Authentication for Two-Way Relay Channel with Physical-Layer Network Coding

被引:0
作者
Parra, Jhordany Rodriguez [1 ]
Chan, Terence [1 ]
Land, Ingmar [2 ]
Ho, Siu-Wai [1 ]
机构
[1] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
[2] Huawei Technol Co Ltd, French Res Ctr, Math & Algorithm Sci Lab, Paris, France
来源
2015 IEEE INFORMATION THEORY WORKSHOP - FALL (ITW) | 2015年
关键词
Authentication; Information security; Network Coding; Relay Networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical Layer Network coding (PLNC) can significantly improve network performance, but some security issues arise due to the limited information available to the forwarders. This paper analyses authentication in networks with PLNC and show theoretical and practical security limits. In particular, we obtain a lower bound for the probability of an attacker being able to insert a false message such that the message is believed to come from a legitimate source. We prove that an information-theoretic bound similar to the one for point-to-point communication systems can be achieved in networks employing PLNC. Necessary and sufficient conditions to achieve the bound are identified. Finally, a simple but important modification of a previous scheme is proposed to achieve the obtained bound.
引用
收藏
页码:49 / 53
页数:5
相关论文
共 13 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] Apavatjrut A., 2010, 4 INT C NETW SYST SE, P223
  • [3] Chandna R., 2013, Salt Stress in Plants: Signalling, Omics and Adaptations, P1
  • [4] Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    Yau, David K. Y.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (05) : 741 - 755
  • [5] Survey of network coding-aware routing protocols in wireless networks
    Iqbal, Muhammad Azhar
    Dai, Bin
    Huang, Benxiong
    Hassan, A.
    Yu, Shui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) : 1956 - 1970
  • [6] XORs in the air:: Practical wireless network coding
    Katti, Sachin
    Rahul, Hariharan
    Hu, Wenjun
    Katabi, Dina
    Medard, Muriel
    Crowcroft, Jon
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 497 - 510
  • [7] Lai LF, 2010, SECURING WIRELESS COMMUNICATIONS AT THE PHYSICAL LAYER, P335, DOI 10.1007/978-1-4419-1385-2_14
  • [8] Authentication theory and hypothesis testing
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1350 - 1356
  • [9] Newell A., 2011, ACM T INFORM SYSTEM
  • [10] PEI DY, 1995, J CRYPTOL, V8, P177