Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

On the Performance of the Cache Coding Protocol

Version 1 : Received: 1 February 2018 / Approved: 1 February 2018 / Online: 1 February 2018 (16:45:19 CET)

How to cite: Maboudi, B.; Sehat, H.; Pahlevani, P.; Lucani, D.E. On the Performance of the Cache Coding Protocol. Preprints 2018, 2018020009. https://doi.org/10.20944/preprints201802.0009.v1 Maboudi, B.; Sehat, H.; Pahlevani, P.; Lucani, D.E. On the Performance of the Cache Coding Protocol. Preprints 2018, 2018020009. https://doi.org/10.20944/preprints201802.0009.v1

Abstract

Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes for increased performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the Cache Coding was proposed. This protocol only allows recoding at the relays when the relay has received enough packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key allowing for the system to detect and minimize the effect of pollution attacks and make relays accountable for changes on the data. This paper analyzes the delay performance of Cache Coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an Absorbing Markov Chain and a approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that Cache Coding can overcome security issues of unrestricted recoding with only a moderate decrease in system performance.

Keywords

Cache Coding, Source Coding, Absorbing Markov Chain

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.