Skip to main content
Log in

Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper investigates the problem of constructing a secret error-correcting multisource network coding scheme against an adversary that can re-select the μ tapping links in different time slice and inject z erroneous packets into network, and the network suffers from ρ packet erasures. In our network scenario, multiple sources transmit information to one or more receivers and these receivers request the information from all the sources. Firstly, a necessary condition is derived for keeping the transmitted information from multisource nodes are secret from the eavesdropper, while the network is only subject to the eavesdropping attack. Subsequently, we provide two multisource network coding schemes for error and erasure correction which can decode the transmitted information correctly. After that, a secret and reliable multisource network coding is proposed. This scheme can retrieve the original information secretly and accurately from the corrupt and deficient information. Meanwhile, it can obtain an asymptotic achievable rate of k − 2zρ − 3μ. Moreover, the intermediate nodes are oblivious to the concrete encoding and decoding algorithms implement in source and destination nodes. Finally, security and performance analyses illustrate the advantages of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ahlswede R., Cai N., Li S. R., Yeung R. W. (2000) Network information flow. IEEE Transactions on Information Theory 46(4): 1204–1216

    Article  MathSciNet  MATH  Google Scholar 

  2. Rouayheb, S. Y. E., & Soljanin, E. (2007). On wiretap networks II. In Proceedings of IEEE international symposium on information theory (ISIT 2007) (pp. 551–555).

  3. Silva, D., & Kschischang, F. R. (2008). Security for wiretap networks via rank-metric codes. In Proceedings of IEEE International Symposium on Information Theory (ISIT 2008) (pp. 176–180).

  4. Zhang, P., Jiang, Y., Lin, C., et al. (2010). P-coding: Secure network coding against eavesdropping attacks. In Proceedings of IEEE INFOCOM 2010 (pp. 1–9).

  5. Nutman, L., & Langberg, M. (2008). Adversarial models and resilient schemes for network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2008) (pp. 171–175).

  6. Ngai, C.-K., & Yeung, R. W. (2009). Secure error-correcting (SEC) network codes. In Proceedings of workshop on network coding, theory & applications (pp. 98–103).

  7. Yao, H., Silva, D., Jaggi, S., et al. (2010). Network codes resilient to jamming and eavesdropping. In Proceedings of IEEE international symposium on network coding (pp. 31–36).

  8. Silva, D., & Kschischang, F. R. (2010). Universal secure error-correcting schemes for network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2010) (pp. 2428–2432).

  9. Silva D., Kschischang F. R. (2011) Universal secure network coding via rank-metric codes. IEEE Transactions on Information Theory 57(2): 1124–1135

    Article  MathSciNet  Google Scholar 

  10. Shioji E., Matsumoto R., Uyematsu T. (2010) Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A(11): 2026–2033

    Article  Google Scholar 

  11. Jafari, M., Fragouli, C., & Diggavi, S. (2008). Noncoherent multisource network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2008) (pp. 817–821).

  12. Jafari, M., Fragouli, C., & Diggavi, S. (2009). Code construction for multiple sources network coding. In Proceedings of MobiHoc 2009.

  13. Mohajer, S., Jafari, M., Diggavi, S., et al. (2009). On the capacity of multisource noncoherent network coding. In Proceedings of information theory workshop (ITW 2009) (pp. 130–134).

  14. Vyetrenko, S., Ho, T., Effros, M., et al. (2009). Rate regions for coherent and noncoherent multisource network error correction. In Proceedings of IEEE international symposium on information theory (ISIT 2009) (pp. 1001–1005).

  15. Yao, H., Dikaliotis, T. K., Jaggi, S., et al. (2010). Multiple access network information-flow and correction codes. In Proceedings of information theory workshop (ITW 2010).

  16. Dikaliotis, T. K., Ho, T., Jaggi, S., et al. (2011). Multiple-access network information-flow and correction codes IEEE Transactions on Information Theory, 57(2), 1067–1079.

    Google Scholar 

  17. Chen, S., Wu, M., & Lu, W. (2011). Secret error-correcting network coding against eavesdropping and pollution attacks. In Proceedings of international conference on information systems and computational intelligence (pp. v1-140–v1-145).

  18. Chen, S., Wu, M., & Lu, W. (2011). Counteracting malicious adversaries via secret and reliable coding mechanism in random network coding. International Journal of Communication Systems. (Published online in Wiley Online Library). doi:10.1002/dac.1359.

  19. Silva D., Kschischang F. R., Koetter R. (2008) A rank-metric approach to error control in random network coding. IEEE Transactions on Information Theory 54(9): 3951–3967

    Article  MathSciNet  Google Scholar 

  20. Jaggi S., Langberg M., Katti S. et al (2008) Resilient network coding in the presence of byzantine adversaries. IEEE Transactions on Information Theory 54(6): 2596–2603

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siguang Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, S., Wu, M. & Lu, W. Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding. Wireless Pers Commun 69, 1847–1864 (2013). https://doi.org/10.1007/s11277-012-0666-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0666-7

Keywords

Navigation