Rethinking the Intercept Probability of Random Linear Network Coding

This letter considers a network comprising a transmitter, which employs random linear network coding to encode a message, a legitimate receiver, which can recover the message if it gathers a sufficient number of linearly independent coded packets, and an eavesdropper. Closed-form expressions for the probability of the eavesdropper intercepting enough coded packets to recover the message are derived. Transmission with and without feedback is studied. Furthermore, an optimization model that minimizes the intercept probability under delay and reliability constraints is presented. Results validate the proposed analysis and quantify the secrecy gain offered by a feedback link from the legitimate receiver.

[1]  Rahim Tafazolli,et al.  Network Coding Theory: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Sachin Katti,et al.  Embracing wireless interference: analog network coding , 2007, SIGCOMM '07.

[4]  Sumei Sun,et al.  Network Coded Transmission of Fountain Codes over Cooperative Relay Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[5]  趙志宏 Network Coding for Large Scale Content Distribution , 2005 .

[6]  Huaping Liu,et al.  On the Inherent Security of Linear Network Coding , 2013, IEEE Communications Letters.

[7]  Bin Wang,et al.  A Secure Broadcasting Scheme with Network Coding , 2013, IEEE Communications Letters.

[8]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[9]  Tommaso Melodia,et al.  To Transmit or Not to Transmit? Distributed Queueing Games in Infrastructureless Wireless Networks , 2016, IEEE/ACM Transactions on Networking.

[10]  Marco Fiore,et al.  Exact Decoding Probability Under Random Linear Network Coding , 2010, IEEE Communications Letters.

[11]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[12]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[13]  Ioannis Chatzigeorgiou,et al.  Performance analysis of random linear network coding in two-source single-relay networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).