On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack

被引:15
|
作者
Chang, Xiangmao [1 ]
Wang, Jin [2 ]
Wang, Jianping [3 ]
Lee, Victor [3 ]
Lu, Kejie [4 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Univ Sci & Technol China, Dept Comp Sci, Hefei, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[4] Univ Puerto Rico, Dept Elect & Comp Engn, Puerto Rico, Spain
基金
中国国家自然科学基金;
关键词
D O I
10.1109/ICDCS.2010.27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. The purpose of this work is to design secure linear network coding against wiretap attack. The problem is to maximize the transmission data rate of multiple unicast streams between a pair of source and destination nodes, under the condition of satisfying the weakly secure requirements. Different from most existing research on network coding that designs the network coding scheme based on a given network topology, we will consider the integrated network topology design and network coding design. Such an integrated approach has not been reported by other researchers. In this paper, we formally introduce the problem, prove the problem is computational intractable, and then develop efficient heuristic algorithms. We first try to find the transmission topology that is suitable for network coding. Based on the topology, we design linear network coding scheme that is weakly secure. We conduct simulations to show that the proposed algorithms can achieve good performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    [J]. 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [2] Secure Network Coding on a Wiretap Network
    Cai, Ning
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 424 - 435
  • [3] Secure random linear network coding on a wiretap network
    Cao, Zhanghua
    Zhang, Shibing
    Ji, Xiaodong
    Zhang, Lai
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) : 467 - 472
  • [4] On Secure Network Coding with Uniform Wiretap Sets
    Huang, Wentao
    Ho, Tracey
    Langberg, Michael
    Kliewer, Joerg
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON NETWORK CODING (NETCOD), 2013,
  • [5] On the optimal design of secure network coding against wiretapping attack
    Chang, Xiangmao
    Wang, Jin
    Wang, Jianping
    Lu, Kejie
    Zhuang, Yi
    [J]. COMPUTER NETWORKS, 2016, 99 : 82 - 98
  • [6] On Secure Network Coding With Nonuniform or Restricted Wiretap Sets
    Cui, Tao
    Ho, Tracey
    Kliewer, Joerg
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 166 - 176
  • [7] Secure Network Coding for Wiretap Networks of Type II
    El Rouayheb, Salim
    Soljanin, Emina
    Sprintson, Alex
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (03) : 1361 - 1371
  • [8] On achieving optimal throughput with network coding
    Li, ZP
    Li, BC
    Jiang, D
    Lau, LC
    [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 2184 - 2194
  • [9] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Du, Rong
    Zhao, Chenglin
    Li, Shenghong
    Li, Jian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [10] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Rong Du
    Chenglin Zhao
    Shenghong Li
    Jian Li
    [J]. EURASIP Journal on Wireless Communications and Networking, 2014