Weakly Secure Network Coding
نویسنده
چکیده
In this work we consider the problem of secure data transmission on an acyclic multicast network. A new information theoretic model for security is proposed that defines the system as secure if an eavesdropper is unable to get any “meaningful” information about the source. The “wiretap” network model by Cai and Yeung in which no information of the source is made available to the eavesdropper is a special case in the new model. We consider the case when the number of independent messages available to the eavesdropper is less than the multicast capacity of the network. We show that under the new security requirements communication is possible at the multicast capacity. A linear transformation is provided for networks with a given linear code to make the system secure. The transformation needs to be done only at the source and the operations at the intermediate nodes remain unchanged. We also show that if random coding scheme is used the probability of the system being secure can be made arbitrarily close to one by coding over a large enough field.
منابع مشابه
Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
In this paper, we consider the problem of building a secure network against node conspiracy attack that based on network segmentation. As we know, network coding has demonstrated its great application prospects in wireless sensor network (WSN) transmission. At the same time, it is facing a variety of security threats, especially conspiracy attack. In existing research, secure coding design stra...
متن کاملUniversal Strongly Secure Network Coding with Dependent and Non-Uniform Messages
We construct a secure network coding that is strongly secure in the sense of Harada and Yamamoto [19] and universal secure in the sense of Silva and Kschischang [28], [29], while allowing arbitrary small but nonzero mutual information to the eavesdropper. Our secure network coding allows statistically dependent and non-uniform multiple secret messages, while all previous constructions of weakly...
متن کاملSecure Index Coding with Side Information
Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear coding schemes for the ICSI problem are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the coding s...
متن کاملA Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs
In wireless sensor networks, nodes are mostly deployed in unsupervised areas and are vulnerable to a variety of attacks. Therefore, data security is a vital aspect to be considered. However, due to the limited computation capability and memory of sensor nodes, it is difficult to perform the complex encryption algorithm, as well as the key distribution and management algorithm. Toward this end, ...
متن کاملNetwork Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP)
The general abstraction of this thesis is the relationships between two seemingly unrelated topics, which are network coding and wireless physical-layer secret-key generation (WPSG). As build-ups to such relationships, some specific aspects of each topic are discussed in detail at first. To begin with, network coding issues of unequal erasure protection (UEP) and degree distribution distortion ...
متن کامل