在多个中继网络中的高水平性能

V. Eswaramurthy, A. Raghavendra
{"title":"在多个中继网络中的高水平性能","authors":"V. Eswaramurthy, A. Raghavendra","doi":"10.1109/ICCIC.2014.7238455","DOIUrl":null,"url":null,"abstract":"A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"High level performance in multiple relay networks\",\"authors\":\"V. Eswaramurthy, A. Raghavendra\",\"doi\":\"10.1109/ICCIC.2014.7238455\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.\",\"PeriodicalId\":187874,\"journal\":{\"name\":\"2014 IEEE International Conference on Computational Intelligence and Computing Research\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Computational Intelligence and Computing Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2014.7238455\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Computational Intelligence and Computing Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2014.7238455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

中继网络是一种广泛的网络拓扑结构,通常用于网络中,其中源和目的通过一些节点相互连接。在这种网络中,源和目的之间不能直接传输数据,因为源和目的之间的距离大于它们之间的传输距离,因此需要中间节点进行中继。中继节点在应用网络编码时,遵循解码转发协议。在提出的工作中,我们考虑了一个点对点(P2P)网络,其中对等点接收和转发外生数据包的线性组合。为了检查接收到的数据包的完整性,在源节点生成一个密钥签名向量,并将其广播到所有节点,在这些节点中,密钥签名向量用于检查接收到的数据包的完整性。针对伪数据注入效应,提出了几种信息理论算法。在这些工作中使用的网络建模是由一个单一的源,多个中间节点,利用网络编码。我们考虑一个多址中继网络,其中多个源通过多个中继将独立的数据发送到单个目的地,这可能会将伪造的数据插入网络。为了检测恶意中继并清除其中的数据,跟踪位被嵌入到每个源节点的信息数据中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
High level performance in multiple relay networks
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automatic generation control of three area hydro-thermal power systems with electric and mechanical governor Analysis of AQM router of network supporting multiple TCP flows Data analytic engineering and its application in earthquake engineering: An overview Comparative analysis of digital image stabilization by using empirical mode decomposition methods Analytical approach towards packet drop attacks in mobile ad-hoc networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1