Secure Error-Correcting Network Codes with Side Information from Source

This paper investigates the problem of securing $k$ source symbols transmission in a network with side information to an adversary who can obtain $k'$ source symbols, eavesdrop $\mu$ channels and contaminate $d$ channels. We characterize the security performance of the new model by relative network generalized Hamming weight (RNGHW) of a linear code and a sub code with respect to network error correction (NEC). The model regards secure network coding on wiretap networks as a special case. An upper bound on NEC-RNGHW is introduced and two deterministic constructions of transmission scheme are proposed to achieve the bound.

[1]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.

[2]  Victor K.-W. Wei,et al.  Generalized Hamming weights for linear codes , 1991, IEEE Trans. Inf. Theory.

[3]  Raymond W. Yeung,et al.  Network generalized hamming weight , 2009 .

[4]  Raymond W. Yeung,et al.  Secure error-correcting (SEC) network codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[5]  Emina Soljanin,et al.  On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.

[6]  Kefei Chen,et al.  Some new characters on the wire-tap channel of type II , 2005, IEEE Transactions on Information Theory.

[7]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  Peter Sanders,et al.  Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.

[9]  Frank R. Kschischang,et al.  Security for wiretap networks via rank-metric codes , 2007, 2008 IEEE International Symposium on Information Theory.

[10]  R. Yeung,et al.  NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .

[11]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[12]  R. Yeung,et al.  NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .

[13]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[14]  Zhixue Zhang Wiretap networks II with partial information leakage , 2009, 2009 Fourth International Conference on Communications and Networking in China.

[15]  R. Yeung,et al.  Characterizations of Network Error Correction / Detection and Erasure Correction , 2007 .

[16]  Ning Cai,et al.  Network Error Correction, I: Basic Concepts and Upper Bounds , 2006, Commun. Inf. Syst..