Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes

12/25/2017
by   Ning Cai, et al.
0

We analyze the security for network code when the eavesdropper can contaminate the information on the attacked edges (active attack) and can choose the attacked edges adaptively (adaptive attack). We show that active and adaptive attacks cannot improve the performance of the eavesdropper when the code is linear. Further, we give an non-linear example, in which an adaptive attack improves the performance of the eavesdropper. We derive the capacity for the unicast case and the capacity region for the multicast case or the multiple multicast case in several examples of relay networks, beyond the minimum cut theorem, when no additional random number is allowed as scramble variables in the intermediate nodes.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset