在多路径无线网络中,在窃听者存在的情况下,使用猛禽代码的保密性和可靠性

Anna Kacewicz, S. Wicker
{"title":"在多路径无线网络中,在窃听者存在的情况下,使用猛禽代码的保密性和可靠性","authors":"Anna Kacewicz, S. Wicker","doi":"10.1109/WCSP.2009.5371549","DOIUrl":null,"url":null,"abstract":"We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network\",\"authors\":\"Anna Kacewicz, S. Wicker\",\"doi\":\"10.1109/WCSP.2009.5371549\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.\",\"PeriodicalId\":244652,\"journal\":{\"name\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSP.2009.5371549\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Wireless Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP.2009.5371549","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

我们考虑了一个多路径无线网络,并以保证鲁棒性和安全性的方式解决了编码和路由消息的问题。假设网络中的每条路径都是一个窃听通道,其中包括一个主通道和一个窃听者监控的窃听通道。然后,我们证明了Raptor代码可以实现完全保密和零错误概率。这项工作是对Thangaraj、Dihidar、Calderbank、McLaughlin和Merolla最近工作的延伸,他们在研究中展示了在窃听信道上使用LDPC码用于类似目的的有效性。我们展示了如何同时构建代码的参数并鲁棒地路由码字,同时最大限度地减少对对手的信息流。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network
We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
U-filter's gaussianization function for interference background Performance analysis on Call Admission Control in C3G-A system Performance analysis of fixed gain relaying systems in Nakagami-m fading channels A greedy algorithm for cognitive network resource allocation based on minimum remaining constraint space A new optimum jitter protection for conversational VoIP
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1