Home > Research > Publications & Outputs > Neighborhood watch
View graph of relations

Neighborhood watch: on network coding throughput and key sharing

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Neighborhood watch: on network coding throughput and key sharing. / Strohmeier, Martin; Martinovic, Ivan; Roedig, Utz et al.
Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, 2013. p. 849-854.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Strohmeier, M, Martinovic, I, Roedig, U, Defrawy, KE & Schmitt, J 2013, Neighborhood watch: on network coding throughput and key sharing. in Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, pp. 849-854. https://doi.org/10.1109/GLOCOM.2013.6831179

APA

Strohmeier, M., Martinovic, I., Roedig, U., Defrawy, K. E., & Schmitt, J. (2013). Neighborhood watch: on network coding throughput and key sharing. In Global Communications Conference (GLOBECOM), 2013 IEEE (pp. 849-854). IEEE Xplore. https://doi.org/10.1109/GLOCOM.2013.6831179

Vancouver

Strohmeier M, Martinovic I, Roedig U, Defrawy KE, Schmitt J. Neighborhood watch: on network coding throughput and key sharing. In Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore. 2013. p. 849-854 doi: 10.1109/GLOCOM.2013.6831179

Author

Strohmeier, Martin ; Martinovic, Ivan ; Roedig, Utz et al. / Neighborhood watch : on network coding throughput and key sharing. Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, 2013. pp. 849-854

Bibtex

@inproceedings{16a338a4206744b1ba9de12633c1b69a,
title = "Neighborhood watch: on network coding throughput and key sharing",
abstract = "Network coding (NC) has frequently been promoted as a means of improving throughput in wireless networks. Existing work has mostly focused on the fundamental aspects of NC, while constraints arising from real-world network deployments have not been given much attention. In particular, NC requires network nodes to overhear each other's packets, which is oftentimes in contradiction to many security standards that attempt to provide link-layer confidentiality by using, e.g., pairwise encryption keys (such as IEEE 802.11i or ZigBee). Therefore, there is an inherent trade-off in using NC and applying link-layer security: if many nodes share the secret link-layer key, NC will improve the network throughput, yet a leakage of the key will affect many nodes; on the other hand, having distinct secret keys will increase the network resilience against key compromise, but it will also minimize the coding gain. We formulate this security vs. performance trade-off as an optimization problem and evaluate the effectiveness of NC under different sizes of key-sharing groups and network topologies. Our results show that increasing the key-sharing group by a single node can result in a maximum coding gain between 1.3% and 13.7%.",
author = "Martin Strohmeier and Ivan Martinovic and Utz Roedig and Defrawy, {Karim El} and Jens Schmitt",
year = "2013",
month = dec,
day = "9",
doi = "10.1109/GLOCOM.2013.6831179",
language = "English",
pages = "849--854",
booktitle = "Global Communications Conference (GLOBECOM), 2013 IEEE",
publisher = "IEEE Xplore",

}

RIS

TY - GEN

T1 - Neighborhood watch

T2 - on network coding throughput and key sharing

AU - Strohmeier, Martin

AU - Martinovic, Ivan

AU - Roedig, Utz

AU - Defrawy, Karim El

AU - Schmitt, Jens

PY - 2013/12/9

Y1 - 2013/12/9

N2 - Network coding (NC) has frequently been promoted as a means of improving throughput in wireless networks. Existing work has mostly focused on the fundamental aspects of NC, while constraints arising from real-world network deployments have not been given much attention. In particular, NC requires network nodes to overhear each other's packets, which is oftentimes in contradiction to many security standards that attempt to provide link-layer confidentiality by using, e.g., pairwise encryption keys (such as IEEE 802.11i or ZigBee). Therefore, there is an inherent trade-off in using NC and applying link-layer security: if many nodes share the secret link-layer key, NC will improve the network throughput, yet a leakage of the key will affect many nodes; on the other hand, having distinct secret keys will increase the network resilience against key compromise, but it will also minimize the coding gain. We formulate this security vs. performance trade-off as an optimization problem and evaluate the effectiveness of NC under different sizes of key-sharing groups and network topologies. Our results show that increasing the key-sharing group by a single node can result in a maximum coding gain between 1.3% and 13.7%.

AB - Network coding (NC) has frequently been promoted as a means of improving throughput in wireless networks. Existing work has mostly focused on the fundamental aspects of NC, while constraints arising from real-world network deployments have not been given much attention. In particular, NC requires network nodes to overhear each other's packets, which is oftentimes in contradiction to many security standards that attempt to provide link-layer confidentiality by using, e.g., pairwise encryption keys (such as IEEE 802.11i or ZigBee). Therefore, there is an inherent trade-off in using NC and applying link-layer security: if many nodes share the secret link-layer key, NC will improve the network throughput, yet a leakage of the key will affect many nodes; on the other hand, having distinct secret keys will increase the network resilience against key compromise, but it will also minimize the coding gain. We formulate this security vs. performance trade-off as an optimization problem and evaluate the effectiveness of NC under different sizes of key-sharing groups and network topologies. Our results show that increasing the key-sharing group by a single node can result in a maximum coding gain between 1.3% and 13.7%.

U2 - 10.1109/GLOCOM.2013.6831179

DO - 10.1109/GLOCOM.2013.6831179

M3 - Conference contribution/Paper

SP - 849

EP - 854

BT - Global Communications Conference (GLOBECOM), 2013 IEEE

PB - IEEE Xplore

ER -