On Wiretap Networks II

We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume that the network implements network coding techniques to simultaneously deliver all the packets available at the source to all the destinations. We show how this problem can be looked at as a network generalization of the Ozarow-Wyner wiretap channel of type II. In particular, we show that network security can be achieved by using the Ozarow-Wyner approach of coset coding at the source on top of the implemented network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretapped networks. We also derive new bounds on the required secure code alphabet size and an algorithm for code construction.

[1]  Jon Feldman,et al.  On the Capacity of Secure Network Coding , 2004 .

[2]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[3]  Ryutaroh Matsumoto Construction algorithm for network error-correcting codes attaining the Singleton bound , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  R. Yeung,et al.  Characterizations of Network Error Correction / Detection and Erasure Correction , 2007 .

[5]  Peter Sanders,et al.  Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.

[6]  Kamal Jain Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.

[7]  Muriel Medard,et al.  Resilient Network Coding in the Presence of , 2007 .

[8]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[9]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[10]  Zhen Zhang,et al.  Network Error Correction Coding in Packetized Networks , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Chengdu.

[11]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[12]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[13]  Michael Langberg,et al.  The encoding complexity of network coding , 2005, ISIT.

[14]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[15]  Michael Langberg,et al.  Network Coding: A Computational Perspective , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[16]  Tracey Ho,et al.  Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.

[17]  Christina Fragouli,et al.  Information flow decomposition for network coding , 2006, IEEE Transactions on Information Theory.