P-Coding: Secure Network Coding against Eavesdropping Attacks

被引:0
|
作者
Zhang, Peng [1 ]
Jiang, Yixin [1 ]
Lin, Chuang [1 ]
Fan, Yanfei [2 ]
Shen, Xuemin [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Network coding; eavesdropping attacks; permutation encryption;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a limited number of packets. However, real scenarios often consist of more capable adversaries, e. g., global eavesdroppers, which can defeat these techniques. In this paper, we propose P-Coding, a novel security scheme against eavesdropping attacks in network coding. With the lightweight permutation encryption performed on each message and its coding vector, P-Coding can efficiently thwart global eavesdroppers in a transparent way. Moreover, P-Coding is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems. Security analysis and simulation results demonstrate the efficacy and efficiency of the P-Coding scheme.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Secure Network Coding Against the Contamination and Eavesdropping Adversaries
    Zhou Yejun
    Li Hui
    Ma Jianfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03) : 411 - 416
  • [2] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    [J]. 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [3] Secure Network Coding against Wiretapping and Byzantine Attacks
    Guo, Qin
    Luo, Mingxing
    Li, Lixiang
    Yang, Yixian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [4] Secure Network Coding against Wiretapping and Byzantine Attacks
    Qin Guo
    Mingxing Luo
    Lixiang Li
    Yixian Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2010
  • [5] Secret Error-Correcting Network Coding against Eavesdropping and Pollution Attacks
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    [J]. ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1499 - +
  • [6] Secure Coding Over Networks Against Noncooperative Eavesdropping
    Xu, Jin
    Chen, Biao
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (07) : 4498 - 4509
  • [7] SECURE NETWORK CODING BASED ON HOMOMORPUIC SIGNATURE AGAINST POLLUTION ATTACKS
    Cheng, Zhen
    Chi, Kaikai
    Tian, Xianzhong
    Li, Yanjun
    [J]. 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1092 - 1096
  • [8] Secure Network Coding Against Intra/Inter-Generation Pollution Attacks
    Liu Guangjun
    Wang Bin
    [J]. CHINA COMMUNICATIONS, 2013, 10 (08) : 100 - 110
  • [9] Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying Coding and Noise-Adding
    Tao, Fei
    Ye, Dan
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 174 - 184
  • [10] A coding-based protection scheme against eavesdropping in network
    [J]. Zhang, J. (zhangjing_sisu@sohu.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):