Security for Wiretap Networks via Rank-Metric Codes

被引:32
作者
Silva, Danilo [1 ]
Kschischang, Frank R. [1 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
来源
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6 | 2008年
关键词
D O I
10.1109/ISIT.2008.4594971
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from source to each receiver, and the wiretapper can eavesdrop on mu arbitrarily chosen links. A coding scheme is proposed that can achieve the maximum possible rate of k = n - mu packets that are information-theoretically secure from the adversary. A distinctive feature of our scheme is that it is universal: it can be applied on top of any communication network without requiring knowledge of or any modifications on the underlying network code. In fact, even a randomized network code can be used. Our approach is based on Rouayheb-Soljanin's formulation of a wiretap network as a generalization of the Ozarow-Wyner wiretap channel of type II Essentially, the linear MDS code in Ozarow-Wyner's coset coding scheme is replaced by a maximum-rank-distance code over an extension of the field in which linear network coding operations are performed.
引用
收藏
页码:176 / 180
页数:5
相关论文
共 15 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], P ITG C SOURC CHANN
[3]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323
[4]   On wiretap networks II [J].
El Rouayheb, Salim Y. ;
Soljanin, Emina .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :551-555
[5]  
Gabidulin E. M., 1985, Problems of Information Transmission, V21, P1
[6]  
GADOULEAU M, 2006, P IEEE GLOB 2006 SAN
[7]   Polynomial time algorithms for multicast network code construction [J].
Jaggi, S ;
Sanders, P ;
Chou, PA ;
Effros, M ;
Egner, S ;
Jain, K ;
Tolhuizen, LMGA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :1973-1982
[8]   An algebraic approach to network coding [J].
Koetter, R ;
Médard, M .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2003, 11 (05) :782-795
[9]   Linear network coding [J].
Li, SYR ;
Yeung, RW ;
Cai, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) :371-381
[10]   WIRE-TAP CHANNEL .2. [J].
OZAROW, LH ;
WYNER, AD .
AT&T BELL LABORATORIES TECHNICAL JOURNAL, 1984, 63 (10) :2135-2157