A Secure Broadcasting Scheme with Network Coding

被引:7
|
作者
Wang, Xiao [1 ]
Guo, Wangmei [1 ]
Yang, Yanbo [1 ]
Wang, Bin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure network coding; broadcasting; perfect secrecy; coding field size;
D O I
10.1109/LCOMM.2013.060513.130684
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We consider the secure broadcasting network coding problem over an acyclic network with single source node and two sink nodes. The secret message consists of two private messages and one common message. Secure means that no information about the secret message leaks to the adversary, that is, it achieves the perfect secure and belongs to information theoretic secure. Broadcasting means that different sink nodes receive different parts of the secret message. Given a network topology and network codes, a secure broadcasting scheme is proposed based on the signal space of sink nodes. The secret message is perfect secure if a limited number of edges are wiretapped by adversary. Analysis shows that our scheme is admissible. And the upper bound of the secrecy broadcasting capacity region can be achieved by our scheme. Besides, the sufficient condition of existence for our scheme, i.e., the lower bound of the coding field size, is also derived.
引用
收藏
页码:1435 / 1438
页数:4
相关论文
共 50 条
  • [41] A limited feedback based network coding retransmission scheme for machine-to-machine wireless broadcasting
    Wang, Jian
    Xu, Youyun
    Wang, Cong
    Xu, Kui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2016, 27 (12): : 1612 - 1627
  • [42] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Du, Rong
    Zhao, Chenglin
    Li, Shenghong
    Li, Jian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [43] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Rong Du
    Chenglin Zhao
    Shenghong Li
    Jian Li
    EURASIP Journal on Wireless Communications and Networking, 2014
  • [44] ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
    Noura, Hassan
    Martin, Steven
    Al Agha, Khaldoun
    Chahine, Khaled
    COMPUTER NETWORKS, 2014, 75 : 99 - 112
  • [45] A multi-tag secure network coding scheme against pollution attacks in WSNs
    Zhang, Dafang
    Li, Youpeng
    Ning, Zuoting
    Journal of Computational Information Systems, 2015, 11 (12): : 4413 - 4420
  • [46] An efficient privacy-preserving scheme for secure network coding based on compressed sensing
    Xie, Dong
    Peng, Haipeng
    Li, Lixiang
    Yang, Yixian
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 79 : 33 - 42
  • [47] A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    International Journal of Ad Hoc and Ubiquitous Computing, 2016, 22 (04) : 236 - 248
  • [48] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 673 - 681
  • [49] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1936 - 1948
  • [50] Secure network coding from secure proof of retrievability
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Xu, Maozhi
    Xue, Rui
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (12)