-
Knowledge Graph Embedding in Intent-Based Networking
Authors:
Kashif Mehmood,
Katina Kralevska,
David Palma
Abstract:
This paper presents a novel approach to network management by integrating intent-based networking (IBN) with knowledge graphs (KGs), creating a more intuitive and efficient pipeline for service orchestration. By map** high-level business intents onto network configurations using KGs, the system dynamically adapts to network changes and service demands, ensuring optimal performance and resource a…
▽ More
This paper presents a novel approach to network management by integrating intent-based networking (IBN) with knowledge graphs (KGs), creating a more intuitive and efficient pipeline for service orchestration. By map** high-level business intents onto network configurations using KGs, the system dynamically adapts to network changes and service demands, ensuring optimal performance and resource allocation. We utilize knowledge graph embedding (KGE) to acquire context information from the network and service providers. The KGE model is trained using a custom KG and Gaussian embedding model and maps intents to services via service prediction and intent validation processes. The proposed intent lifecycle enables intent translation and assurance by only deploying validated intents according to network and resource availability. We evaluate the trained model for its efficiency in service map** and intent validation tasks using simulated environments and extensive experiments. The service prediction and intent verification accuracy greater than 80 percent is achieved for the trained KGE model on a custom service orchestration intent knowledge graph (IKG) based on TMForum's intent common model.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
GRAND Massive Parallel Decoding Framework for Low Latency in Beyond 5G
Authors:
Danilo Gligoroski,
Sahana Sridhar,
Katina Kralevska
Abstract:
We propose a massive parallel decoding GRAND framework. The framework introduces two novelties: 1. A likelihood function for $M$-QAM demodulated signals that effectively reduces the symbol error pattern space from $\mathcal{O}(5^{N/\log_2 M})$ down to $\mathcal{O}(4^{N/\log_2 M})$; and 2. A massively parallel matrix-vector multiplication for matrices of size $K\times N$ ($K \leq N$) that performs…
▽ More
We propose a massive parallel decoding GRAND framework. The framework introduces two novelties: 1. A likelihood function for $M$-QAM demodulated signals that effectively reduces the symbol error pattern space from $\mathcal{O}(5^{N/\log_2 M})$ down to $\mathcal{O}(4^{N/\log_2 M})$; and 2. A massively parallel matrix-vector multiplication for matrices of size $K\times N$ ($K \leq N$) that performs the multiplication in just $\mathcal{O}(\log_2 N)$ steps. We then apply the proposed GRAND approach to codes and operational modulation techniques used in the current 5G NR standard. Our framework is applicable not just to short codewords but to the full range of codewords from 32 bits up to 1024 bits used in the control channels of 5G NR. We also present simulation results with parity-check matrices of Polar codes with rate $R=1/2$ obtained from the 5G NR universal reliability sequence.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Direct-Conflict Resolution in Intent-Driven Autonomous Networks
Authors:
Idris Cinmere,
Kashif Mehmood,
Katina Kralevska,
Toktam Mahmoodi
Abstract:
As network systems evolve, there is an escalating demand for automated tools to facilitate efficient management and configuration. This paper explores conflict resolution in Intent-Based Network (IBN) management, an innovative approach that holds promise for effective network administration, especially within radio access domain. Nevertheless, when multiple intents are in operation concurrently, c…
▽ More
As network systems evolve, there is an escalating demand for automated tools to facilitate efficient management and configuration. This paper explores conflict resolution in Intent-Based Network (IBN) management, an innovative approach that holds promise for effective network administration, especially within radio access domain. Nevertheless, when multiple intents are in operation concurrently, conflicts may emerge, presenting a significant issue that remains under-addressed in the current literature. In response to this challenge, our research expands the range of conflict resolution strategies beyond the established Nash Bargaining Solution (NBS), to incorporate the Weighted Nash Bargaining Solution (WNBS), the Kalai-Smorodinsky Bargaining Solution (KSBS), and the Shannon Entropy Bargaining Solution (SEBS). These methods are employed with the objective to identify optimal parameter values, aiming to ensure fairness in conflict resolution. Through simulations, it is demonstrated that distinct antenna tilt values are yielded as the respective solutions for each method. Ultimately, based on Jain Fairness Index, the KSBS is identified as the most equitable method under the given conditions.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Knowledge-based Intent Modeling for Next Generation Cellular Networks
Authors:
Kashif Mehmood,
Katina Kralevska,
David Palma
Abstract:
Intent-based networking (IBN) facilitates the representation of consumer expectations in a declarative and domain-independent form. However, map** intents to service and resource models remains an open challenge. IBN requires handling existing system data in a structured yet flexible structure way. Knowledge graphs provide an efficient conceptual framework for constructing contexts and organizin…
▽ More
Intent-based networking (IBN) facilitates the representation of consumer expectations in a declarative and domain-independent form. However, map** intents to service and resource models remains an open challenge. IBN requires handling existing system data in a structured yet flexible structure way. Knowledge graphs provide an efficient conceptual framework for constructing contexts and organizing known information. We utilize knowledge graphs to construct a knowledge-based for modeling of intents in the networking domain. In addition, this work also proposes a knowledge-based intent modeling and processing methodology, extending the standardized intent common model proposed by TM Forum for next-generation cellular networks and services. The proposed knowledge-based IBN approach is demonstrated for next-generation cellular services, validating its potential.
