Skip to main content

Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization

  • Conference paper
Coding Theory and Applications

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5228))

Abstract

A new type of attack on secure network coding is introduced in this paper. In this model, network nodes, which handle the traffic from the source node to sink nodes are potentially viewed to be corruptible. We study the maximum security capacity for this problem for a single- source single-sink scenario, and we generalize our study for multicast with network coding. Based on our study, two optimization problems are introduced to increase the security against the attacks under study. We have shown by simulation results that our proposed optimization method has increased the security against node corruption considerably, and at the same time, the cost per level of security is lower compared to optimization methods without constraints on node corruption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Transactions on Information Theory 46(4), 1204–1216 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  3. Barbero, Á.I., Ytrehus, Ø.: Cycle-logical treatment for ”Cyclopathic” networks. IEEE Transactions on Information Theory 52(6), 2795–2804 (2006)

    Article  MathSciNet  Google Scholar 

  4. Cai, N., Yeung, R.W.: Secure network coding. In: Proc. IEEE International Symposium on Information Theory, vol. 323 (2002)

    Google Scholar 

  5. Feldman, J., Malkin, T., Servedio, R.A., Stein, C.: On the Capacity of Secure Network Coding. In: Proc. 42nd Annual Allerton Conference on Communication, Control and Computing (2004)

    Google Scholar 

  6. Hassanzadeh, M.M., Ravanbakhsh, M., Ytrehus, Ø.: Two Layer Secure Network Coding – (2-LSNC). In: 4th Biannual International Symposium on Telecommunications, Tehran, Iran (submitted, 2008)

    Google Scholar 

  7. Jaggi, S., Sanders, P., Chou, P.A., Effros, M., Egner, S., Jain, K., Tolhuizen, L.M.G.M.: Polynomial time algorithms for multicast network code construction. IEEE Transactions on Information Theory 51(6), 1973–1982 (2005)

    Article  MathSciNet  Google Scholar 

  8. Lima, L., Medard, M., Barros, J.: Random linear network coding: a free cipher? In: Proc. IEEE International Symposium on Information Theory, Nice, France (2007)

    Google Scholar 

  9. Lun, D.S., Ratnakar, N., Medard, M., Koetter, R., Karger, D.R., Ho, T., Ahmed, E., Zhao, F.: Minimum-cost multicast over coded packet networks. IEEE Transactions on Information Theory 52(6), 2608–2623 (2006)

    Article  MathSciNet  Google Scholar 

  10. Li, S.-Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Transactions on Information Theory 49(2), 371–381 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  11. Shamir, A.: How to share a secret. Communications of the ACM 22(1), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  12. Winter, P.: Steiner problem in networks: A survey. Networks 17, 129–167 (1987)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ángela Barbero

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ravanbakhsh, M., Hassanzadeh, M.M., Haugland, D. (2008). Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. In: Barbero, Á. (eds) Coding Theory and Applications. Lecture Notes in Computer Science, vol 5228. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87448-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87448-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87447-8

  • Online ISBN: 978-3-540-87448-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics