Abstract
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mixing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The proposed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques.
Similar content being viewed by others
References
Ahlswede R, Cai N, Li S-Y R, et al. Network information flow [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204–1216.
Li S Y R, Yeung R W, Cai N. Linear network coding [J]. IEEE Transactions on Information Theory, 2003, 49(2): 371–381.
Matsuda T, Noguchi T, Takine T. Survey of network coding and its applications [J]. IEICE Transactions on Communications, 2011, E94-B(3): 698–717.
Medard M, Sprintson A. Network Coding: Fundamentals and Applications [M]. Norwell: Kluwer Academic Press, 2011.
Ho T, Leong B, Koetter R, et al. Byzantine modiffication detection in multicast networks using randomized network coding [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798–2803.
Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: Signature schemes for network coding [C]//Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography. Irvine: Springer-Verlag, 2009: 68–87.
Cai N, Yeung R W. Secure network coding [C]//Proceedings of International Symposium in Information Theory. Lausanne: IEEE Press, 2002: 323.
Cai N, Chan T. Theory of secure network coding [J]. Proceedings of the IEEE. Washington D C: IEEE Press, 2011: 421–437.
Bhattad K, Narayanan K R. Weakly secure network coding [C]//Proceedings of first Workshop on Network Codingm Theory, and Applications (NetCod05). Riva del Garda: IEEE Press, 2005.
Silva D, Kschischang F R. Universal secure network coding via rank-metric codes [J]. IEEE Transactions on Information Theory, 2011, 57: 1124–1135.
Adeli M, Liu H. Secure network coding with minimum overhead based on Hash functions [J]. IEEE Communications Letters, 2009, 13(12): 956–958.
Wei Y W, Zhen Y, Guan Y. Efficient weakly-secure network coding schemes against wiretapping attacks [C]//Proceedings of the IEEE International Symposium on Network Coding (NetCod 2010). Toronto: IEEE Press, 2010: 1–6.
Vilela J P, Lima L, Barros J. Lightweight security for network coding [C]//Proceedings of IEEE International Conference on Communications (ICC2008). Beijing: IEEE Press, 2008: 1750–1754.
Guo Q, Luo M X, Li L X, et al. Secure network coding against wiretapping and Byzantine attacks [J]. EURASIP Journal on Wireless Communications and Networking, 2010: 216524.
Rivest R L. All-or-nothing encryption and the package transform [C]//Proceedings of the Fast Software Encryption (FSE’97), LNCS. Israel: Springer-Verlag, 1997, 1267: 210–218.
Lima L, Barros J, Medard M, et al. Towards secure multiresolution network coding [C]//Proceedings of ITW 2009. Volos: IEEE Press, 2009: 125–129.
Liu G J, Zhou H. Efficient schemes for securing network coding against wiretapping [J]. Wuhan University Journal of Natural Sciences, 2013, 18(4): 355–362.
Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 1996.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation: Supported by the National Natural Science Foundation of China (11371290, 61301178) and the Science and Technology Innovation Foundation of Xi’an ( CXY1352WL28, CXY1352WL27)
Biography: LIU Guangjun, male, Ph.D., research direction: cryptography and information security, information and coding theory.
Rights and permissions
About this article
Cite this article
Liu, G., Liu, X., Xiong, J. et al. A lightweight secure network coding scheme against wiretapping. Wuhan Univ. J. Nat. Sci. 19, 156–160 (2014). https://doi.org/10.1007/s11859-014-0994-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-014-0994-4