△ Less
Submitted 24 July, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Secure Service Implementation with Slice Isolation and WireGuard
Authors:
Sondre Kielland,
Ali Esmaeily,
Katina Kralevska,
Danilo Gligoroski
Abstract:
Network slicing enables the provision of services for different verticals over a shared infrastructure. Nevertheless, security is still one of the main challenges when sharing resources. In this paper, we study how WireGuard can provide an encrypted Virtual Private Network (VPN) tunnel as a service between network functions in 5G setting. The open source management and orchestration entity deploys…
▽ More
Network slicing enables the provision of services for different verticals over a shared infrastructure. Nevertheless, security is still one of the main challenges when sharing resources. In this paper, we study how WireGuard can provide an encrypted Virtual Private Network (VPN) tunnel as a service between network functions in 5G setting. The open source management and orchestration entity deploys and orchestrates the network functions into network services and slices. We create multiple scenarios emulating a real-life cellular network deploying VPN-as-a-Service between the different network functions to secure and isolate network slices. The performance measurements demonstrate from 0.8 Gbps to 2.5 Gbps throughput and below 1ms delay between network functions using WireGuard. The performance evaluation results are aligned with 5G key performance indicators, making WireGuard suited to provide security in slice isolation in future generations of cellular networks.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective
Authors:
Kashif Mehmood,
David Palma,
Katina Kralevska
Abstract:
Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5G (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of kee** society functional, owing to the responsiveness and availability throughout the network. The provisioning of these services requires efficient and agile network man…
▽ More
Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5G (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of kee** society functional, owing to the responsiveness and availability throughout the network. The provisioning of these services requires efficient and agile network management techniques with low-overhead and embedded intelligence. IBN incorporates the service subscribers in a model-driven approach to provision different user-centric services. However, it requires domain-specific and contextual processing of intents for abstracted management of network functions. This work proposes an intent definition for PS and mission critical (MC) services in beyond B5G networks, as well as a processing and orchestration architecture on top of MC push-to-talk (PTT) use case. The simulation results show that MC PTT services adhere to the key performance indicators of access time and mouth-to-ear latency bounded by approximately 250 and 150 milliseconds, respectively, with an additional overhead experienced during the intent processing in the range of 20- 40 milliseconds. This validates the premise of IBN in providing flexible and scalable management and service orchestration solution for PS next generation networks.
△ Less
Submitted 8 May, 2022;
originally announced May 2022.
-
Slicing Scheduling for Supporting Critical Traffic in Beyond 5G
Authors:
Ali Esmaeily,
Katina Kralevska,
Toktam Mahmoodi
Abstract:
One of the most challenging services fifth-generation (5G) mobile network is designed to support, is the critical services in-need of very low latency, and/or high reliability. It is now clear that such critical services will also be at the core of beyond 5G (B5G) networks. While 5G radio design accommodates such supports by introducing more flexibility in timing, how efficiently those services co…
▽ More
One of the most challenging services fifth-generation (5G) mobile network is designed to support, is the critical services in-need of very low latency, and/or high reliability. It is now clear that such critical services will also be at the core of beyond 5G (B5G) networks. While 5G radio design accommodates such supports by introducing more flexibility in timing, how efficiently those services could be scheduled over a shared network with other broadband services remains as a challenge. In this paper, we use network slicing as an enabler for network sharing and propose an optimization framework to schedule resources to critical services via puncturing technique with minimal impact on the regular broadband services. We then thoroughly examine the performance of the framework in terms of throughput and reliability through simulation.
△ Less
Submitted 6 December, 2021; v1 submitted 30 November, 2021;
originally announced December 2021.
