Secure Network Coding for Wiretap Networks of Type II

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network edges of its choice. We assume that the network employs the network coding technique to simultaneously deliver the packets available at the source to all the receivers. We show that this problem can be looked at as a network generalization of the wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner. In particular, we show that the transmitted information can be secured by using the Ozarow-Wyner approach of coset coding at the source on top of the existing network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretap networks. Moreover, we derive new bounds on the required alphabet size that are independent of the network size and devise an algorithm for the construction of secure network codes. We also look at the dual problem and analyze the amount of information that can be gained by the wiretapper as a function of the number of wiretapped edges.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secure Network Coding for Wiretap Networks of Type II does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secure Network Coding for Wiretap Networks of Type II, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Network Coding for Wiretap Networks of Type II will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-174525

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.