Network codes resilient to jamming and eavesdropping

Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael Langberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-time, rate-optimal distributed network codes for this scenario, improving on the rates achievable in [1]. Our main contribution shows that as long as the sum of the adversary's jamming rate ZO and his eavesdropping rate ZI is less than the network capacity C, (i.e., ZO + ZI < C), our codes can communicate (with vanishingly small error probability) a single bit correctly and without leaking any information to the adversary. We then use this to design codes that allow communication at the optimal source rate of C -ZO -ZI, while keeping the communicated message secret from the adversary. Interior nodes are oblivious to the presence of adversaries and perform random linear network coding; only the source and destination need to be tweaked. In proving our results we correct an error in prior work [2] by a subset of the authors in this work.

Original languageEnglish
Title of host publication2010 IEEE International Symposium on Network Coding, NetCod 2010
Pages31-36
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE International Symposium on Network Coding, NetCod 2010 - Toronto, ON, Canada
Duration: 9 Jun 201011 Jun 2010

Publication series

Name2010 IEEE International Symposium on Network Coding, NetCod 2010

Conference

Conference2010 IEEE International Symposium on Network Coding, NetCod 2010
Country/TerritoryCanada
CityToronto, ON
Period9/06/1011/06/10

Fingerprint

Dive into the research topics of 'Network codes resilient to jamming and eavesdropping'. Together they form a unique fingerprint.

Cite this