-
Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems
Authors:
Nitish Mital,
Katina Kralevska,
Cong Ling,
Deniz Gunduz
Abstract:
We consider a distributed storage system with $n$ nodes, where a user can recover the stored file from any $k$ nodes, and study the problem of repairing $r$ partially failed nodes. We consider \textit{broadcast repair}, that is, $d$ surviving nodes transmit broadcast messages on an error-free wireless channel to the $r$ nodes being repaired, which are then used, together with the surviving data in…
▽ More
We consider a distributed storage system with $n$ nodes, where a user can recover the stored file from any $k$ nodes, and study the problem of repairing $r$ partially failed nodes. We consider \textit{broadcast repair}, that is, $d$ surviving nodes transmit broadcast messages on an error-free wireless channel to the $r$ nodes being repaired, which are then used, together with the surviving data in the local memories of the failed nodes, to recover the lost content. First, we derive the trade-off between the storage capacity and the repair bandwidth for partial repair of multiple failed nodes, based on the cut-set bound for information flow graphs. It is shown that utilizing the broadcast nature of the wireless medium and the surviving contents at the partially failed nodes reduces the repair bandwidth per node significantly. Then, we list a set of invariant conditions that are sufficient for a functional repair code to be feasible. We further propose a scheme for functional repair of multiple failed nodes that satisfies the invariant conditions with high probability, and its extension to the repair of partial failures. The performance of the proposed scheme meets the cut-set bound on all the points on the trade-off curve for all admissible parameters when $k$ is divisible by $r$, while employing linear subpacketization, which is an important practical consideration in the design of distributed storage codes. Unlike random linear codes, which are conventionally used for functional repair of failed nodes, the proposed repair scheme has lower overhead, lower input-output cost, and lower computational complexity during repair.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
Authors:
H. V. Kalpanie Mendis,
Poul E. Heegaard,
Vicente Casares-Giner,
Frank Y. Li,
Katina Kralevska
Abstract:
Network slicing enabled by fifth generation (5G) systems has the potential to satisfy diversified service requirements from different vertical industries. As a typical vertical industry, smart distribution grid poses new challenges to communication networks. This paper investigates the behavior of network slicing for smart grid applications in 5G radio access networks with heterogeneous traffic. T…
▽ More
Network slicing enabled by fifth generation (5G) systems has the potential to satisfy diversified service requirements from different vertical industries. As a typical vertical industry, smart distribution grid poses new challenges to communication networks. This paper investigates the behavior of network slicing for smart grid applications in 5G radio access networks with heterogeneous traffic. To facilitate network slicing in such a network, we employ different 5G radio access numerologies for two traffic classes which have distinct radio resource and quality of service requirements. Three multi-dimensional Markov models are developed to assess the transient performance of network slicing for resource allocation with and without traffic priority. Through analysis and simulations, we investigate the effects of smart grid protection and control traffic on other types of parallel traffic sessions as well as on radio resource utilization.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Intent-driven autonomous network and service management in future cellular networks: A structured literature review
Authors:
Kashif Mehmood,
Katina Kralevska,
David Palma
Abstract:
Intent-driven networks are an essential step** stone in the evolution of network and service management towards a truly autonomous paradigm. User centric intents provide an abstracted means of impacting the design, provisioning, deployment and assurance of network infrastructure and services with the help of service level agreements and minimum network capability exposure. The concept of Intent…
▽ More
Intent-driven networks are an essential step** stone in the evolution of network and service management towards a truly autonomous paradigm. User centric intents provide an abstracted means of impacting the design, provisioning, deployment and assurance of network infrastructure and services with the help of service level agreements and minimum network capability exposure. The concept of Intent Based Networking (IBN) poses several challenges in terms of the contextual definition of intents, role of different stakeholders, and a generalized architecture. In this review, we provide a comprehensive analysis of the state-of-the-art in IBN including the intent description models, intent lifecycle management, significance of IBN and a generalized architectural framework along with challenges and prospects for IBN in future cellular networks. An analytical study is performed on the data collected from relevant studies primarily focusing on the inter-working of IBN with softwarized networking based on NFV/SDN infrastructures. Critical functions required in the IBN management and service model design are explored with different abstract modeling techniques and a converged architectural framework is proposed. The key findings include: (1) benefits and role of IBN in autonomous networking, (2) improvements needed to integrate intents as fundamental policies for service modeling and network management, (3) need for appropriate representation models for intents in domain agnostic abstract manner, and (4) need to include learning as a fundamental function in autonomous networks. These observations provide the basis for in-depth investigation and standardization efforts for IBN as a fundamental network management paradigm in beyond 5G cellular networks.
△ Less
Submitted 9 May, 2023; v1 submitted 10 August, 2021;
originally announced August 2021.
-
Intent-based Network Management and Orchestration for Smart Distribution Grids
Authors:
Kashif Mehmood,
H. V. Kalpanie Mendis,
Katina Kralevska,
Poul E. Heegaard
Abstract:
5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based n…
▽ More
5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Small-Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review
Authors:
Ali Esmaeily,
Katina Kralevska
Abstract:
Develo** specialized cloud-based and open-source testbeds is a practical approach to investigate network slicing functionalities in the fifth-generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost-efficient and small-scale testbeds that partially or fully deploy network slicing. First, we present relevant software packages for the three main func…
▽ More
Develo** specialized cloud-based and open-source testbeds is a practical approach to investigate network slicing functionalities in the fifth-generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost-efficient and small-scale testbeds that partially or fully deploy network slicing. First, we present relevant software packages for the three main functional blocks of the ETSI NFV MANO framework and for emulating the access and core network domains. Second, we define primary and secondary design criteria for deploying network slicing testbeds. These design criteria are later used for comparison between the testbeds. Third, we present the state-of-the-art testbeds, including their design objectives, key technologies, network slicing deployment, and experiments. Next, we evaluate the testbeds according to the defined design criteria and present an in-depth summary table. This assessment concludes with the superiority of some of them over the rest and the most dominant software packages satisfying the ETSI NFV MANO framework. Finally, challenges, potential solutions, and future works of network slicing testbeds are discussed.
△ Less
Submitted 18 April, 2021;
originally announced April 2021.
