Theory of Secure Network Coding

被引:64
作者
Cai, Ning [1 ]
Chan, Terence [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Univ S Australia, Inst Telecommun Res, Adelaide, SA 5095, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Entropy; linear subspace; linear transformation; network coding; security; wiretap channels; ERROR-CORRECTION;
D O I
10.1109/JPROC.2010.2094592
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal is to present fundamental results and provide preliminary knowledge for anyone interested in the area. We first present a model for secure network coding and then a necessary and sufficient condition for a linear network code to be secure. Optimal methods to construct linear secure network codes are also provided. For further investigation of the secure properties of linear network codes, we illuminate different secure criteria and requirements, with a few alternative models.
引用
收藏
页码:421 / 437
页数:17
相关论文
共 42 条
[11]  
CHAN T, IEEE T INF IN PRESS
[12]   Dualities between entropy functions and network codes [J].
Chan, Terence ;
Grant, Alex .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4470-4487
[13]  
Chan T, 2008, 2008 AUSTRALIAN COMMUNICATIONS THEORY WORKSHOP, P95
[14]  
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[15]   On wiretap networks II [J].
El Rouayheb, Salim Y. ;
Soljanin, Emina .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :551-555
[16]  
ELROUAYHEB S, IEEE T INF THE UNPUB
[17]  
Feldman J., 2004, Allerton Conference on Communication, Control, and Computing, P1
[18]  
Ford LR, 1962, FLOWS NETWORKS
[19]   Information flow decomposition for network coding [J].
Fragouli, C ;
Soijanin, E .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (03) :829-848
[20]   NONNEGATIVE ENTROPY MEASURES OF MULTIVARIATE SYMMETRIC CORRELATIONS [J].
HAN, TS .
INFORMATION AND CONTROL, 1978, 36 (02) :133-156