Browse > Article
http://dx.doi.org/10.3837/tiis.2015.03.020

Practical Schemes for Tunable Secure Network Coding  

Liu, Guangjun (School of Mathematics and Computer Engineering, Xi'an University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.3, 2015 , pp. 1193-1209 More about this Journal
Abstract
Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.
Keywords
Network security; network coding; wiretapping; MDS code; Vandermonde matrix; encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol.46, no.4, pp.1204-1216, 2000.   DOI
2 R. Koetter, M. Medard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol.11, no.5, pp.782-795, 2003.   DOI
3 Y. Chen, G. Feng, L. Zhou, "Using network coding to improve robustness and persistence for data transmission in sensor networks," in Proc. of 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp.1170-1175 , 2011.
4 T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, B. Leong, "A random linear network coding approach to multicast," IEEE Transactions on Information Theory, vol.52, no.10, pp.4413-4430, 2006.   DOI
5 C. Fragouli, E. Soljanin, "Network Coding Applications," Journal of Foundations and Trends in Networking, vol.2, no.2, pp.135-269, 2007.   DOI
6 R. Du, C. Zhao, F. Zhao, S. Li, "Strategies of network coding against nodes conspiracy attack," Security and Communication Networks, 2013.
7 J. Feldman, T. Malkin, C. Stein, R. A. Servedio, "On the capacity of secure network coding," in Proc. of 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004. http://people.csail.mit.edu/jonfeld/pubs/sflow_Allerton04_final.pdf.
8 L. H. Ozarow, A. D. Wyner, "Wire-tap channel II," AT&T Bell Labs. Tech. J., vol.63, pp.2135-2157, 1984.   DOI
9 S. Y. E. Rouayheb, E. Soljanin, A. Sprintson, "Secure network coding for wiretap networks of type II," IEEE Transactions on Information Theory, vol.58, no.3, pp.1361-1371, 2012.   DOI
10 D. Silva, F.R. Kschischang, "Universal Secure Network Coding via Rank-Metric Codes," IEEE Transactions on Information Theory, vol.57, no.2, pp.1124-1135, 2011.   DOI
11 F. Cheng, R. W. Yeung, "Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets," IEEE Transactions on Information Theory, vol 60, no.6, 2014.
12 K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proc. of 1st Workshop on Network Coding, Theory, and Applications (NetCod05), 2005. http://netcod.org/papers/06BhattadN-final.pdf.
13 D. Silva, F. R. Kschischang, "Universal weakly secure network coding," in Proc. of IEEE Information Theory Workshop on Networking and Information Theory, pp.281-285, 2009.
14 Y. Fan, Y. Jiang, H. Zhu, X. Shen, "An efficient privacy-preserving scheme against traffic analysis in network coding," in Proc. of IEEE INFOCOM'09, pp.2213-2221, 2009.
15 P. F. Oliveira, L. Lima, T. T. V. Vinhoza, M. Medard, J. Barros, "Trusted Storage over Untrusted Networks," in Proc. of IEEE Global Telecommunications Conference (GLOBECOM), pp.1-5, 2010.
16 F. Cheng, R. W. Yeung, K. W. Shum, "Imperfect Secrecy in Wiretap Channel II," in Proc. of IEEE International Information Theory (ISIT), 2012.
17 J. P. Vilela, L. Lima, J. Barros, "Lightweight Security for Network Coding," in Proc. of the IEEE International Conference on Communications (ICC), pp.1750-1754, 2008.
18 L. Lima, J. Barros, M. Medard, A. Toledo, "Towards Secure Multiresolution Network Coding," in Proc. of IEEE Information Theory Workshop on Networking and Information Theory (ITW), pp.125-129, Jun.10-12, 2009.
19 P. Zhang, Y. Jiang, C. Lin, Y Fan, X. Shen, "P-Coding: Secure Network Coding against Eavesdropping Attacks," in Proc. of IEEE INFOCOM'10, pp.1-9, 2010.
20 J. Lacan, J. Fimes, "A construction of matrices with no singular square submatrices," in Proc. of the 7th International Conference on Finite Fields and Applications, Lecture Notes in Computer Science, vol.2948, pp.145-147, 2003.
21 J. Lacan, J. Fimes, "Systematic MDS erasure codes based on Vandermonde matrices," IEEE Communications Letters, vol.8, no.9, pp.570-572, 2004.   DOI
22 I. Gohberg, V. Olshevsky, "Fast algorithms with preprocessing for matrix-vector multiplication problems," Journal of Complexity, vol.10, no.4, pp.411-427, 1994.   DOI
23 R. A. Mollin, "An Introduction to Cryptography," CRC Press, 2006.
24 P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for orthogonality: Efficient subspace authentication for network coding," in Proc. of IEEE INFOCOM, pp.1026-1034, 2011.
25 M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A concrete security treatment of symmetric encryption," in Proc. of the 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
26 M. J. Moyer, J. R. Rao, P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol.13, no.6, pp.12-23, 1999.   DOI
27 C. Cheng, T. Jiang, "An efficient homomorphic MAC with small key size for authentication in network coding," IEEE Transactions on Computers, vol.2, no.10, pp.2096-2100, 2013.
28 S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, "Resilient Network Coding in the Presence of Byzantine Adversaries," in Proc. of IEEE INFOCOM, pp.616-624, 2007.
29 Z. Zhang, "Linear network error correction codes in packet networks," IEEE Transactions on Information Theory, vol.54, no.1, pp.209-218, 2008.   DOI
30 C. K. Ngai, "Network Coding for Security and Error Correction," Ph.D. Thesis, 2008. http://iest2.ie.cuhk.edu.hk/-whyeung/post/thesis/Ngai.pdf.
31 F. J. MacWilliams, N. J. A. Sloane, "The Theory of Error-Correcting Codes," New York: North-Holland, 1977.
32 N. Cai, R. W. Yeung, "Secure network coding," in Proc. of International Symposium in Information Theory, 2002.
33 T. M. Cover, J. A. Thomas, "Elements of Information Theory," 2009.