DocumentCode :
181688
Title :
RA-inspired codes for efficient information theoretic multi-path network security
Author :
Tao Ye ; Veitch, D. ; Johnson, S.
Author_Institution :
Dept. of Electr. & Electron. Eng., Univ. of Melbourne, Melbourne, VIC, Australia
fYear :
2014
fDate :
26-29 Oct. 2014
Firstpage :
408
Lastpage :
412
Abstract :
Mobile devices have multiple network interfaces, some of which have security weaknesses, yet are used for sensitive data despite the risk of eavesdropping. We describe a data-splitting approach which, by design, maps exactly to a wiretap channel, thereby offering information theoretic security. Being based on the deletion channel, it perfectly hides block boundaries from the eavesdropper, which enhances security further. We provide an efficient Repeat Accumulate inspired code design, which satisfies the security criterion, and explore its security rate as a function block size and other parameters.
Keywords :
codes; information theory; security of data; telecommunication security; RA-inspired codes; data-splitting approach; deletion channel; eavesdropper; eavesdropping; function block size; information theoretic multipath network security; mobile devices; multiple network interfaces; repeat accumulate inspired code design; security criterion; security rate; security weaknesses; sensitive data; wiretap channel; Australia; Decoding; Encoding; Generators; Parity check codes; Security; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and its Applications (ISITA), 2014 International Symposium on
Conference_Location :
Melbourne, VIC
Type :
conf
Filename :
6979875
Link To Document :
بازگشت