Secure Network Coding for Wiretap Networks of Type II

被引:83
|
作者
El Rouayheb, Salim [1 ]
Soljanin, Emina [2 ]
Sprintson, Alex [3 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Wireless Fdn, Berkeley, CA 94720 USA
[2] Bell Labs, Math Networking & Commun Dept, Murray Hill, NJ 07974 USA
[3] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Coset codes; multicast; network coding; secrecy; wiretap channel II (WTCII);
D O I
10.1109/TIT.2011.2173631
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of securing a multicast network against a wiretapper that can eavesdrop on the packets on a limited number of network edges of its choice. We assume that the network employs network coding to simultaneously deliver the packets available at the source to all the destinations. We show that this problem can be looked at as a network generalization of the wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner. In particular, we show that the transmitted information can be secured by using the Ozarow-Wyner approach of coset coding at the source on top of the existing network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretap networks. Moreover, we use this framework to derive new bounds on the code alphabet size that are independent of the network size, and provide algorithms for explicit construction of secure network codes. We also analyze the amount of information that can be leaked to the wiretapper as a function of the number of wiretapped edges.
引用
收藏
页码:1361 / 1371
页数:11
相关论文
共 50 条
  • [31] A Chain Based Syndrome Coding Scheme for Secure Communication in the Wiretap Channel
    Zhang, K.
    Tomlinson, M.
    Ahmed, M. Z.
    [J]. 2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [32] Robust and Secure Secret Sharing in Wireless Networks with Convolutional Network Coding
    Liang, Joyce
    Kuo, C. -C. Jay
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [33] Secure network coding for wireless mesh networks: Threats, challenges, and directions
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (17) : 1790 - 1801
  • [34] Secure Efficient Routing Based on Network Coding in the Delay Tolerant Networks
    Bao, Jianmin
    Zhang, Shu
    Zhang, Junjie
    Wang, Kun
    Hu, Haifeng
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 456 - 459
  • [35] Secure transmission for mixed FSO-RF relay networks with physical-layer key encryption and wiretap coding
    Wang, Dawei
    Ren, Pinyi
    Cheng, Julian
    Du, Qinghe
    Wang, Yichen
    Sun, Li
    [J]. OPTICS EXPRESS, 2017, 25 (09): : 10078 - 10089
  • [36] Secure Coding Over Networks
    Xu, Jin
    Chen, Biao
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2116 - 2120
  • [37] Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel
    Frank, Anna
    Aydinian, Harout
    Boche, Holger
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [38] Secure Network Coding in DTNs
    Laszlo Czap
    Istvan Vajda
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 28 - 30
  • [39] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 31 - 34
  • [40] Theory of Secure Network Coding
    Cai, Ning
    Chan, Terence
    [J]. PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 421 - 437