Secure network coding against wiretapping and Byzantine attacks

  • Authors:
  • Qin Guo;Mingxing Luo;Lixiang Li;Yixian Yang

  • Affiliations:
  • Inf. Security Center, State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., China and Key Lab. of Network and Inf. Attack and Defence Techn. of MOE, China and Na ...;Inf. Security Center, State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., China and Key Lab. of Network and Inf. Attack and Defence Techn. of MOE, China and Na ...;Inf. Security Center, State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., China and Key Lab. of Network and Inf. Attack and Defence Techn. of MOE, China and Na ...;Inf. Security Center, State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., China and Key Lab. of Network and Inf. Attack and Defence Techn. of MOE, China and Na ...

  • Venue:
  • EURASIP Journal on Wireless Communications and Networking
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. Whether or not some meaningful information is obtained by tapping a wireless connection depends on the transmission scheme. In this paper, we design some secure network coding by combining information-theoretic approaches with cryptographic approaches. It ensures that the wiretapper cannot get any meaningful information no matter how many channels are wiretapped. In addition, if each source packet is augmented with a hash symbol which is computed from a simple nonlinear polynomial function of the data symbols, then the probability of detecting the modification is very high.