Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications
نویسنده
چکیده
Network coding allows the routers to mix the information content in packets before forwarding them. This mixing has been theoretically proven to maximize network throughput [1, 44, 40, 29]. For multicast communications it can be done in a distributed manner with low complexity, and is robust to packet losses and network failures [24, 46]. Furthermore, recent implementations of network coding for wired and wireless environments demonstrate its practical benefits [32, 20]. But what if the network contains malicious nodes? Nodes that tap the network aim to eavesdrop on ongoing communication. Further, some nodes may pretend to forward packets from source to destination, while in reality they inject corrupted packets into the information flow. Since network coding makes the routers mix packets’ content, a single corrupted packet can end up corrupting all the information reaching a destination. Unless this problem is solved, network coding may perform much worse than pure forwarding in the presence of such malicious adversaries. This chapter addresses the task of multicast communication using network coding in the presence of passive eavesdroppers and active jammers. Rather surprisingly, it will be shown that high-rate private and reliable communication via schemes that are both computationally efficient and distributed is possible in the settings under study. Despite the complexity introduced by distributed network coding, it turns out that many of the classical results for private and reliable communication over point-to-point links have direct analogues in the network setting. This chapter summarizes almost a decade of study in the very dynamic and intriguing field of private and reliable network communication.
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملSecure Communication in Erasure Networks with State-feedback
The security and efficiency of communication are two of the main concerns for networks of today and the future. Our understanding of how to efficiently send information over various channels and networks has significantly increased in the past decade (see e.g., [1–3]), whereas our understanding of how to securely send information has not yet reached the same level. In this thesis, we advance th...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملStrongly Secure Linear Network Coding
In a network with capacity h for multicast, information Xh = (X1, X2, · · · , Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information S r = (S 1, S 2, · · · , S r) can be transmitted securely against wiretappers by k-secure network coding for k ≤ h−r. In this case, no information of the secret leaks out even if an adversary...
متن کاملSecure and Reliable Multi-Path Transmission Scheme on Underwater Acoustic Sensor Networks
Underwater Acoustic Sensor Networks (UASN) based on the advances in underwater data collection and observing systems may play an important role in oceanographic research. But many unique features of UASN pose challenge on development of reliable and secure data transport to overcome harsh aquatic communication conditions. In this paper, we use multi-path routing to address secure and reliable t...
متن کامل