Secure Network Coding Against the Contamination and Eavesdropping Adversaries
نویسندگان
چکیده
In this paper, we propose an algorithm that targets contamination and eavesdropping adversaries. We consider the case when the number of independent packets available to the eavesdropper is less than the multicast capacity of the network. By means of our algorithm every node can verify the integrity of the received packets easily and an eavesdropper is unable to get any “meaningful information”about the source. We call it “practical security”if an eavesdropper is unable to get any meaningful information about the source. We show that, by giving up a small amount of overall capacity, our algorithm achieves achieves the practically secure condition at a probability of one, which is much higher than that of Bhattad and Narayanan’s [1]. Furthermore, the communication overhead of our algorithm are negligible compared with previous works, since the transmission of the hash values and the code coefficients are both avoided.
منابع مشابه
Secure Network Coding over Small Fields
In the paradigm of network coding, the information-theoretic security problem is encountered in the presence of a wiretapper, who has capability of accessing an unknown channel-subset in communication networks. In order to combat this eavesdropping attack, secure network coding is introduced to prevent information from being leaked to adversaries. For any construction of secure linear network c...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملFast multicast scheme with secure network coding in cloud data centers
Multicast is widely applied in cloud data centers. Because intermediate nodes can encode the packets, network coding improves the capacity and robustness of multicast applications. However, this system is vulnerable to pollution attacks. Existing schemes mainly focus on homomorphic cryptographic technologies against such attacks. However, the homomorphic cryptographic technology introduces comp...
متن کاملGlobal experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks
The cloud-computing paradigm has been driving the cloud-leveraged refactoring of existing information and communications technology services, including voice over IP (VoIP). In this paper, we design a prototype secure mobile VoIP (mVoIP) service with the open-source Asterisk private branch exchange (PBX) software, using Docker lightweight virtualization for mobile devices with the immutable con...
متن کاملPerfectly Secure Message Transmission Scheme against Rational Adversaries
Secure Message Transmission (SMT) is a two-party cryptographic scheme by which a sender securely and reliably sends messages to a receiver using n channels. Suppose that an adversary corrupts at most t out of n channels and makes eavesdropping or tampering over the corrupted channels. It is known that if t < n/2 then the perfect SMT (PSMT) in the information-theoretic sense is achievable and if...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0805.2286 شماره
صفحات -
تاریخ انتشار 2008