-
5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
Authors:
Simen Haga,
Ali Esmaeily,
Katina Kralevska,
Danilo Gligoroski
Abstract:
The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress in applying and implementing network slicing in the context of 5G, the security and performance of network slicing still have many open research questions. In this paper, we p…
▽ More
The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress in applying and implementing network slicing in the context of 5G, the security and performance of network slicing still have many open research questions. In this paper, we propose the first OSM-WireGuard framework and its lifecycle. We implement the WireGuard secure network tunneling protocol in a 5G network to provide a VPN-as-a-Service (VPNaaS) functionality for virtualized network functions. We demonstrate that OSM instantiates WireGuard-enabled services up and running in 4 min 26 sec, with potential the initialization time to go down to 2 min 44 sec if the operator prepares images with a pre-installed and up-to-date version of WireGuard before the on-boarding process. We also show that the OSM-WireGuard framework provides considerable enhancement of up to 5.3 times higher network throughput and up to 41% lower latency compared to OpenVPN. The reported results show that the proposed framework is a promising solution for providing traffic isolation with strict latency and throughput requirements.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
GDPR Compliance for Blockchain Applications in Healthcare
Authors:
Anton Hasselgren,
Paul Kengfai Wan,
Margareth Horn,
Katina Kralevska,
Danilo Gligoroski,
Arild Faxvaag
Abstract:
The transparent and decentralized characteristics associated with blockchain can be both appealing and problematic when applied to a healthcare use-case. As health data is highly sensitive, it is also highly regulated to ensure the privacy of patients. At the same time, access to health data and interoperability is in high demand. Regulatory frameworks such as GDPR and HIPAA are, amongst other obj…
▽ More
The transparent and decentralized characteristics associated with blockchain can be both appealing and problematic when applied to a healthcare use-case. As health data is highly sensitive, it is also highly regulated to ensure the privacy of patients. At the same time, access to health data and interoperability is in high demand. Regulatory frameworks such as GDPR and HIPAA are, amongst other objectives, meant to contribute to mitigating the risk of privacy violations in health data. Blockchain features can likely improve interoperability and access control to health data, and at the same time, preserve or even increase, the privacy of patients. Blockchain applications should address compliance with the current regulatory framework to increase real-world feasibility. This exploratory work indicates that published proof-of-concepts in the health domain comply with GDRP, to an extent. Blockchain developers need to make design choices to be compliant with GDPR since currently, none available blockchain platform can show compliance out of the box.
△ Less
Submitted 27 September, 2020;
originally announced September 2020.
-
VerifyMed -- A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept
Authors:
Jens-Andreas Hanssen Rensaa,
Danilo Gligoroski,
Katina Kralevska,
Anton Hasselgren,
Arild Faxvaag
Abstract:
Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to tackle several fundamental trust issues: 1. Checking and confirming that the person they are interacting with is a real person; 2. Validating that the healthcare professional has…
▽ More
Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to tackle several fundamental trust issues: 1. Checking and confirming that the person they are interacting with is a real person; 2. Validating that the healthcare professional has competence within the field in question; and 3. Confirming that the healthcare professional has a valid license to practice. In this paper, we present VerifyMed -- the first proof-of-concept platform, built on Ethereum, for transparently validating the authorization and competence of medical professionals using blockchain technology. Our platform models trust relationships within the healthcare industry to validate professional clinical authorization. Furthermore, it enables a healthcare professional to build a portfolio of real-life work experience and further validates the competence by storing outcome metrics reported by the patients. The extensive realistic simulations show that with our platform, an average cost for creating a smart contract for a treatment and getting it approved is around 1 USD, and the cost for evaluating a treatment is around 50 cents.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G
Authors:
Ali Esmaeily,
Katina Kralevska,
Danilo Gligoroski
Abstract:
Network slicing aims to shape 5G as a flexible, scalable, and demand-oriented network. Research communities deploy small-scale and cost-efficient testbeds in order to evaluate network slicing functionalities. We introduce a novel testbed, called 5GIIK, that provides implementation, management, and orchestration of network slices across all network domains and different access technologies. Our met…
▽ More
Network slicing aims to shape 5G as a flexible, scalable, and demand-oriented network. Research communities deploy small-scale and cost-efficient testbeds in order to evaluate network slicing functionalities. We introduce a novel testbed, called 5GIIK, that provides implementation, management, and orchestration of network slices across all network domains and different access technologies. Our methodology identifies design criteria that are a superset of the features present in other state-of-the-art testbeds and determines appropriate open-source tools for implementing them. 5GIIK is one of the most comprehensive testbeds because it provides additional features and capabilities such as slice provision dynamicity, real-time monitoring of VMs, and VNF-onboarding to different VIMs. We illustrate the potentials of the proposed testbed and present initial results.
△ Less
Submitted 14 May, 2020; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Local Voting: A New Distributed Bandwidth Reservation Algorithm for 6TiSCH Networks
Authors:
Dimitrios J. Vergados,
Katina Kralevska,
Yuming Jiang,
Angelos Michalas
Abstract:
The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** (TSCH) with IPv6. IEEE 802.15.4e TSCH defines only the communication between nodes through a schedule but it does no…
▽ More
The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** (TSCH) with IPv6. IEEE 802.15.4e TSCH defines only the communication between nodes through a schedule but it does not specify how the resources are allocated for communication between the nodes in 6TiSCH networks. We propose a distributed algorithm for bandwidth allocation, called Local Voting, that adapts the schedule to the network conditions. The algorithm tries to equalize the link load (defined as the ratio of the queue length plus the new packet arrivals, over the number of allocated cells) through cell reallocation by calculating the number of cells to be added or released by 6top. Simulation results show that equalizing the load throughout 6TiSCH network provides better fairness in terms of load, reduces the queue sizes and packets reach the root faster compared to representative algorithms from the literature. Local Voting combines good delay performance and energy efficiency that are crucial features for Industrial Internet-of-Things applications.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
SoK of Used Cryptography in Blockchain
Authors:
Mayank Raikwar,
Danilo Gligoroski,
Katina Kralevska
Abstract:
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used…
▽ More
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used in blockchain. To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed in blockchain. In this paper, we thoroughly review and systematize all cryptographic concepts which are already used in blockchain. Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions. We also include possible instantiations of these cryptographic concepts in the blockchain domain. Last but not least, we explicitly postulate 21 challenging problems that cryptographers interested in blockchain can work on.
