A strategy of network coding against nodes conspiracy attack

作者:Du, Rong*; Zhao, Chenglin; Zhao, Feng; Li, Shenghong
来源:2012 International Conference on Communications, Signal Processing, and Systems, CSPS 2012, China,Beijing, 2012-10-16 to 2012-10-18.
DOI:10.1007/978-1-4614-5803-6_25

摘要

In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. In this chapter, we investigate the advantages of applying network Coding in sensor networks for security purpose. In particular, the problem of constructing a secure unicast system is considered. Unlike previous wiretapping scenarios, where the threat is posed by external wiretappers. we approach the security from an internal angle: all nodes comply with the communication protocols yet are potential eavesdroppers and the eavesdroppers can cooperate with each other to decode the packets sent from the source node. Different from most existing research on network coding that designs the network coding scheme based on a given topology, we will consider the network topology design. We first try to find the transmission topology that is suitable for network coding in unicast system. Based on the topology, we use linear network coding scheme which is weakly secure. We conduct simulations to show that it prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.

全文