On Secure Network Coding for Multiple Unicast Traffic

01/09/2019
by   Gaurav Kumar Agarwal, et al.
0

This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main focus of this paper is on characterizing the secure capacity region, when the adversary has unbounded computational capabilities, but limited network presence. First, an outer bound on the secure capacity region is derived for arbitrary network topologies and general number of destinations. Then, secure transmission schemes are designed and analyzed in terms of achieved rate performance. In particular, for the case of two destinations, it is shown that the designed scheme matches the outer bound, hence characterizing the secure capacity region. It is also numerically verified that the designed scheme matches the outer bound for a special class of networks with general number of destinations, referred to as combination network. Finally, for an arbitrary network topology with general number of destinations, a two-phase polynomial time in the network size scheme is designed and its rate performance is compared with the capacity-achieving scheme for networks with two destinations.

READ FULL TEXT
research
09/10/2018

On the Capacity Region for Secure Index Coding

We study the index coding problem in the presence of an eavesdropper, wh...
research
10/18/2019

Secure Coded Caching with Colluding Users

In a secure coded caching system, a central server balances the traffic ...
research
01/10/2019

On Secure Capacity of Multiple Unicast Traffic over Two-Layer Networks

This paper studies the problem of secure communication over two-layer ne...
research
07/04/2023

On the Capacity of Private Nonlinear Computation for Replicated Databases

We consider the problem of private computation (PC) in a distributed sto...
research
01/09/2018

Secure Communication over 1-2-1 Networks

In a companion paper available in [1], the authors examined the capacity...
research
01/27/2018

Capacity Theorems for Distributed Index Coding

In index coding, a server broadcasts multiple messages to their respecti...
research
03/05/2019

DoF Region of the MISO BC with Partial CSIT: Proof by Inductive Fourier-Motzkin Elimination

We provide a fresh perspective on the problem of characterizing the DoF ...

Please sign up or login with your details

Forgot password? Click here to reset