TY - GEN
T1 - Achievable strategies for general secure network coding
AU - Cui, Tao
AU - Ho, Tracey
AU - Kliewer, Jörg
PY - 2010
Y1 - 2010
N2 - This paper considers secure network coding over networks with restricted wiretapping sets and unequal link capacities in the presence of a wiretapper that can wiretap any subset of k links. In particular, we consider networks with point-to-point erasure channels. Existing results for wireline networks show that for the case of both unrestricted wiretapping sets and equal (unit) link capacities, the secrecy capacity is given by the cut-set bound, whether or not the location of the wiretapped links is known, and can be achieved by injecting k random keys at the source which are decoded at the sink along with the message. In contrast, for restricted wiretapping sets and unequal link capacities we show that this global key strategy is suboptimal. In particular, we propose achievable strategies where random keys are canceled at intermediate non-sink nodes, injected at intermediate non-source nodes, or a combination of both strategies is considered.
AB - This paper considers secure network coding over networks with restricted wiretapping sets and unequal link capacities in the presence of a wiretapper that can wiretap any subset of k links. In particular, we consider networks with point-to-point erasure channels. Existing results for wireline networks show that for the case of both unrestricted wiretapping sets and equal (unit) link capacities, the secrecy capacity is given by the cut-set bound, whether or not the location of the wiretapped links is known, and can be achieved by injecting k random keys at the source which are decoded at the sink along with the message. In contrast, for restricted wiretapping sets and unequal link capacities we show that this global key strategy is suboptimal. In particular, we propose achievable strategies where random keys are canceled at intermediate non-sink nodes, injected at intermediate non-source nodes, or a combination of both strategies is considered.
UR - http://www.scopus.com/inward/record.url?scp=77952698948&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77952698948&partnerID=8YFLogxK
U2 - 10.1109/ITA.2010.5454118
DO - 10.1109/ITA.2010.5454118
M3 - Conference contribution
AN - SCOPUS:77952698948
SN - 9781424470143
T3 - 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings
SP - 223
EP - 228
BT - 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings
T2 - 2010 Information Theory and Applications Workshop, ITA 2010
Y2 - 31 January 2010 through 5 February 2010
ER -