We consider the problem of secure cooperative data exchange in wireless networks. The cooperative data exchange problem includes a set of wireless clients that exchange information over a lossless broadcast channel. The clients are missing some packets but collectively know all packets. Each client can transmit packets it currently has or a combination thereof. The problem asks for a scheme that allows all clients to recover all packets with the minimum number of transmissions. We focus on secure information exchange in the presence of an eavesdropper that can observe all packets transmitted over the broadcast channel. Our goal is to construct a \emph{weakly secure} solution to the cooperative data exchange problem, i.e., a solution that does not reveal information about any single packet. This is in contrast to \emph{strongly secure} solutions that do not reveal any data about the entire set of packets. Weakly secure solutions can be implemented more efficiently in practical settings and do not require sharing secret keys. Our paper makes the following contributions. First, we establish necessary and sufficient conditions for the feasibility of weakly secure data exchange for any given instance of the weakly secure data exchange problem. Second, we show that if it is possible to obtain a weakly secure solution for an instance of the cooperative data exchange problem, then weak security can be achieved with no penalty in terms of the total number of transmissions. Finally, we present an algorithm that finds an optimal weakly secure solution to the cooperative data exchange problem.
[1]
Alexander Sprintson,et al.
A randomized algorithm and performance bounds for coded cooperative data exchange
,
2010,
2010 IEEE International Symposium on Information Theory.
[2]
Alexander Sprintson,et al.
On coding for cooperative data exchange
,
2010,
2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).
[3]
Krishna R. Narayanan,et al.
Weakly Secure Network Coding
,
2005
.
[4]
Nabih Alaoui.
Cooperative Communications In Mobile Ad hoc NETworks
,
2013
.
[5]
Alexander Sprintson,et al.
Deterministic Algorithm for Coded Cooperative Data Exchange
,
2010,
QSHINE.
[6]
C.-C. Jay Kuo,et al.
Cooperative Communications in Resource-Constrained Wireless Networks
,
2007,
IEEE Signal Processing Magazine.
[7]
R. Yeung,et al.
Secure network coding
,
2002,
Proceedings IEEE International Symposium on Information Theory,.
[8]
Elza Erkip,et al.
Cooperative network implementation using open-source platforms
,
2009,
IEEE Communications Magazine.