Source coding under security constraints
نویسندگان
چکیده
Information theoretic security characterizes the fundamental limitations of unconditional security against computationally unbounded adversaries. In this chapter, secure distributed compression in the presence of eavesdropper(s) is considered from the information theoretic security perspective. Basic models and fundamental results are summarized for lossless and lossy source compression. Distributed lossless compression under security constraints is analyzed for single/multiple eavesdroppers, and single/multiple legitimate receivers considering correlated side information at the eavesdroppers and the legitimate receivers. The relationship of the underlying model to the secret key generation model, and fundamental results on secure joint source-channel coding are also reviewed.
منابع مشابه
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures
In this paper, we evaluate the asymptotics of equivocations, their exponents as well as their second-order coding rates under various Rényi information measures. Specifically, we consider the effect of applying a hash function on a source and we quantify the level of non-uniformity and dependence of the compressed source from another correlated source when the number of copies of the sources is...
متن کاملEfficient coding for multi-source networks using Gács-Körner common information
Consider a multi-source network coding problem with correlated sources. While the fundamental limits are known, achieving them, in general, involves a computational burden due to the complex decoding process. Efficient solutions, on the other hand, are by large based on source and network coding separation, thus imposing strict topological constraints on the networks which can be solved. In thi...
متن کاملSecurity Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack
This paper discussed the weak security of random linear network coding in wireless network in view of network coding weak security theory where the wiretapper can successfully obtain initial data and conditions threatening transmission security by decoding. The experiment results displayed, in wireless network, the relationship between decodes success probability of multi-node co-wiretapping, t...
متن کاملReconstruction of Network Coded Sources From Incomplete Datasets
We investigate the problem of recovering source information from an incomplete set of network coded data with help of prior information about the sources. This problem naturally arises in wireless networks, where the number of network coded packets available at the receiver may not be sufficient for exact decoding due to channel dynamics or timing constraints, for example. We study the theoreti...
متن کاملTrust Management in Resource Constraint Networks
There are numerous environments or situations where a computer network has one or more constraints. Impact of these constraints can range from minimal user inconveniences to catastrophic reduction of capabilities. These constraints allow availability of information at the cost of abandoning the safety and reliability of traditional routing and security protocols. A number of environments in whi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012