Title :
Routing for security in networks with adversarial nodes
Author :
Pak Hou Che ; Minghua Chen ; Ho, Tracey ; Jaggi, Sidharth ; Langberg, Michael
Author_Institution :
Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Hong Kong, China
Abstract :
We consider the problem of secure unicast transmission between two nodes in a directed graph, where an adversary eavesdrops/jams a subset of nodes. This adversarial setting is in contrast to traditional ones where the adversary controls a subset of links. In particular, we study, in the main, the class of routing-only schemes (as opposed to those allowing coding inside the network). Routing-only schemes usually have low implementation complexity, yet a characterization of the rates achievable by such schemes was open prior to this work. We first propose an LP based solution for secure communication against eavesdropping, and show that it is information-theoretically rate-optimal among all routing-only schemes. The idea behind our design is to balance information flow in the network so that no subset of nodes observe “too much” information. Interestingly, we show that the rates achieved by our routing-only scheme are always at least as good as, and sometimes better, than those achieved by “naïve” network coding schemes (i.e. the rate-optimal scheme designed for the traditional scenario where the adversary controls links in a network rather than nodes.) We also demonstrate non-trivial network coding schemes that achieve rates at least as high as (and again sometimes better than) those achieved by our routing schemes, but leave open the question of characterizing the optimal rate-region of the problem under all possible coding schemes. We then extend these routing-only schemes to the adversarial node-jamming scenarios and show similar results. During the journey of our investigation, we also develop a new technique that has the potential to derive nontrivial bounds for general secure-communication schemes.
Keywords :
directed graphs; network coding; telecommunication network routing; telecommunication security; LP based solution; adversarial node-jamming scenarios; adversarial setting; adversary controls; adversary eavesdrops-jams; directed graph; general secure-communication schemes; naive network coding schemes; network security; nontrivial network coding schemes; optimal rate-region; routing-only schemes; unicast transmission security; Complexity theory; Encoding; Jamming; Lead; Network coding; Random variables; Routing;
Conference_Titel :
Network Coding (NetCod), 2013 International Symposium on
Conference_Location :
Calgary, AB
Print_ISBN :
978-1-4799-0821-9
DOI :
10.1109/NetCod.2013.6570834