Theory of Secure Network Coding

被引:64
作者
Cai, Ning [1 ]
Chan, Terence [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Univ S Australia, Inst Telecommun Res, Adelaide, SA 5095, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Entropy; linear subspace; linear transformation; network coding; security; wiretap channels; ERROR-CORRECTION;
D O I
10.1109/JPROC.2010.2094592
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal is to present fundamental results and provide preliminary knowledge for anyone interested in the area. We first present a model for secure network coding and then a necessary and sufficient condition for a linear network code to be secure. Optimal methods to construct linear secure network codes are also provided. For further investigation of the secure properties of linear network codes, we illuminate different secure criteria and requirements, with a few alternative models.
引用
收藏
页码:421 / 437
页数:17
相关论文
共 42 条
[21]   Strongly Secure Linear Network Coding [J].
Harada, Kunihiko ;
Yamamoto, Hirosuke .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) :2720-2728
[22]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430
[23]   Polynomial time algorithms for multicast network code construction [J].
Jaggi, S ;
Sanders, P ;
Chou, PA ;
Effros, M ;
Egner, S ;
Jain, K ;
Tolhuizen, LMGA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :1973-1982
[24]   Security based on network topology against the wiretapping attack [J].
Jain, K .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :68-71
[25]   An algebraic approach to network coding [J].
Koetter, R ;
Médard, M .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2003, 11 (05) :782-795
[26]   The encoding complexity of network coding [J].
Langberg, Michael ;
Sprintson, Alexander ;
Bruck, Jehoshua .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (06) :2386-2397
[27]   Network Coding: A Computational Perspective [J].
Langberg, Michael ;
Sprintson, Alexander ;
Bruck, Jehoshua .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (01) :147-157
[28]   Linear network coding [J].
Li, SYR ;
Yeung, RW ;
Cai, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) :371-381
[29]   Random linear network coding:: A free cipher? [J].
Lima, Luisa ;
Medard, Muriel ;
Barros, Joao .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :546-+
[30]   Secure Error-Correcting (SEC) Network Codes [J].
Ngai, Chi-Kin ;
Yeung, Raymond W. .
2009 WORKSHOP ON NETWORK CODING, THEORY, AND APPLICATIONS, 2009, :98-103