On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

被引:0
|
作者
Cui, Tao [1 ]
Ho, Tracey [1 ]
Kliewer, Joerg [2 ]
机构
[1] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
[2] New Mexico State Univ, Klipsch Sch Elect & Comp Engn, Las Cruces, NM 88003 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address secure network coding over networks with unequal link capacities in the presence of a wiretapper who has only access to a restricted number of k links in the network. Previous results show that for the case of equal link capacities and unrestricted wiretapping sets, the secrecy capacity is given by the cut-set bound, whether or not the location of the wiretapped links is known. The cut-set bound can be achieved by injecting k random keys at the source which are decoded at the sink along with the message. In contrast, for the case where the wiretapping set is restricted, or where link capacities are not equal, we show that the cut-set bound is not achievable in general. Finally, it is shown that determining the secrecy capacity is a NP-hard problem.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Theory of Secure Network Coding
    Cai, Ning
    Chan, Terence
    PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 421 - 437
  • [22] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 31 - 34
  • [23] On the Optimality of Secure Network Coding
    Guang, Xuan
    Lu, Jiyong
    Fu, Fang-Wei
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (07) : 1165 - 1168
  • [24] Secure Noisy Network Coding
    Yassaee, Mohammad Hossein
    Aref, Mohammad Reza
    Gohari, Amin
    2013 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2013,
  • [25] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1943 - 1950
  • [26] Security analysis and evaluation of random linear network coding under wiretapping attack
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [27] Link decomposition of network coding
    Cai, Kai
    Fan, Pingyi
    2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 129 - +
  • [28] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 673 - 681
  • [29] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1936 - 1948
  • [30] Secure network coding from secure proof of retrievability
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Xu, Maozhi
    Xue, Rui
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (12)