Skip to main content

A Strategy of Network Coding Against Nodes Conspiracy Attack

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 202))

Abstract

In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. In this chapter, we investigate the advantages of applying network Coding in sensor networks for security purpose. In particular, the problem of constructing a secure unicast system is considered. Unlike previous wiretapping scenarios, where the threat is posed by external wiretappers. we approach the security from an internal angle: all nodes comply with the communication protocols yet are potential eavesdroppers and the eavesdroppers can cooperate with each other to decode the packets sent from the source node. Different from most existing research on network coding that designs the network coding scheme based on a given topology, we will consider the network topology design. We first try to find the transmission topology that is suitable for network coding in unicast system. Based on the topology, we use linear network coding scheme which is weakly secure. We conduct simulations to show that it prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahlswede R, Cai N, Li S-YR, Yeung RW (2000) Network information flow. IEEE Trans Inf Theory 46(4):1204–1216

    Article  MathSciNet  MATH  Google Scholar 

  2. Li S, Yeung R, Cai N (2003) Linear network coding. IEEE Trans Inf Theory 49(2):371–381

    Article  MathSciNet  MATH  Google Scholar 

  3. Lima L, Medard M, Barros J (2007) Random linear network coding: a free cipher. In: Proceedings of IEEE international symposium on information theory (ISIT), Acropolis Congress and Exhibition Center, Nice, France 24th–29th June 2007, pp 546–550

    Google Scholar 

  4. Cai N, Yeung R (2002) Secure network coding. In: Proceedings of IEEE international symposium on information theory (ISIT), Palais de Beaulieu Lausanne, Switzerland, June 30–July 5, Chicago downtown Marriott, p 323

    Google Scholar 

  5. Feldman J, Malkin T, Stein C, Servedion RA (2004) On the capacity of secure network coding. In: Proceedings of the 42nd annual allerton conference on communication, control, and computing, Allerton House, Monticello, Illinois, USA, September 29–October 1

    Google Scholar 

  6. Bhattad K, Narayanan KR (2005) Weakly secure network coding. In: Proceedings of the first workshop on network coding, theory, and applications (Netcod), Riva del Garda

    Google Scholar 

  7. Yu Z, Wei Y, Ramkumar B, Guan Y (2008) An efficient signature-based scheme for securing network coding against pollution attacks. In: Proceedings of IEEE INFOCOM 2008, the 27th conference on computer communication, April 13–18, Phoenix, Arizona, USA, pp 1409–1417

    Google Scholar 

  8. Ho T, Leong B, koetter R, Medard M, Effros M, Karger D (2004) Byzantine modification detection in multicast networks using randomized network coding. In: Proceedings of IEEE international symposium on information theory (ISIT), Chicago downtown Marriott, Chicago, Illinois, USA, 6.27–7.2, p 144

    Google Scholar 

  9. Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M (2007) Resilinet network coding in the presence of byzantine adversaries. In: Proceedings of IEEE INFOCOM 2007, the 26th conference on computer communications, Acropolis Congress and Exhibition Center Nice, France, 24th–29th June, pp 616–624

    Google Scholar 

  10. Krohn M, Freedman M, Mazieres D (2004) On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of IEEE symposium on security and privacy, May 9–12, Claremont Resort in Oakland, California, USA, pp 226–240

    Google Scholar 

  11. Gkantsidis C, Rodriguez PR (2006) Cooperative security for network coding file distribution. In: Proceedings of INFOCOM 2006 the 25th IEEE international conference on computer communications, Barcelona, Spain, 23–29, April, pp 1–13

    Google Scholar 

Download references

Acknowledgments

This work is funded by National Science Foundation of China (61071152, 60702043), 973 Program (2010CB731403, 2010CB731406) of China and National “Twelfth Five-Year” Plan for Science & Technology Support (2012BAH38 B04).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong Du .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this paper

Cite this paper

Du, R., Zhao, C., Zhao, F., Li, S. (2012). A Strategy of Network Coding Against Nodes Conspiracy Attack. In: Liang, Q., et al. Communications, Signal Processing, and Systems. Lecture Notes in Electrical Engineering, vol 202. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5803-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5803-6_25

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5802-9

  • Online ISBN: 978-1-4614-5803-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics