Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works 111<br />
defined in terms of generalized weak security in our work. Since weak security is also<br />
inherent in secure network coding, it follows that secure network coding possesses USP<br />
capability as well.<br />
Secure network coding is a class of network coding used for cryptographic purposes.<br />
The earlier purpose of network coding is to facilitate multicast transmission. Although<br />
both deterministic <strong>and</strong> r<strong>and</strong>om network coding can improve the multicast rate, only deterministic<br />
network coding can guarantee max-flow transmission. Another advantage of<br />
deterministic network coding is that we are better in control of the unequal-erasureprotection<br />
(UEP) capability, as discussed in Chapter 4. This UEP property can lead to<br />
conflicts among the multicast receivers in terms of received data quality. When the conflicts<br />
are considered as economic problems of resource distribution, an auction algorithm<br />
can be used to resolve them, as proposed in Chapter 4. If they are considered as political<br />
problems, a voting algorithm could be an interesting solution.<br />
In practice, network coding will probably be used in a system in which channel coding<br />
is present. A problem occurs when the channel coding performance depends on the degree<br />
distribution of the codes, which may be affected by network coding <strong>and</strong> erasures in the<br />
network. A particular problem in LT-codes is discussed in Chapter 5 <strong>and</strong> a cooperative<br />
buffering scheme is proposed as a solution.<br />
In conclusion, this thesis highlights several interrelationships among several subjects in<br />
the fields of coding <strong>and</strong> cryptography. We pictorially summarize it in Fig. 8.1. Apart from<br />
this, network protocol aspects are also considered for WPSG in generalized networks in<br />
Chapter 6, showing that network coding can enhance the security of the WPSG protocol.<br />
8.2 Future Works<br />
In the following, we shortly address some possibilities for future research.