Visible to the public Security modalities on linear network code for randomized sources

TitleSecurity modalities on linear network code for randomized sources
Publication TypeConference Paper
Year of Publication2017
AuthorsDong, D. S.
Conference Name2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
PublisherIEEE
ISBN Number978-1-5090-4442-9
Keywordsadversaries, composability, computational security, Conferences, cryptographic measure, cryptography, encoding, illegitimate users, imperfectly secure, information rate, information symbols, information theoretic approach, information theoretic security bounds, Knowledge engineering, linear codes, linear network code, linear network coding scheme, Mathematical model, maximized information transmission, Metrics, network coding, number random symbols, optimally secure information transmission, Peer-to-peer computing, pubcrawl, r-secure, random keys, random source symbols, randomized source messages, randomized sources, resilience, Resiliency, Secure network code, security, security constraints, security modalities, telecommunication security, weakly secure, wiretapped network
Abstract

Today's major concern is not only maximizing the information rate through linear network coding scheme which is intelligent combination of information symbols at sending nodes but also secured transmission of information. Though cryptographic measure of security (computational security) gives secure transmission of information, it results system complexity and consequent reduction in efficiency of the communication system. This problem leads to alternative way of optimally secure and maximized information transmission. The alternative solution is secure network coding which is information theoretic approach. Depending up on applications, different security measures are needed during the transmission of information over wiretapped network with potential attack by the adversaries. In this research work, mathematical model for different security constraints with upper and lower boundaries were studied depending up on the randomness added to the source message and hence the security constraints on linear network code for randomized source messages depends both on randomness added and number of random source symbols. If the source generates large number random symbols, lesser number of random keys can give higher security to the information but information theoretic security bounds remain same. Hence maximizing randomness to the source is equivalent to adding security level.

URLhttps://ieeexplore.ieee.org/document/8300080/
DOI10.1109/WiSPNET.2017.8300080
Citation Keydong_security_2017