018-03-01936210.3390/info9030062info9030062On the Performance of the Cache Coding ProtocolBehnaz Maboudi0Hadi Sehat1Peyman Pahlevani2Daniel E. Lucani3Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan 45195, IranInstitute for Advanced Studies in Basic Sciences (IASBS), Zanjan 45195, IranInstitute for Advanced Studies in Basic Sciences (IASBS), Zanjan 45195, IranDepartment of Engineering, Aarhus University, 8000 Aarhus, DenmarkNetwork coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.http://www.mdpi.com/2078-2489/9/3/62cache codingsource codingabsorbing Markov chain
collection DOAJ
language English
format Article
sources DOAJ
author Behnaz Maboudi
Hadi Sehat
Peyman Pahlevani
Daniel E. Lucani
spellingShingle Behnaz Maboudi
Hadi Sehat
Peyman Pahlevani
Daniel E. Lucani
On the Performance of the Cache Coding Protocol
Information
cache coding
source coding
absorbing Markov chain
author_facet Behnaz Maboudi
Hadi Sehat
Peyman Pahlevani
Daniel E. Lucani
author_sort Behnaz Maboudi
title On the Performance of the Cache Coding Protocol
title_short On the Performance of the Cache Coding Protocol
title_full On the Performance of the Cache Coding Protocol
title_fullStr On the Performance of the Cache Coding Protocol
title_full_unstemmed On the Performance of the Cache Coding Protocol
title_sort on the performance of the cache coding protocol
publisher MDPI AG
series Information
issn 2078-2489
publishDate 2018-03-01
description Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.
topic cache coding
source coding
absorbing Markov chain
url http://www.mdpi.com/2078-2489/9/3/62
work_keys_str_mv AT behnazmaboudi ontheperformanceofthecachecodingprotocol
AT hadisehat ontheperformanceofthecachecodingprotocol
AT peymanpahlevani ontheperformanceofthecachecodingprotocol
AT danielelucani ontheperformanceofthecachecodingprotocol
_version_ 1725751883534958592