Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published January 2013 | public
Journal Article

On Secure Network Coding With Nonuniform or Restricted Wiretap Sets

Abstract

The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximum rate of communication such that observing links in any permissible wiretap set reveal no information about the message. This paper considers secure network coding with nonuniform or restricted wiretap sets, for example, networks with unequal link capacities where a wiretapper can wiretap any subset of k links, or networks where only a subset of links can be wiretapped. Existing results show that for the case of uniform wiretap sets (networks with equal capacity links/packets where any k can be wiretapped), the secrecy capacity is given by a cut-set bound if random keys are injected at the source (and decoded at the sink), whether or not the communicating users have information about the choice of wiretap set. In contrast, we show that for the nonuniform case, this secrecy rate is achievable for the case of known but not unknown wiretap set. We give achievable linear optimization-based strategies where random keys are canceled at intermediate nonsink nodes or injected at intermediate nonsource nodes. Finally, we show that determining the secrecy capacity is an NP-hard problem.

Additional Information

© 2012 IEEE. Manuscript received October 29, 2009; revised September 06, 2011; accepted April 28, 2012. Date of publication August 31, 2012; date of current version December 19, 2012. This work was supported in part by subcontract #069144 issued by BAE Systems National Security Solutions, Inc.; in part by the Defense Advanced Research Projects Agency and the Space and Naval Warfare System Center, San Diego, CA, under Contracts N66001-08-C-2013 and W911NF-07-1-0029; in part by the National Science Foundation under Grants CNS 0905615, CCF 0830666, and CCF 1017632; and in part by Caltech's Lee Center for Advanced Networking. The material in this paper was presented in part at the 2010 Information Theory and Applications Workshop, La Jolla, CA, and in part at the 2010 IEEE Information Theory Workshop, Dublin, Ireland.

Additional details

Created:
August 19, 2023
Modified:
October 23, 2023