Secure Network Coding for Wiretap Networks of Type II

被引:90
作者
El Rouayheb, Salim [1 ]
Soljanin, Emina [2 ]
Sprintson, Alex [3 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Wireless Fdn, Berkeley, CA 94720 USA
[2] Bell Labs, Math Networking & Commun Dept, Murray Hill, NJ 07974 USA
[3] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Coset codes; multicast; network coding; secrecy; wiretap channel II (WTCII);
D O I
10.1109/TIT.2011.2173631
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of securing a multicast network against a wiretapper that can eavesdrop on the packets on a limited number of network edges of its choice. We assume that the network employs network coding to simultaneously deliver the packets available at the source to all the destinations. We show that this problem can be looked at as a network generalization of the wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner. In particular, we show that the transmitted information can be secured by using the Ozarow-Wyner approach of coset coding at the source on top of the existing network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretap networks. Moreover, we use this framework to derive new bounds on the code alphabet size that are independent of the network size, and provide algorithms for explicit construction of secure network codes. We also analyze the amount of information that can be leaked to the wiretapper as a function of the number of wiretapped edges.
引用
收藏
页码:1361 / 1371
页数:11
相关论文
共 32 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
Ahuja R.K., 1993, NETWORKS FLOWS
[3]  
[Anonymous], 2005, NETCOD
[4]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323
[5]  
Cai N, 2006, COMMUN INF SYST, V6, P37
[6]   On wiretap networks II [J].
El Rouayheb, Salim Y. ;
Soljanin, Emina .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :551-555
[7]   Information flow decomposition for network coding [J].
Fragouli, C ;
Soijanin, E .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (03) :829-848
[8]  
Ho R, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, P144
[9]   Polynomial time algorithms for multicast network code construction [J].
Jaggi, S ;
Sanders, P ;
Chou, PA ;
Effros, M ;
Egner, S ;
Jain, K ;
Tolhuizen, LMGA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :1973-1982
[10]  
Jaggi S., 2005, P 26 IEEE INT C COMP, P616