Skip to main content
Log in

A lightweight secure network coding scheme against wiretapping

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mixing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The proposed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ahlswede R, Cai N, Li S-Y R, et al. Network information flow [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204–1216.

    Article  Google Scholar 

  2. Li S Y R, Yeung R W, Cai N. Linear network coding [J]. IEEE Transactions on Information Theory, 2003, 49(2): 371–381.

    Article  Google Scholar 

  3. Matsuda T, Noguchi T, Takine T. Survey of network coding and its applications [J]. IEICE Transactions on Communications, 2011, E94-B(3): 698–717.

    Article  Google Scholar 

  4. Medard M, Sprintson A. Network Coding: Fundamentals and Applications [M]. Norwell: Kluwer Academic Press, 2011.

    Google Scholar 

  5. Ho T, Leong B, Koetter R, et al. Byzantine modiffication detection in multicast networks using randomized network coding [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798–2803.

    Article  Google Scholar 

  6. Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: Signature schemes for network coding [C]//Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography. Irvine: Springer-Verlag, 2009: 68–87.

    Google Scholar 

  7. Cai N, Yeung R W. Secure network coding [C]//Proceedings of International Symposium in Information Theory. Lausanne: IEEE Press, 2002: 323.

    Google Scholar 

  8. Cai N, Chan T. Theory of secure network coding [J]. Proceedings of the IEEE. Washington D C: IEEE Press, 2011: 421–437.

    Google Scholar 

  9. Bhattad K, Narayanan K R. Weakly secure network coding [C]//Proceedings of first Workshop on Network Codingm Theory, and Applications (NetCod05). Riva del Garda: IEEE Press, 2005.

    Google Scholar 

  10. Silva D, Kschischang F R. Universal secure network coding via rank-metric codes [J]. IEEE Transactions on Information Theory, 2011, 57: 1124–1135.

    Article  Google Scholar 

  11. Adeli M, Liu H. Secure network coding with minimum overhead based on Hash functions [J]. IEEE Communications Letters, 2009, 13(12): 956–958.

    Article  Google Scholar 

  12. Wei Y W, Zhen Y, Guan Y. Efficient weakly-secure network coding schemes against wiretapping attacks [C]//Proceedings of the IEEE International Symposium on Network Coding (NetCod 2010). Toronto: IEEE Press, 2010: 1–6.

    Chapter  Google Scholar 

  13. Vilela J P, Lima L, Barros J. Lightweight security for network coding [C]//Proceedings of IEEE International Conference on Communications (ICC2008). Beijing: IEEE Press, 2008: 1750–1754.

    Google Scholar 

  14. Guo Q, Luo M X, Li L X, et al. Secure network coding against wiretapping and Byzantine attacks [J]. EURASIP Journal on Wireless Communications and Networking, 2010: 216524.

    Google Scholar 

  15. Rivest R L. All-or-nothing encryption and the package transform [C]//Proceedings of the Fast Software Encryption (FSE’97), LNCS. Israel: Springer-Verlag, 1997, 1267: 210–218.

    Google Scholar 

  16. Lima L, Barros J, Medard M, et al. Towards secure multiresolution network coding [C]//Proceedings of ITW 2009. Volos: IEEE Press, 2009: 125–129.

    Google Scholar 

  17. Liu G J, Zhou H. Efficient schemes for securing network coding against wiretapping [J]. Wuhan University Journal of Natural Sciences, 2013, 18(4): 355–362.

    Article  Google Scholar 

  18. Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 1996.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangjun Liu.

Additional information

Foundation: Supported by the National Natural Science Foundation of China (11371290, 61301178) and the Science and Technology Innovation Foundation of Xi’an ( CXY1352WL28, CXY1352WL27)

Biography: LIU Guangjun, male, Ph.D., research direction: cryptography and information security, information and coding theory.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, G., Liu, X., Xiong, J. et al. A lightweight secure network coding scheme against wiretapping. Wuhan Univ. J. Nat. Sci. 19, 156–160 (2014). https://doi.org/10.1007/s11859-014-0994-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-0994-4

Key words

CLC number

Navigation