Secure network code over one-hop relay network

03/27/2020
by   Masahito Hayashi, et al.
0

When there exists a malicious attacker in the network, we need to consider the possibilities of eavesdropping and the contamination simultaneously. Under an acyclic broadcast network, the optimality of linear codes was shown when Eve is allowed to attack any r edges. The optimality of linear codes is not shown under a different assumption for Eve. As a typical example of an acyclic unicast network, we focus on the one-hop relay network under the single transmission scheme by assuming that Eve attacks only one edge in each level. Surprisingly, as a result, we find that a non-linear code significantly improves the performance on the one-hop relay network over linear codes. That is, a non-liner code realizes the imperfect security on this model that cannot be realized by linear codes. This kind of superiority of a linear code still holds even with considering the effect of sequential error injection on information leakage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/25/2017

Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes

We analyze the security for network code when the eavesdropper can conta...
research
03/26/2020

Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

We discuss the effect of sequential error injection on information leaka...
research
04/28/2018

Secure Computation-and-Forward with Linear Codes

We discuss secure transmission via an untrusted relay when we have a mul...
research
03/27/2020

Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

When there exists a malicious attacker in the network, we need to be car...
research
05/12/2021

Two-Hop Network with Multiple Decision Centers under Expected-Rate Constraints

The paper studies distributed binary hypothesis testing over a two-hop r...
research
06/25/2023

Network Optimization – Using Relays as Neurons

We consider the optimization of a network with amplify-and-forward relay...

Please sign up or login with your details

Forgot password? Click here to reset