△ Less
Submitted 2 September, 2019; v1 submitted 20 June, 2019;
originally announced June 2019.
-
Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G
Authors:
Danilo Gligoroski,
Katina Kralevska
Abstract:
The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into an end-to-end network slice instance. In this paper, we propose a mathematical model for network slicing based on combinatorial designs such as Latin squares and rectangles and the…
▽ More
The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into an end-to-end network slice instance. In this paper, we propose a mathematical model for network slicing based on combinatorial designs such as Latin squares and rectangles and their conjugate forms. We extend those designs with attributes that offer different levels of abstraction. For one set of attributes we prove a stability Lemma for the necessary conditions to reach a stationary ergodic stage. We also introduce a definition of utilization ratio function and offer an algorithm for its maximization. Moreover, we provide algorithms that simulate the work of NSMF with randomized or optimized strategies, and we report the results of our implementation, experiments and simulations for one set of attributes.
△ Less
Submitted 23 April, 2019;
originally announced April 2019.
-
Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes
Authors:
Nitish Mital,
Katina Kralevska,
Cong Ling,
Deniz Gunduz
Abstract:
A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized polynomial. The nodes are connected wirelessly, hence all transmissions by helper nodes during a repair round are available to all the nodes being repaired. The scheme is simpl…
▽ More
A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized polynomial. The nodes are connected wirelessly, hence all transmissions by helper nodes during a repair round are available to all the nodes being repaired. The scheme is simple and practical because of low subpacketization, low I/O cost and low computational cost. Achievability of the minimum-bandwidth regenerating (MBR) point, as well as an interior point, on the optimal storage-repair bandwidth tradeoff curve is shown. The subspace properties derived in the paper provide insight into the general properties of functional regenerating codes.
△ Less
Submitted 15 April, 2019;
originally announced April 2019.
-
Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks
Authors:
Dimitrios J. Vergados,
Angelos Michalas,
Katina Kralevska,
Dimitrios D. Vergados
Abstract:
Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches the available bandwidth from the server to the client. MPEG Dynamic Adaptive Streaming over HTTP (DASH) is a widely used standard, that allows the clients to select the resoluti…
▽ More
Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches the available bandwidth from the server to the client. MPEG Dynamic Adaptive Streaming over HTTP (DASH) is a widely used standard, that allows the clients to select the resolution to download based on their own estimations. The algorithm for determining the next segment in a DASH stream is not partof the standard, but it is an important factor in the resulting playback quality. Nowadays vehicles are increasingly equipped with mobile communication devices, and in-vehicle multimedia entertainment systems. In this paper, we evaluate the performance of various DASH adaptation algorithms over a vehicular network. We present detailed simulation results highlighting the advantages and disadvantages of various adaptation algorithms in delivering video content to vehicular users, and we show how the different adaptation algorithms perform in terms of throughput, playback interruption time, and number of interruptions.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Storage-Repair Bandwidth Trade-off for Wireless Caching with Partial Failure and Broadcast Repair
Authors:
Nitish Mital,
Katina Kralevska,
Deniz Gunduz,
Cong Ling
Abstract:
Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in t…
▽ More
Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in their local cache memories, to recover the lost content. The trade-off between the storage capacity and the repair bandwidth is derived. It is shown that utilizing the broadcast nature of the wireless medium and the surviving cache contents at partially failed nodes significantly reduces the required repair bandwidth per node.
△ Less
Submitted 30 June, 2018;
originally announced July 2018.
-
An Explicit Construction of Systematic MDS Codes with Small Sub-packetization for All-Node Repair
Authors:
Katina Kralevska,
Danilo Gligoroski
Abstract:
An explicit construction of systematic MDS codes, called HashTag+ codes, with arbitrary sub-packetization level for all-node repair is proposed. It is shown that even for small sub-packetization levels, HashTag+ codes achieve the optimal MSR point for repair of any parity node, while the repair bandwidth for a single systematic node depends on the sub-packetization level. Compared to other codes i…
▽ More
An explicit construction of systematic MDS codes, called HashTag+ codes, with arbitrary sub-packetization level for all-node repair is proposed. It is shown that even for small sub-packetization levels, HashTag+ codes achieve the optimal MSR point for repair of any parity node, while the repair bandwidth for a single systematic node depends on the sub-packetization level. Compared to other codes in the literature, HashTag+ codes provide from 20% to 40% savings in the average amount of data accessed and transferred during repair.
