Secure network coding for wiretap networks of type II

Research output: Contribution to journalArticlepeer-review

92 Scopus citations

Abstract

We consider the problem of securing a multicast network against a wiretapper that can eavesdrop on the packets on a limited number of network edges of its choice. We assume that the network employs network coding to simultaneously deliver the packets available at the source to all the destinations. We show that this problem can be looked at as a network generalization of the wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner. In particular, we show that the transmitted information can be secured by using the Ozarow-Wyner approach of coset coding at the source on top of the existing network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretap networks. Moreover, we use this framework to derive new bounds on the code alphabet size that are independent of the network size, and provide algorithms for explicit construction of secure network codes. We also analyze the amount of information that can be leaked to the wiretapper as a function of the number of wiretapped edges.

Original languageEnglish (US)
Article number6157072
Pages (from-to)1361-1371
Number of pages11
JournalIEEE Transactions on Information Theory
Volume58
Issue number3
DOIs
StatePublished - Mar 2012
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Keywords

  • Coset codes
  • multicast
  • network coding
  • secrecy
  • wiretap channel II (WTCII)

Fingerprint

Dive into the research topics of 'Secure network coding for wiretap networks of type II'. Together they form a unique fingerprint.

Cite this