11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works 111<br />

defined in terms of generalized weak security in our work. Since weak security is also<br />

inherent in secure network coding, it follows that secure network coding possesses USP<br />

capability as well.<br />

Secure network coding is a class of network coding used for cryptographic purposes.<br />

The earlier purpose of network coding is to facilitate multicast transmission. Although<br />

both deterministic <strong>and</strong> r<strong>and</strong>om network coding can improve the multicast rate, only deterministic<br />

network coding can guarantee max-flow transmission. Another advantage of<br />

deterministic network coding is that we are better in control of the unequal-erasureprotection<br />

(UEP) capability, as discussed in Chapter 4. This UEP property can lead to<br />

conflicts among the multicast receivers in terms of received data quality. When the conflicts<br />

are considered as economic problems of resource distribution, an auction algorithm<br />

can be used to resolve them, as proposed in Chapter 4. If they are considered as political<br />

problems, a voting algorithm could be an interesting solution.<br />

In practice, network coding will probably be used in a system in which channel coding<br />

is present. A problem occurs when the channel coding performance depends on the degree<br />

distribution of the codes, which may be affected by network coding <strong>and</strong> erasures in the<br />

network. A particular problem in LT-codes is discussed in Chapter 5 <strong>and</strong> a cooperative<br />

buffering scheme is proposed as a solution.<br />

In conclusion, this thesis highlights several interrelationships among several subjects in<br />

the fields of coding <strong>and</strong> cryptography. We pictorially summarize it in Fig. 8.1. Apart from<br />

this, network protocol aspects are also considered for WPSG in generalized networks in<br />

Chapter 6, showing that network coding can enhance the security of the WPSG protocol.<br />

8.2 Future Works<br />

In the following, we shortly address some possibilities for future research.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!