Skip to main navigation Skip to search Skip to main content

Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

5 Scopus citations

Abstract

This chapter addresses the task of multicast communication using network coding in the presence of passive eavesdroppers and active jammers. Network coding allows network routers to mix the information content in incoming packets before forwarding them. This mixing has been theoretically proven to be very beneficial in improving both throughput and robustness. Since network coding allows routers to mix packets' content, a single corrupted packet can end up corrupting all the information reaching a destination. Unless this problem is solved, network coding may perform much worse than pure forwarding in the presence of such malicious adversaries. It is shown that high-rate private and reliable communication via schemes, that are both computationally efficient and distributed, is possible in the settings under study. This chapter summarizes almost a decade of study in the very dynamic and intriguing field of private and reliable network communication. The algorithmic techniques presented cover several paradigms and include tools from the study of combinatorics, linear algebra, cryptography, and coding theory.

Original languageEnglish
Title of host publicationNetwork Coding
Subtitle of host publicationFundamentals and Applications
PublisherElsevier
Pages183-215
Number of pages33
ISBN (Electronic)9780123809186
ISBN (Print)9780123809186
DOIs
StatePublished - Jan 1 2011

Keywords

  • Network coding
  • capacity
  • cryptography
  • distributed protocols
  • error correction
  • network communication
  • wiretap channel

Fingerprint

Dive into the research topics of 'Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications'. Together they form a unique fingerprint.

Cite this