△ Less
Submitted 25 June, 2018; v1 submitted 8 June, 2018;
originally announced June 2018.
-
Network Traffic Driven Storage Repair
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with bot…
▽ More
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with both local and global parity nodes. We say that the repair strategy is network traffic driven since it is in connection with the concrete system and code parameters: the repair bandwidth of the code, the number of I/O operations, the access time for the contacted parts and the size of the stored file. We show the benefits of having repair duality in one practical example implemented in Hadoop. We also give algorithms for efficient repair of the global parity nodes.
△ Less
Submitted 25 June, 2018; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Applied Erasure Coding in Networks and Distributed Storage
Authors:
Katina Kralevska
Abstract:
The amount of digital data is rapidly growing. There is an increasing use of a wide range of computer systems, from mobile devices to large-scale data centers, and important for reliable operation of all computer systems is mitigating the occurrence and the impact of errors in digital data. The demand for new ultra-fast and highly reliable coding techniques for data at rest and for data in transit…
▽ More
The amount of digital data is rapidly growing. There is an increasing use of a wide range of computer systems, from mobile devices to large-scale data centers, and important for reliable operation of all computer systems is mitigating the occurrence and the impact of errors in digital data. The demand for new ultra-fast and highly reliable coding techniques for data at rest and for data in transit is a major research challenge. Reliability is one of the most important design requirements. The simplest way of providing a degree of reliability is by using data replication techniques. However, replication is highly inefficient in terms of capacity utilization. Erasure coding has therefore become a viable alternative to replication since it provides the same level of reliability as replication with significantly less storage overhead. The present thesis investigates efficient constructions of erasure codes for different applications. Methods from both coding and information theory have been applied to network coding, Optical Packet Switching (OPS) networks and distributed storage systems. The following four issues are addressed: - Construction of binary and non-binary erasure codes; - Reduction of the header overhead due to the encoding coefficients in network coding; - Construction and implementation of new erasure codes for large-scale distributed storage systems that provide savings in the storage and network resources compared to state-of-the-art codes; and - Provision of a unified view on Quality of Service (QoS) in OPS networks when erasure codes are used, with the focus on Packet Loss Rate (PLR), survivability and secrecy.
△ Less
Submitted 4 March, 2018;
originally announced March 2018.
-
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields
Authors:
Danilo Gligoroski,
Kristian Gjosteen,
Katina Kralevska
Abstract:
Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. The practical benefits of using orthogonal matrices come from the fact that the computation of inverse matrices is avoided, by simply using the transpose of the orthogonal matrix. In this paper…
▽ More
Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. The practical benefits of using orthogonal matrices come from the fact that the computation of inverse matrices is avoided, by simply using the transpose of the orthogonal matrix. In this paper, we introduce a new family of matrices over finite fields that we call \emph{Quasi-Binary and Quasi-Orthogonal Matrices}. We call the matrices quasi-binary due to the fact that matrices have only two elements $a, b \in \mathbb{F}_q$, but those elements are not $0$ and $1$. In addition, the reason why we call them quasi-orthogonal is due to the fact that their inverses are obtained not just by a simple transposition, but there is a need for an additional operation: a replacement of $a$ and $b$ by two other values $c$ and $d$. We give a simple relation between the values $a, b, c$ and $d$ for any finite field and especially for finite fields with characteristic 2. Our construction is based on incident matrices from cyclic Latin Rectangles and the efficiency of the proposed algorithm comes from the avoidance of matrix-matrix or matrix-vector multiplications.
△ Less
Submitted 20 January, 2018;
originally announced January 2018.
-
A Load Balancing Algorithm for Resource Allocation in IEEE 802.15.4e Networks
Authors:
Katina Kralevska,
Dimitrios J. Vergados,
Yuming Jiang,
Angelos Michalas
Abstract:
The recently created IETF 6TiSCH working group combines the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** with IPv6 for industrial Internet of Things. We propose a distributed link scheduling algorithm, called Local Voting, for 6TiSCH networks that adapts the schedule to the network conditions. The algorithm tries to equalize the link load (defined as t…
▽ More
The recently created IETF 6TiSCH working group combines the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** with IPv6 for industrial Internet of Things. We propose a distributed link scheduling algorithm, called Local Voting, for 6TiSCH networks that adapts the schedule to the network conditions. The algorithm tries to equalize the link load (defined as the ratio of the queue length over the number of allocated cells) through cell reallocation. Local Voting calculates the number of cells to be added or released by the 6TiSCH Operation Sublayer (6top). Compared to a representative algorithm from the literature, Local Voting provides simultaneously high reliability and low end-to-end latency while consuming significantly less energy. Its performance has been examined and compared to On-the-fly algorithm in 6TiSCH simulator by modeling an industrial environment with 50 sensors.
△ Less
Submitted 24 January, 2018; v1 submitted 20 September, 2017;
originally announced September 2017.
-
Local Voting: Optimal Distributed Node Scheduling Algorithm for Multihop Wireless Networks
Authors:
Dimitrios J. Vergados,
Natalia Amelina,
Yuming Jiang,
Katina Kralevska,
Oleg Granichin
Abstract:
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of…
▽ More
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of average delay, maximum delay, and fairness compared to several representative scheduling algorithms from the literature. Despite being distributed, Local Voting has a very close performance to a centralized algorithm that is considered to have the optimal performance.
