{"title":"High level performance in multiple relay networks","authors":"V. Eswaramurthy, A. Raghavendra","doi":"10.1109/ICCIC.2014.7238455","DOIUrl":null,"url":null,"abstract":"A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Computational Intelligence and Computing Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2014.7238455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.