Counteracting malicious adversaries via secret and reliable coding mechanism in random network coding

SUMMARYThis paper investigates the problem of constructing a secret and reliable network coding communication scheme against an adversary that can reselect the μ tapping links in different time slices and inject z erroneous packets into the network, while the network suffers from ρ packet erasures....

Full description

Saved in:
Bibliographic Details
Published in:International journal of communication systems Vol. 26; no. 5; pp. 567 - 582
Main Authors: Chen, Siguang, Wu, Meng, Lu, Weifeng
Format: Journal Article
Language:English
Published: Chichester Blackwell Publishing Ltd 01.05.2013
Wiley Subscription Services, Inc
Subjects:
ISSN:1074-5351, 1099-1131
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:SUMMARYThis paper investigates the problem of constructing a secret and reliable network coding communication scheme against an adversary that can reselect the μ tapping links in different time slices and inject z erroneous packets into the network, while the network suffers from ρ packet erasures. We first derive a necessary condition for keeping the transmitted information secret from the adversary, while the network is only subject to eavesdropping attack, and no errors are injected. We then provide two network coding schemes for error and erasure correction, which can decode the transmitted information correctly. With that, a secret and reliable network coding is proposed by combining two error and erasure correction schemes with secret communication. We show that under the requirement of 2z + ρ+ μ  <  k ⩽2z + 2ρ communication can achieve a rate of k −μ−z −ρ packets, where k denotes the network capacity. Moreover, it ensures that the communicated information has complete reliability and information‐theoretic security from the adversary. In particular, the requirement of packet length does not need to be sufficiently large, which is close to the practical packet length. Finally, we also compare our scheme's performance with existing work; the numeric results and security analyses illustrate the performance and security of our scheme. Copyright © 2011 John Wiley & Sons, Ltd. In this paper, we construct a secret and reliable network coding scheme against an adversary that can reselect the μ tapping links in different time slices and inject z erroneous packets into the network, while the network suffers from ρ packet erasures. We show that under the requirement of 2z + ρ+ μ  <  k  ⩽ 2z + 2ρ communication can achieve a rate of k −μ−zρ packets, where k denotes network capacity. In particular, the requirement of packet length doesn't need to be sufficiently large, which is close to the practical packet length.
Bibliography:ark:/67375/WNG-H4VDQ5NW-Z
ArticleID:DAC1359
istex:AF3AB78C6580A3EC638B1E439D1AE03A4DD78518
ObjectType-Article-1
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1074-5351
1099-1131
DOI:10.1002/dac.1359