△ Less
Submitted 2 March, 2017;
originally announced March 2017.
-
Towards Optimal Distributed Node Scheduling in a Multihop Wireless Network through Local Voting
Authors:
Dimitrios J. Vergados,
Natalia Amelina,
Yuming Jiang,
Katina Kralevska,
Oleg Granichin
Abstract:
In a multihop wireless network, it is crucial but challenging to schedule transmissions in an efficient and fair manner. In this paper, a novel distributed node scheduling algorithm, called Local Voting, is proposed. This algorithm tries to semi-equalize the load (defined as the ratio of the queue length over the number of allocated slots) through slot reallocation based on local information excha…
▽ More
In a multihop wireless network, it is crucial but challenging to schedule transmissions in an efficient and fair manner. In this paper, a novel distributed node scheduling algorithm, called Local Voting, is proposed. This algorithm tries to semi-equalize the load (defined as the ratio of the queue length over the number of allocated slots) through slot reallocation based on local information exchange. The algorithm stems from the finding that the shortest delivery time or delay is obtained when the load is semi-equalized throughout the network. In addition, we prove that, with Local Voting, the network system converges asymptotically towards the optimal scheduling. Moreover, through extensive simulations, the performance of Local Voting is further investigated in comparison with several representative scheduling algorithms from the literature. Simulation results show that the proposed algorithm achieves better performance than the other distributed algorithms in terms of average delay, maximum delay, and fairness. Despite being distributed, the performance of Local Voting is also found to be very close to a centralized algorithm that is deemed to have the optimal performance.
△ Less
Submitted 15 September, 2017; v1 submitted 31 January, 2017;
originally announced January 2017.
-
Repair Duality with Locally Repairable and Locally Regenerating Codes
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level)…
▽ More
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level) that achieve the optimal repair bandwidth of MSR codes or near-optimal repair bandwidth depending on the sub-packetization level. We applied the technique of parity-splitting code construction. We show that the lower bound on the size of the finite field for the presented explicit code constructions can be lower than the one given in the work of Kamath et al. Finally, we discuss the importance of having two ways for node repair with locally regenerating HashTag codes: repair only with local parity nodes or repair with both local and global parity nodes. To the best of the authors' knowledge, this is the first work where this duality in repair process is discussed. We give a practical example and experimental results in Hadoop where we show the benefits of having this repair duality.
△ Less
Submitted 30 August, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
Families of Optimal Binary Non-MDS Erasure Codes
Authors:
Danilo Gligoroski,
Katina Kralevska
Abstract:
We introduce a definition for \emph{Families of Optimal Binary Non-MDS Erasure Codes} for $[n, k]$ codes over $GF(2)$, and propose an algorithm for finding those families by using hill climbing techniques over Balanced XOR codes. Due to the hill climbing search, those families of codes have always better decoding probability than the codes generated in a typical Random Linear Network Coding scenar…
▽ More
We introduce a definition for \emph{Families of Optimal Binary Non-MDS Erasure Codes} for $[n, k]$ codes over $GF(2)$, and propose an algorithm for finding those families by using hill climbing techniques over Balanced XOR codes. Due to the hill climbing search, those families of codes have always better decoding probability than the codes generated in a typical Random Linear Network Coding scenario, i.e., random linear codes. We also show a surprising result that for small values of $k$, the decoding probability of our codes in $GF(2)$ is very close to the decoding probability of the codes obtained by Random Linear Network Coding but in the higher finite field $GF(4)$.
△ Less
Submitted 8 September, 2016;
originally announced September 2016.
-
HashTag Erasure Codes: From Theory to Practice
Authors:
Katina Kralevska,
Danilo Gligoroski,
Rune E. Jensen,
Harald Øverby
Abstract:
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS co…
▽ More
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in \cite{7463553} without any specific name. Due to the resemblance between the hashtag sign \# and the procedure of the code construction, we call them in this paper \emph{HashTag Erasure Codes (HTECs)}. HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level $α$, where $α\leq r^{\lceil \sfrac{k}{r} \rceil}$, among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
△ Less
Submitted 3 July, 2017; v1 submitted 8 September, 2016;
originally announced September 2016.
-
Balanced Locally Repairable Codes
Authors:
Katina Kralevska,
Danilo Gligoroski,
Harald Øverby
Abstract:
We introduce a family of balanced locally repairable codes (BLRCs) $[n, k, d]$ for arbitrary values of $n$, $k$ and $d$. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number $l$, a…
▽ More
We introduce a family of balanced locally repairable codes (BLRCs) $[n, k, d]$ for arbitrary values of $n$, $k$ and $d$. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number $l$, and we allow the repair locality to be either $l$ or $l+1$. This gives us the flexibility to construct BLRCs for arbitrary values of $n$ and $k$ which partially solves the open problem of finding a general construction of LRCs. Additionally, the relaxed locality criteria gives us an opportunity to search for BLRCs that have a low repair locality even when double failures occur. We use metrics such as a storage overhead, an average repair bandwidth, a Mean Time To Data Loss (MTTDL) and an update complexity to compare the performance of BLRCs with existing LRCs.
