Secure Network Coding: Dependency of Efficiency on Network Topology

被引:0
|
作者
Pfennig, Stefan [1 ]
Franz, Elke [1 ]
机构
[1] Tech Univ Dresden, Fac Comp Sci, D-01062 Dresden, Germany
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network Coding is a new possibility to transmit data through a network. By combining different packets instead of simply forwarding, network coding offers the opportunity to reach the Min-Cut/Max-Flow capacity in multicast data transmissions. However, the basic schemes are vulnerable to so-called pollution attacks, where an attacker can jam large parts of the transmission by infiltrating only one bogus message. In the literature we found several approaches which aim at handling this kind of attack with different amounts of overhead. Though, the cost for a specific secure network coding scheme highly depends on the underlying network. The goal of this paper is on the one hand to describe which network parameters influence the efficiency of a certain scheme and on the other hand to provide concrete suggestions for selecting the most efficient secure network coding scheme considering a given network. We will illustrate that there does not exist "the best" secure network scheme concerning efficiency, but all selected schemes are more or less suited under certain network topologies.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Efficiency of secure network coding schemes
    Franz, Elke
    Pfennig, Stefan
    Fischer, André
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7394 LNCS : 145 - 159
  • [2] Efficiency of rateless secure network coding
    Franz, Elke
    Pfennig, Stefan
    Reiher, Tobias
    [J]. CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 162 - 169
  • [3] Secure physical layer network coding versus secure network coding
    Hayashi, Masahito
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 430 - 434
  • [4] Secure Physical Layer Network Coding versus Secure Network Coding
    Hayashi, Masahito
    [J]. ENTROPY, 2022, 24 (01)
  • [5] Secure Network Coding on a Wiretap Network
    Cai, Ning
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 424 - 435
  • [6] Secure network coding
    Cai, N
    Yeung, RW
    [J]. ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 323 - 323
  • [7] Secure Network Coding in DTNs
    Laszlo Czap
    Istvan Vajda
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 28 - 30
  • [8] Theory of Secure Network Coding
    Cai, Ning
    Chan, Terence
    [J]. PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 421 - 437
  • [9] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 31 - 34
  • [10] On the Optimality of Secure Network Coding
    Guang, Xuan
    Lu, Jiyong
    Fu, Fang-Wei
    [J]. IEEE COMMUNICATIONS LETTERS, 2015, 19 (07) : 1165 - 1168