Lightweight security for network coding

被引:58
作者
Vilela, Joao P. [1 ]
Lima, Luisa [1 ]
Barros, Joao [1 ]
机构
[1] Univ Porto, Dept Comp Sci, Inst Telecommun, P-4100 Oporto, Portugal
来源
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13 | 2008年
关键词
D O I
10.1109/ICC.2008.336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryption of the entire data. Confidentiality is achieved by protecting (or "locking") the source coefficients required to decode the encoded data, without preventing intermediate nodes from running their standard network coding operations. Our scheme can be easily combined with existing techniques that counter active attacks.
引用
收藏
页码:1750 / 1754
页数:5
相关论文
共 16 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], P IEEE INT S INF THE
[3]  
[Anonymous], P IEEE INFOCOM 2007
[4]  
[Anonymous], WDTN 05
[5]  
CAI N, 2002, IEEE INT S INF THEOR
[6]  
Chou P., 2003, ALL C COMM CONTR COM
[7]  
Dimakis A. G., 2007, P IEEE INFOCOM ANCH
[8]  
GKANTSIDIS C, 2006, P IEEE INFOCOM BARC
[9]  
GKANTSIDIS C, 2005, P IEEE INF MIAM US
[10]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430