ZHOU Yejun, LI Hui, MA Jianfeng, “Secure Network Coding Against the Contamination and Eavesdropping Adversaries,” Chinese Journal of Electronics, vol. 18, no. 3, pp. 411-416, 2009,
Citation: ZHOU Yejun, LI Hui, MA Jianfeng, “Secure Network Coding Against the Contamination and Eavesdropping Adversaries,” Chinese Journal of Electronics, vol. 18, no. 3, pp. 411-416, 2009,

Secure Network Coding Against the Contamination and Eavesdropping Adversaries

  • Received Date: 2008-08-01
  • Rev Recd Date: 2008-11-01
  • Publish Date: 2009-08-25
  • An algorithm that targets contamination andeavesdropping adversaries is presented. By means of our algorithm,every node can verify the integrity of the received packets easily andan eavesdropper is unable to get any "meaningful information" about thesource. We call it "practical security" if an eavesdropper is unable toget any meaningful information about the source. We show that, bygiving up a small amount of overall capacity, our algorithm achievesthe practically secure condition at a probability of one. Furthermore,the communication overhead of our algorithm is negligible compared withprevious works, since the transmission of the hash values and the codecoefficients are both avoided.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (673) PDF downloads(1559) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return