△ Less
Submitted 3 July, 2017; v1 submitted 14 July, 2016;
originally announced July 2016.
-
General Sub-packetized Access-Optimal Regenerating Codes
Authors:
Katina Kralevska,
Danilo Gligoroski,
Harald Øverby
Abstract:
This paper presents a novel construction of $(n,k,d=n-1)$ access-optimal regenerating codes for an arbitrary sub-packetization level $α$ for exact repair of any systematic node. We refer to these codes as general sub-packetized because we provide an algorithm for constructing codes for any $α$ less than or equal to $r^{\lceil \frac{k}{r} \rceil}$ where $\frac{k}{r}$ is not necessarily an integer.…
▽ More
This paper presents a novel construction of $(n,k,d=n-1)$ access-optimal regenerating codes for an arbitrary sub-packetization level $α$ for exact repair of any systematic node. We refer to these codes as general sub-packetized because we provide an algorithm for constructing codes for any $α$ less than or equal to $r^{\lceil \frac{k}{r} \rceil}$ where $\frac{k}{r}$ is not necessarily an integer. This leads to a flexible construction of codes for different code rates compared to existing approaches. We derive the lower and the upper bound of the repair bandwidth. The repair bandwidth depends on the code parameters and $α$. The repair process of a failed systematic node is linear and highly parallelized, which means that a set of $\lceil \fracα{r} \rceil$ symbols is independently repaired first and used along with the accessed data from other nodes to recover the remaining symbols.
△ Less
Submitted 14 July, 2016;
originally announced July 2016.
-
Coded Packet Transport for Optical Packet/Burst Switched Networks
Authors:
Katina Kralevska,
Harald Oeverby,
Danilo Gligoroski
Abstract:
This paper presents the Coded Packet Transport (CPT) scheme, a novel transport mechanism for Optical Packet/Burst Switched (OPS/OBS) networks. The CPT scheme exploits the combined benefits of source coding by erasure codes and path diversity to provide efficient means for recovering from packet loss due to contentions and path failures, and to provide non-cryptographic secrecy. In the CPT scheme,…
▽ More
This paper presents the Coded Packet Transport (CPT) scheme, a novel transport mechanism for Optical Packet/Burst Switched (OPS/OBS) networks. The CPT scheme exploits the combined benefits of source coding by erasure codes and path diversity to provide efficient means for recovering from packet loss due to contentions and path failures, and to provide non-cryptographic secrecy. In the CPT scheme, erasure coding is employed at the OPS/OBS ingress node to form coded packets, which are transmitted on disjoint paths from the ingress node to an egress node in the network. The CPT scheme allows for a unified view of Quality of Service (QoS) in OPS/OBS networks by linking the interactions between survivability, performance and secrecy. We provide analytical models that illustrate how QoS aspects of CPT are affected by the number of disjoint paths, packet overhead and processing delay.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Minimal Header Overhead for Random Linear Network Coding
Authors:
Danilo Gligoroski,
Katina Kralevska,
Harald Oeverby
Abstract:
The energy used to transmit a single bit of data between the devices in wireless networks is equal to the energy for performing hundreds of instructions in those devices. Thus the reduction of the data necessary to transmit, while kee** the same functionality of the employed algorithms is a formidable and challenging scientific task. We describe an algorithm called Small Set of Allowed Coefficie…
▽ More
The energy used to transmit a single bit of data between the devices in wireless networks is equal to the energy for performing hundreds of instructions in those devices. Thus the reduction of the data necessary to transmit, while kee** the same functionality of the employed algorithms is a formidable and challenging scientific task. We describe an algorithm called Small Set of Allowed Coefficients (SSAC) that produces the shortest header overhead in random linear network coding schemes compared with all other approaches reported in the literature. The header overhead length is 2 to 7 times shorter than the length achieved by related compression techniques. For example, SSAC algorithm compresses the length of the header overhead in a generation of 128 packets to 24 bits, while the closest best result achieved by an algorithm based on error correcting codes has a header overhead length of 84 bits in $GF(16)$ and 224 bits in $GF(256)$. We show that the header length in SSAC does not depend on the size of the finite field where the operations are performed, i.e., it just depends on the number of combined packets $m$.
△ Less
Submitted 24 January, 2016;
originally announced January 2016.
-
Balanced XOR-ed Coding
Authors:
Katina Kralevska,
Danilo Gligoroski,
Harald Oeverby
Abstract:
This paper concerns with the construction of codes over $GF(2)$ which reach the max-flow for single source multicast acyclic networks with delay. The coding is always a bitwise XOR of packets with equal lengths, and is based on highly symmetrical and balanced designs. For certain setups and parameters, our approach offers additional plausible security properties: an adversary needs to eavesdrop at…
▽ More
This paper concerns with the construction of codes over $GF(2)$ which reach the max-flow for single source multicast acyclic networks with delay. The coding is always a bitwise XOR of packets with equal lengths, and is based on highly symmetrical and balanced designs. For certain setups and parameters, our approach offers additional plausible security properties: an adversary needs to eavesdrop at least max-flow links in order to decode at least one original packet.
△ Less
Submitted 23 January, 2016;
originally announced January 2016.