Computer Science ›› 2013, Vol. 40 ›› Issue (10): 144-147.

Previous Articles     Next Articles

Application of Network Coding in Wiretap Network

CAO Zhang-hua,JI Xiao-dong and LIU Min   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Focusing on the issue of secure communication on a wiretap network where a wiretapper can eavesdrop a limi-ted number of links,we proposed a secure communication scheme based on linear network coding.The key idea of our scheme is to combine the ability of network coding that allows intermediate nodes to mix information from different data flows with one time pad.Further,the presented scheme achieves secure communication without employing a secrecy channel and the utilization of network capacity is up to n-1n.Moreover,we showed that if the efficient domain is large enough,the probability of achieving secure communication with random linear network coding tends to 1in our scheme.

Key words: Wiretapper,Network coding,Multicast,Network security,Random network coding

[1] Ahlswede R,Cai N,Li S Y R,et al.Network Information Flow [J].IEEE Trans.Inf.Theory,2000,46(4):1204-1216
[2] Li S Y R,Cai N.Linear Network Coding[J].IEEE Trans.Inf.Theory,2003,49(2):371-381
[3] Ozarow L H,Wyner A D.The wire-tap channel II [J].Bell Syst Tech.J,1984,3:2135-2157
[4] Rouayheb S E,Soljanin E,Sprintson A,et al.Secure Network Coding for Wiretap Networks of Type II [J].IEEE Trans.Inf.Theory,2012,58(3):1361-1371
[5] Cai N,Yeung R W.Secure network coding on a wiretap network[J].IEEE Trans.Inf.Theory,2011,57(1):424-435
[6] Silva D,Kschischang F R.Universial Secure Network Coding via Rank-Metric Codes [J].IEEE Trans.Inf.Theory,2011,57(2):1124-1135
[7] Lima L,Gheorghiu S,Barros J,et al.Secure Network Coding for Multi-Resolution Wireless Video Streaming [J].IEEE Selected areas in Comm,2010,28(3):377-388
[8] Yan Z,Xu C Q,Wang F.A Novel Scheme for Secure Network Coding Using One-time Pad [C]∥Conf on Networks Security,Wireless Comm and Trusted Computing.2009:92-98
[9] Jaggi S,Langberg M,Katti S,et al.Resilient Network Coding in the Presence of Byzantine Adversaries [J].IEEE Trans.Inf.Theory,2008,54(6):2596-2603
[10] Ho T,Leong B,Koetter R,et al.Byzantine Modification Detection in Multicast Networks with Random Network Coding [J].IEEE Trans.Inf.Theory,2008,54(6):2798-2803
[11] Jaggi S,Sanders P,Chou P A,et al.Polynomial time algorithms for multicast network code construction [J].IEEE Trans.Inf.Theory,2005,51(6):1973-1982
[12] Cui T,Hot T,Kliewer J.On Secure Network Coding with Nonuniform or Restricted Wiretap Set [J].IEEE Trans.on Inf.Theory,2013,59(1):166-176
[13] 徐光宪,付晓.抗万能攻击的安全网络编码[J].计算机科学,2012,39(8):88-91
[14] 朱联祥,朱艳艳,曹铮.搭线窃听下网络安全路径及安全网络编码的研究[J].重庆邮电大学学报,2012,24(1):39-44
[15] 俞立峰,杨琼,于娟.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!