DocumentCode :
672930
Title :
Efficient Weakly-Secure Network Coding Scheme Against Nodes Conspiracy Attack for Multicast System
Author :
Rong Du ; Shenghong Li
Author_Institution :
Sch. of Electron. Inf. & Electron. Eng., Shanghai Jiao Tong Univ., Shanghai, China
fYear :
2013
fDate :
16-17 Nov. 2013
Firstpage :
151
Lastpage :
155
Abstract :
Since network information flow can achieve the max-flow in theory and the network throughput is increased by using network coding. At the same time, the security of network coding is of importance as the research of network coding increase. Different from previous wiretapping scenarios where the threat is posed by external wiretappers. We discuss the security in an internal angle: all intermediate nodes comply with the communication protocols which are potential wiretappers and the wiretappers can cooperate with each other to decode the packets sent from the source node. Most existing research on network coding designs with a given topology, we will consider the secure network topology design. In this paper, our purpose is to find the secure transmission topology that is suitable for network coding in transmission system. Based on the secure topology, we use network coding scheme which is weakly secure. Mathematical analysis and computer simulations show that the proposed protocol can prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.
Keywords :
multicast communication; network coding; protocols; telecommunication network topology; telecommunication security; communication protocols; computer simulations; cooperative eavesdroppers; mathematical analysis; multicast system; network coding security; network information; network topology design; nodes conspiracy attack; sink node; source node; transmission system; wiretapping; Algorithm design and analysis; Conferences; Encoding; Network coding; Network topology; Security; Topology; conspiracy Attack; cooperative eavesdroppers; multicast system; network coding; weakly-secure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology and Applications (ITA), 2013 International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-2876-7
Type :
conf
DOI :
10.1109/ITA.2013.41
Filename :
6709957
Link To Document :
بازگشت