Efficient Weakly Secure Network Coding Scheme Against Node Conspiracy Attack Based on Network Segmentation

Rong Du,Chenglin Zhao,Shenghong Li,Jian Li
DOI: https://doi.org/10.1186/1687-1499-2014-5
2014-01-01
EURASIP Journal on Wireless Communications and Networking
Abstract:Since network information flow can achieve the max-flow in theory and the network throughput is increased by using network coding. At the same time, the security of network coding is of importance as the research of network coding increase. Different from previous wiretapping scenarios where the threat is posed by external wiretappers. We discuss the security in an internal angle: all intermediate nodes comply with the communication protocols which are potential wiretappers and the wiretappers can cooperate with each other to decode the packets sent from the source node. Most existing research on network coding designs with a given topology, we will consider the secure network topology design. In this paper, our purpose is to find the secure transmission topology that is suitable for network coding in transmission system. Based on the secure topology, we use network coding scheme which is weakly secure. Mathematical analysis and computer simulations show that the proposed protocol can prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.
What problem does this paper attempt to address?