TY - JOUR
T1 - Multiple-access network information-flow and correction codes
AU - Dikaliotis, Theodoros K.
AU - Ho, Tracey
AU - Jaggi, Sidharth
AU - Vyetrenko, Svitlana
AU - Yao, Hongyi
AU - Effros, Michelle
AU - Kliewer, Jrg
AU - Erez, Elona
N1 - Funding Information:
Manuscript received April 18, 2010; revised August 03, 2010; accepted September 24, 2010. Date of current version January 19, 2011. The work of T.K. Dikaliotis, S. Vyetrenko, T. Ho, M. Effros, and E. Erez was supported by BAE Systems National Security Solutions, Inc. under subcontract #069153 and by the Defense Advanced Research Projects Agency (DARPA) and the Space and Naval Warfare System Center (SPAWARSYSCEN), San Diego, CA, under Contract N66001-08-C-2013, AFOSR under Grant 5710001972, Caltech’s Lee Center for Advanced Networking, and NSF Grant CNS-0905615. The work
Funding Information:
of S. Jaggi was supported by the RGC GRF Grants 412608 and 412809, the
Funding Information:
CUHK MoE-Microsoft Key Laboratory of Human-centric Computing and Communications,andProjectNo. AoE/E-02/08fromthe UniversityGrantsInterface Technologies,the Instituteof TheoreticalComputerScienceand NFORMATION dissemination can be optimized with the Committee of the Hong Kong Special Administrative Region, China. The I use of network coding. Network coding maximizes the net- work of H. Yao was supported by the National Natural Science Foundation of work throughput in multicast transmission scenarios [1]. For ofChinaGrant2007CB807900and 2007CB807901,theHi-TechresearchChinaGrant61033001and61073174,theNationalBasicResearchProgram this scenario, it was shown in [2] that linear network coding andDevelopmentProgramofChinaGrant2006AA10Z216.TheworkofJ. suffices to achieve the max-flow capacity from the source to Kliewer was supported by NSF Grant CCF-0830666. The first five authors, T. each receiving node. An algebraic framework for linear network tothisworkandthey arenamedinalphabeticalorder.ThematerialinthisK.Dikaliotis,T.Ho,S.Jaggi,S.Vyetrenko,andH.Yaohadequalcontribution coding was presented in [3]. Further, the linear combinations paperwaspresented(inpart)atthe2009IEEEInternationalSymposiumon employed at network nodes can be randomly selected in a dis- Information Theory, Seoul, South Korea, July 2009, and at ITW 2010, Dublin, tributed manner; if the coding field size is sufficiently large the Thispaperispartofthespecialissueon“FacetsofCodingTheory:FromIreland,Aug./Sep.2010. max-flow capacity is achieved with high probability [4]. AlgorithmstoNetworks,”dedicatedtothescientificlegacyofRalfKoetter. However, network coding is vulnerable to malicious attacks T. K. Dikaliotis and T. Ho are with the Department of Electrical Engineering, from rogue users. Due to the mixing operations at internal Pasadena,CA91125USA(e-mail:[email protected];[email protected]).EngineeringandAppliedScienceDivision,CaliforniaInstituteofTechnology, nodes, the presence of even a small number of adversarial S.JaggiiswiththeDepartmentofInformationEngineering,TheChinese nodes can contaminate the majority of packets in a network, University of Hong Kong, Shatin N.T., Hong Kong (e-mail:sidjaggi@gmail. preventing sinks from decoding. In particular, an error on even S.VyetrenkoiswiththeDepartmentofElectricalEngineering,Engineeringcom;[email protected]). a single link might propagate to multiple downstream links andAppliedScienceDivision,CaliforniaInstituteofTechnology,Pasadena,CA via network coding, which might lead to the extreme case 91125 USA (e-mail: [email protected]; [email protected]). in which all incoming links at the sink are in error. This is University,Beijing100084,China.HeisnowwiththeCaliforniaInstituteofH.YaowaswiththeInstituteofTheoreticalComputerScience,Tsinghua shown in Fig. 1, where the action of a single malicious node Technology,Pasadena,CA91125USA(e-mail:[email protected]). contaminates all incoming links of the sink node due to packet M. Effros is with the Department of Electrical Engineering, California Insti-mixing at downstream nodes. J.KlieweriswiththeKlipschSchoolofElectricalandComputerEngineering,tuteofTechnology,Pasadena,CA91125USA(e-mail:[email protected]). In such a case, network error-correction (introduced in [5]) NewMexicoStateUniversity,LasCruces,NM88003-8001USA(e-mail:jk- rather than classical forward error-correction (FEC) is required, [email protected]). since the former exploits the fact that the errors at the sinks are 91125USA.SheisnowwiththeSchoolofEngineeringandAppliedScience,E.ErezwaswiththeCaliforniaInstituteofTechnology,Pasadena,California correlated, whereas the latter assumes independent errors. YaleUniversity,NewHaven,CT06520USA(e-mail:[email protected]). A number of papers e.g., [6]–[8] have characterized the set Communicated by M. Médard, Associate Editor for the special issue on of achievable communication rates over networks containing Colorversionsofoneormoreofthefiguresinthispaperareavailableonline“FacetsofCodingTheory:FromAlgorithmstoNetworks.” hidden malicious jamming and eavesdropping adversaries, and athttp://ieeexplore.ieee.org. given corresponding communication schemes. The latest code Digital Object Identifier 10.1109/TIT.2010.2095130 constructions (for instance [8] and [9]) have excellent parame-
PY - 2011/2
Y1 - 2011/2
N2 - This work considers the multiple-access multicast error-correction scenario over a packetized network with z malicious edge adversaries. The network has min-cut m and packets of length ℓ , and each sink demands all information from the set of sources S. The capacity region is characterized for both a side-channel model (where sources and sinks share some random bits that are secret from the adversary) and an omniscient adversarial model (where no limitations on the adversary's knowledge are assumed). In the side-channel adversarial model, the use of a secret channel allows higher rates to be achieved compared to the omniscient adversarial model, and a polynomial-complexity capacity-achieving code is provided. For the omniscient adversarial model, two capacity-achieving constructions are given: the first is based on random subspace code design and has complexity exponential in ℓ m while the second uses a novel multiple-field-extension technique and has Oℓ mS complexity, which is polynomial in the network size. Our code constructions are end-to-end in that all nodes except the sources and sinks are oblivious to the adversaries and may simply implement predesigned linear network codes (random or otherwise). Also, the sources act independently without knowledge of the data from other sources.
AB - This work considers the multiple-access multicast error-correction scenario over a packetized network with z malicious edge adversaries. The network has min-cut m and packets of length ℓ , and each sink demands all information from the set of sources S. The capacity region is characterized for both a side-channel model (where sources and sinks share some random bits that are secret from the adversary) and an omniscient adversarial model (where no limitations on the adversary's knowledge are assumed). In the side-channel adversarial model, the use of a secret channel allows higher rates to be achieved compared to the omniscient adversarial model, and a polynomial-complexity capacity-achieving code is provided. For the omniscient adversarial model, two capacity-achieving constructions are given: the first is based on random subspace code design and has complexity exponential in ℓ m while the second uses a novel multiple-field-extension technique and has Oℓ mS complexity, which is polynomial in the network size. Our code constructions are end-to-end in that all nodes except the sources and sinks are oblivious to the adversaries and may simply implement predesigned linear network codes (random or otherwise). Also, the sources act independently without knowledge of the data from other sources.
KW - Double extended field
KW - Gabidulin codes
KW - network error-correction
KW - random linear network coding
KW - subspace codes
UR - http://www.scopus.com/inward/record.url?scp=79251500305&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79251500305&partnerID=8YFLogxK
U2 - 10.1109/TIT.2010.2095130
DO - 10.1109/TIT.2010.2095130
M3 - Article
AN - SCOPUS:79251500305
SN - 0018-9448
VL - 57
SP - 1067
EP - 1079
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 2
M1 - 5695099
ER -