Advanced Search
Volume 31 Issue 9
Dec.  2010
Turn off MathJax
Article Contents
Zhou Ye-jun, Li Hui, Ma Jian-feng. Secure Error-Correction Network Coding[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237
Citation: Zhou Ye-jun, Li Hui, Ma Jian-feng. Secure Error-Correction Network Coding[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237

Secure Error-Correction Network Coding

doi: 10.3724/SP.J.1146.2008.01237
  • Received Date: 2008-10-06
  • Rev Recd Date: 2009-03-17
  • Publish Date: 2009-09-19
  • In this paper, a secure error-correcting network coding is proposed using a metric on the space of all subspaces of a message vector space. It shows that a minimum distance decoder for this metric can correct errors of a limited dimension. On the other hand, when the number of channels the adversary can eavesdrop on is less than the max-flow of a network, the adversary can not get any information about the source. Furthermore, when the source and the destination shares a Pseudo-Random number generator and a secret key, the coding scheme can prevent adversary who can eavesdrop on all the channels of a network.
  • loading
  • Ahlswede R, Cai N, and Li S Y, et al.. Network informationflow [J].IEEE Transactions on Information Theory.2000,46(4):1204-1216[2]Li S Y, Yeung R W, and Cai N. Linear network coding [J].IEEE Transactions on Information Theory.2003, 49(2):371-381[3]Ho T, Koetter R, and Medard M, et al.. The benefits ofcoding over routing in a randomized setting [C]. IEEEInternational Symposium on Information Theory, YokohamaJapan, 2003: 442.[4]Geil1 O, Matsumoto R, and Thomsen1 C. On field size andsuccess probability in network coding [C][J].Lecture Notes inComputer Science.2008, 5130:157-173[5]武广柱, 王劲林, 齐卫宁. ARLNC Stream: 自适应随机网络编码流媒体系统[J].电子与信息学报.2008, 30(1):25-28浏览[6]Cai N and Yeung R W. Secure network coding [C]. IEEEInternational Symposium on Information Theory, Lausanne,Switzerland, 2002:323.[7]Feldman J, Malkin T, and Stein C, et al.. On the capacity ofsecure network coding [C]. In Proc. 42nd Annual AllertonConference on Communication, Control, and Computing,Monticello, IL, USA, Sep. 2004.[8]Chanl T and Grant A. Capacity bounds for secure networkcoding [C]. Communication theory workshop, Australian,2008: 95-100.[9]Bhattad K and Narayanan K R. Weakly secure networkcoding [C]. In Proc. of the First Workshop on NetworkCoding, Theory, and Applications (NetCod), Riva del, Garda,Italy, 2005.[10]Jain K. Security based on network topology against thewiretapping attack [J].IEEE Wireless Communications.2004, 11(1):68-71[11]Lima L, Medard M, and Barros J. Random linear networkcoding: A free cipher? [C]. IEEE International Symposium onInformation Theory, Nice, France, 2007: 546-550.[12]Ho T, Leong B, and Koetter R, et al.. Byzantine modificationdetection in multicast networks using randomized networkcoding [C]. IEEE International Symposium on InformationTheory, Chicago, USA, 2004: 144.[13]Jaggi S, Langberg M, and Katti S, et al.. Resilient networkcoding in the presence of Byzantine adversaries [C]. 26thIEEE International Conference on ComputerCommunications, Anchorage, Alaska, 2007: 616-624.[14]Nutman L and Langberg M. Adversarial models and resilientschemes for network coding [C]. IEEE InternationalSymposium on Information Theory, Toronto, Ontario,Canada, 2008: 171-175.Yu Zhen, Wei Ya-wen, Ramkumar B, and Guan Yong. Anefficient signature-based scheme for securing network codingagainst pollution attacks [C]. Proc 27th Annual IEEEConference on Computer Communication, INFOCOM,(Anchorage, AK), 2008: 1409-1417.[15]Cai N and Yeung R W. Network coding and error correction[C]. IEEE Information Theory Workshop, Bangalore, India,2002: 119-122.[16]Yeung R W and Cai N. Network error correction, part I:basic concepts and upper bounds [J]. Communications inInformation and Systems, 2006, 6(1): 19-36.[17]Cai N and Yeung R W. Network error correction, part II:lower bounds [J]. Communications in Information andSystems, 2006, 6(1): 37-54.[18]Yang Sheng-hao and Yeung R W. Refined coding bounds fornetwork error correction [C]. IEEE Information TheoryWorkshop, Bergen, Norway, 2007: 1-5.Yang Sheng-hao, Ngai C K, and Yeung R W. Construction oflinear network codes that achieve a refined singleton bound[C]. IEEE International Symposium on Information Theory,Nice, France 2007: 1576-1580.[19]Zhang Z. Network error correction coding in packetizednetworks [C]. IEEE Information Theory Workshop, ChengduChina, 2006: 433-437.[20]Zhang Z. Linear network error correction codes in packetnetworks [J].IEEE Transactions on Information Theory.2008, 54(1):209-218[21]Yang Sheng-hao and Yeung R W. Characterizations ofnetwork error correction/ detection and erasure correction[C]. In Proc. of the Third Workshop on Network Coding,Theory, and Applications, San Diego, California, 2007.[22]Koetter R and Kschischang F R. Coding for errors anderasures in random network coding [J]. IEEE Transactionson Information Theory, 2008. 2008, 54(8): 3579-3591.[23]Ngai C K and Yang Sheng-hao. Deterministic secureerror-correcting (SEC) network codes [C]. IEEE InformationTheory Workshop, Bergen, Norway, 2007: 96-101.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3060) PDF downloads(831) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return