2010 IEEE International Symposium on Network Coding (NetCod) 2010
DOI: 10.1109/netcod.2010.5487669
|View full text |Cite
|
Sign up to set email alerts
|

Network Codes Resilient to Jamming and Eavesdropping

Abstract: Abstract-We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-time, rate-optimal distributed network codes for this scenario, improving on the rates achievable in [1]. Our main contribution shows that as long as the sum of the adversary's jamming rate ZO and his eavesdropping rate ZI is less than the network capacity C, (i.e., ZO + ZI < C), our codes can communicate (w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
96
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 33 publications
(96 citation statements)
references
References 19 publications
0
96
0
Order By: Relevance
“…The network error correction code [6] gives the maximum rate at which the source can transmit secretly and securely; our construction achieves the same maximum rate but with a lower computational complexity and a higher error correction probability. Our new scheme is an extension of that in [4] which only considers error correction but not the secrecy of the messages.…”
Section: B Backgroundmentioning
confidence: 88%
See 3 more Smart Citations
“…The network error correction code [6] gives the maximum rate at which the source can transmit secretly and securely; our construction achieves the same maximum rate but with a lower computational complexity and a higher error correction probability. Our new scheme is an extension of that in [4] which only considers error correction but not the secrecy of the messages.…”
Section: B Backgroundmentioning
confidence: 88%
“…Directly applying the result in [6], which provides polynomial time encoding and decoding algorithms for all achievable rates, gives the following: Theorem 1. For the path-key establishment problem above, …”
Section: B Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, as long as the overall rate decreases by z r , both secrecy and reliability are simultaneously met. 4 5) Secret key extraction via passive feedback: A surprising effect of passive feedback is that it allows Alice and Bob to extract secret keys from corrupted links as long as the received codeword on the link is hidden from Calvin. This allows for simultaneous reliable and secret transmission at rates higher than that achievable by just mixing z r random keys with the message.…”
Section: ) Mixing Keys For Secrecymentioning
confidence: 99%