On the Performance of the Cache Coding Protocol

Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.

[1]  Milica Stojanovic,et al.  On Coding for Delay—Network Coding for Time-Division Duplexing , 2012, IEEE Transactions on Information Theory.

[2]  Muriel Medard,et al.  On network coding for security , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  R. Koetter,et al.  An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[4]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[5]  Mario Gerla,et al.  A new approach to coding in content-based MANETs , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[6]  Peyman Pahlevani,et al.  On Optimal Policies for Network-Coded Cooperation: Theory and Implementation , 2015, IEEE Journal on Selected Areas in Communications.

[7]  Robert J. Piechocki,et al.  Novel Performance Analysis of Network Coded Communications in Single-Relay Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[8]  Yuguang Fang,et al.  Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding , 2009, IEEE INFOCOM 2009.

[9]  Robert J. Piechocki,et al.  Reliability of Multicast Under Random Linear Network Coding , 2017, IEEE Transactions on Communications.

[10]  Dan Boneh,et al.  Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.

[11]  Peyman Pahlevani,et al.  On the coded packet relay network in the presence of Neighbors: Benefits of speaking in a crowded room , 2014, 2014 IEEE International Conference on Communications (ICC).

[12]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[13]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[14]  Peyman Pahlevani,et al.  Network-Coded Cooperation Over Time-Varying Channels , 2014, IEEE Transactions on Communications.

[15]  Daniel E. Lucani,et al.  A Markov Chain Model for the Decoding Probability of Sparse Network Coding , 2016, ArXiv.

[16]  Hugo Krawczyk,et al.  Performance Evaluation of Secure Network Coding Using Homomorphic Signature , 2011, 2011 International Symposium on Networking Coding.

[17]  Milica Stojanovic,et al.  Broadcasting in time-division duplexing: A random linear network coding approach , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[18]  Morten Videbæk Pedersen,et al.  Kodo: An Open and Research Oriented Network Coding Library , 2011, Networking Workshops.

[19]  Jonathan Katz,et al.  Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..

[20]  Jonathan Katz,et al.  Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..

[21]  John G. Kemeny,et al.  Finite Markov chains , 1960 .

[22]  Alireza Esfahani,et al.  An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks , 2016, International Journal of Information Security.

[23]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.