Theory and Applications of Network Error Correction Coding

Network error correction coding (NEC) has attracted a lot of attention in recent years because of its potential usefulness in network communications. Several kinds of errors may occur in communication networks using network coding. This includes random errors, erasures, and errors caused by attacks from malicious nodes. The main goal of the theory of NEC is to deal with these errors efficiently. Two kinds of network models have been considered in network coding theory: coherent and noncoherent networks. A network is called coherent if network characteristics are known to senders and receivers, and called noncoherent if they are unknown. Although both scenarios are theoretically interesting, the noncoherent network model fits better to the requirements in most applications. So far, there are two lines of research in the theory of NEC. One approach follows the classical method by representing messages by sequences and the other approach uses the theory of rank metric codes for network error correction by representing messages by subspaces. Following both approaches, basic theories have been developed. This includes the formulation of channel models, the characterization of error correction/detection capabilities for various kinds of errors, the derivation of bounds for NECs, the study of existence and constructions of optimal codes, the development of encoding and decoding techniques, and the design of code suitable for real applications. In this paper, we summarize some important contributions in this research direction.

[1]  Muriel Médard,et al.  An algebraic watchdog for wireless network coding , 2009, 2009 IEEE International Symposium on Information Theory.

[2]  R. Yeung,et al.  NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .

[3]  Zhen Zhang,et al.  Weight properties of network codes , 2008, Eur. Trans. Telecommun..

[4]  R. Ahlswede,et al.  On error control codes for random network coding , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[5]  Tracey Ho,et al.  Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.

[6]  Aditya Ramamoorthy,et al.  Protection Against Link Errors and Failures Using Network Coding , 2011, IEEE Trans. Commun..

[7]  Frank R. Kschischang,et al.  A Rank-Metric Approach to Error Control in Random Network Coding , 2007, IEEE Transactions on Information Theory.

[8]  Zhen Zhang,et al.  Network Generalized Hamming Weight , 2009, IEEE Transactions on Information Theory.

[9]  Farshad Lahouti,et al.  Robust Network Coding in the Presence of Link Failure Using a Multicast Rate-Diversity Trade off , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.

[10]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[11]  Tracey Ho,et al.  On noncoherent correction of network errors and erasures with random locations , 2009, 2009 IEEE International Symposium on Information Theory.

[12]  Zhen Zhang,et al.  Network Error Correction Coding in Packetized Networks , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Chengdu.

[13]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.

[14]  Bilal Zafar Network Coding Employing Product Coding at Relay Stations , 2009 .

[15]  Shuo-Yen Robert Li,et al.  Network Coding Theory - Part I: Single Source , 2005, Found. Trends Commun. Inf. Theory.

[16]  Zhen Zhang,et al.  On the limiting behavior of Random Linear Network Codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[17]  Zhen Zhang,et al.  On Randomized Linear Network Codes and Their Error Correction Capabilities , 2009, IEEE Transactions on Information Theory.

[18]  Shenghao Yang,et al.  Refined Coding Bounds for Network Error Correction , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.

[19]  Zhen Zhang,et al.  Linear Network Error Correction Codes in Packet Networks , 2008, IEEE Transactions on Information Theory.

[20]  Tracey Ho,et al.  Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[21]  Maximilien Gadouleau,et al.  On the Decoder Error Probability of Rank Metric Codes and Constant-Dimension Codes , 2008, ArXiv.

[22]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[23]  R. Koetter,et al.  An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[24]  B. Sundar Rajan,et al.  Network Error Correction for Unit-Delay, Memory-Free Networks Using Convolutional Codes , 2010, 2010 IEEE International Conference on Communications.

[25]  Zhen Zhang Some Recent Progresses in Network Error Correction Coding Theory , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.

[26]  Tracey Ho,et al.  Network Coding: An Introduction , 2008 .

[27]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[28]  Frank R. Kschischang,et al.  Robust Network Coding in the Presence of Untrusted Nodes , 2008, IEEE Transactions on Information Theory.

[29]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[30]  Farshad Lahouti,et al.  Block Network Error Control Codes and Syndrome-based Complete Maximum Likelihood Decoding , 2008, ArXiv.

[31]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[32]  Zhen Zhang,et al.  Some Key Problems in Network Error Correction Coding Theory , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.

[33]  Sachin Katti,et al.  The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .

[34]  Christina Fragouli,et al.  Network Coding Applications , 2008, Found. Trends Netw..

[35]  Shenghao Yang,et al.  Construction of Linear Network Codes that Achieve a Refined Singleton Bound , 2007, 2007 IEEE International Symposium on Information Theory.

[36]  Shenghao Yang,et al.  Refined Coding Bounds and Code Constructions for Coherent Network Error Correction , 2009, IEEE Transactions on Information Theory.

[37]  K. K. Chi,et al.  Analysis of network error correction based on network coding , 2005 .

[38]  C. Fragouli,et al.  On Locating Byzantine Attackers , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.

[39]  R. Yeung,et al.  NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .

[40]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[41]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[42]  F. Kschischang,et al.  Adversarial error correction for network coding: Models and metrics , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[43]  Raymond W. Yeung,et al.  Information Theory and Network Coding , 2008 .

[44]  Christina Fragouli,et al.  Compressed network coding vectors , 2009, 2009 IEEE International Symposium on Information Theory.

[45]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[46]  Christina Fragouli,et al.  Multi-terminal secrecy in a linear non-coherent packetized networks , 2012, 2012 International Symposium on Network Coding (NetCod).

[47]  Peter Sanders,et al.  Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.

[48]  Frank R. Kschischang,et al.  Universal Secure Network Coding via Rank-Metric Codes , 2008, IEEE Transactions on Information Theory.

[49]  Ning Cai,et al.  Network coding and error correction , 2002, Proceedings of the IEEE Information Theory Workshop.

[50]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[51]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[52]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.

[53]  Tracey Ho,et al.  Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.

[54]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[55]  M. Kurihara On decoding error correcting codes for linear network coding 栗原正純 , 2008 .

[56]  Michael Langberg,et al.  Adversarial models and resilient schemes for network coding , 2008, 2008 IEEE International Symposium on Information Theory.

[57]  Raymond W. Yeung,et al.  Secure error-correcting (SEC) network codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[58]  Christina Fragouli,et al.  Network Coding Fundamentals , 2007, Found. Trends Netw..

[59]  Ryutaroh Matsumoto Construction algorithm for network error-correcting codes attaining the Singleton bound , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[60]  Ning Cai,et al.  Network Error Correction, I: Basic Concepts and Upper Bounds , 2006, Commun. Inf. Syst..