Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.

Slides:



Advertisements
Similar presentations
Information theory Multi-user information theory A.J. Han Vinck Essen, 2004.
Advertisements

Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
Cryptography for Unconditionally Secure Message Transmission in Networks Kaoru Kurosawa.
On error and erasure correction coding for networks and deadlines Tracey Ho Caltech NTU, November 2011.
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Enhancing Secrecy With Channel Knowledge
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Achilleas Anastasopoulos (joint work with Lihua Weng and Sandeep Pradhan) April A Framework for Heterogeneous Quality-of-Service Guarantees in.
Cellular Communications
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
6/20/2015List Decoding Of RS Codes 1 Barak Pinhas ECC Seminar Tel-Aviv University.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Rate-distortion Theory for Secrecy Systems
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Automatic Rate Adaptation Aditya Gudipati & Sachin Katti Stanford University 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
Miss Insah Bhurtah Main Supervisor: Prof. K.M.S. Soyjaudah Associate Supervisor: Dr C Catherine.
Design of a High-Throughput Low-Power IS95 Viterbi Decoder Xun Liu Marios C. Papaefthymiou Advanced Computer Architecture Laboratory Electrical Engineering.
DIGITAL COMMUNICATIONS Linear Block Codes
Cryptography and Authentication A.J. Han Vinck Essen, 2008
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
CHAPTER 5 SIGNAL SPACE ANALYSIS
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
20/10/ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu Institute of Network Coding Please.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
Error Detecting and Error Correcting Codes
Diana B. Llacza Sosaya Digital Communications Chosun University
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
Information Theoretical Security
Secure Nested Codes for Type II Wiretap Channels
Network Coding and its Applications in Communication Networks
The Capacity of Wireless Networks
Information-Theoretic Security
Unequal Error Protection for Video Transmission over Wireless Channels
Presentation transcript:

Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University of Hong Kong Joint work with Chi-kin Ngai, Kenneth Shum, and Shenghao Yang

Outline Network error-correcting codes Secure network codes Secure error-correcting (SEC) network codes Concluding Remarks

Network Error-Correcting Codes

Point-to-Point Error Correction in a Network Classical error-correcting codes are devised for point-to- point communications. Such codes are applied to networks on a link-by-link basis.

ChannelDecoderChannelDecoder NetworkEncoder ChannelEncoder

A Motivation for Network Error Correction Observation Only the receiving nodes have to know the message transmitted; the immediate nodes don’t. In general, channel coding and network coding do not need to be separated  Network Error Correction Network error correction generalizes classical point-to-point error correction.

NetworkCodec

Singleton Bound for Network Error Correction (Cai and Y 02, 06) A d-error-correcting network code can correct any d errors in the networks at all the sink nodes. m = min T maxflow(T) r = rate of a network error-correcting code Singleton bound: r ≤ m – 2d The tightness of the Network Singleton bound is achievable by linear network error-correcting codes! This implies that for large base fields, only linear transformations need to be performed at the intermediate nodes! No decoding needed.

Sphere Packing    d min

Malicious Injection of Errors Malicious nodes in the network may inject errors deliberately to disturb data transmission. Classical error correction does not help because redundancy is injected only in time. Linear network error-correcting code is a natural solution because redundancy is injected in both time and space.

Secure Network Codes (Cai and Y, 2002, 2008)

Problem Formulation A message is multicast on a network. Some sets of channels can be wiretapped. A wiretap set is a subset of the edge set E. Let A be the collection of all possible wiretap sets. Each wiretapper chooses to access one wiretap set in A. No wiretapper may access more than one wiretap set. The network code needs to be information-theoretically secure. The model is a network generalization of secret sharing (Blakley, Shamir, 78) and wiretap channel II (Ozarow and Wyner 84).

A Example of a Secure Network Code

s-ws+w s-w s+w w ww  Any single channel can be wiretapped  s is the secure message  w is the randomness

A Construction of Secure Network Codes The wiretapper may access any k channels. m = min T maxflow(T) Our construction builds on any linear network code that can multicast m symbols. s: message; w: key Let |s| = m - k and |w| = k. Our scheme – Maximizes the amount of information that can be multicast securely. – Uses the minimum possible amount of randomness.

NETWORK linear network code, rate = m Q -1 rate = m - k s s w w m-kk

Secure Error-Correcting (SEC) Network Codes

A Construction of SEC Network Codes The code can correct any d errors. The wiretapper may access any k channels. m = min T maxflow(T) Our construction concatenates – a secure network code (SNC) – a network error-correcting code (NEC) Rate = m - 2d - k

NETWORK NEC s s w w m-2d-kk SEC m m-2d m-2d-k

Proof of Error Correction and Security Error correction of the SEC code inherits from the NEC inner code. Proof of security when there is no error – algebraic Proof of security in the presence of errors – need to set up a model for noise and eavesdropper random errors and key are statistically independent eavesdropper can inject errors causally – information theoretic

+ eavesdropper random error injection error

Parallel noiseless transmission Parallel noiseless transmission Network coding Network coding Secret sharing Secret sharing Point-to-point error correction Point-to-point error correction Network error correction Network error correction Secure network coding Secure network coding SEC coding