• DocumentCode
    2201994
  • Title

    Achievable strategies for general secure network coding

  • Author

    Cui, Tao ; Ho, Tracey ; Kliewer, Jörg

  • Author_Institution
    Dept. of Electr. Eng., California Inst. of Technol., Pasadena, CA, USA
  • fYear
    2010
  • fDate
    Jan. 31 2010-Feb. 5 2010
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    This paper considers secure network coding over networks with restricted wiretapping sets and unequal link capacities in the presence of a wiretapper that can wiretap any subset of k links. In particular, we consider networks with point-to-point erasure channels. Existing results for wireline networks show that for the case of both unrestricted wiretapping sets and equal (unit) link capacities, the secrecy capacity is given by the cut-set bound, whether or not the location of the wiretapped links is known, and can be achieved by injecting k random keys at the source which are decoded at the sink along with the message. In contrast, for restricted wiretapping sets and unequal link capacities we show that this global key strategy is suboptimal. In particular, we propose achievable strategies where random keys are canceled at intermediate non-sink nodes, injected at intermediate non-source nodes, or a combination of both strategies is considered.
  • Keywords
    channel capacity; radio links; set theory; telecommunication security; global key strategy; intermediate nonsink nodes; link capacity; network coding; secrecy capacity; wiretapping sets; Communication system security; Computer networks; Decoding; Information security; Network coding; Network topology; Paper technology; Throughput;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and Applications Workshop (ITA), 2010
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4244-7012-9
  • Electronic_ISBN
    978-1-4244-7014-3
  • Type

    conf

  • DOI
    10.1109/ITA.2010.5454118
  • Filename
    5454118