{"title":"在多路径无线网络中,在窃听者存在的情况下,使用猛禽代码的保密性和可靠性","authors":"Anna Kacewicz, S. Wicker","doi":"10.1109/WCSP.2009.5371549","DOIUrl":null,"url":null,"abstract":"We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network\",\"authors\":\"Anna Kacewicz, S. Wicker\",\"doi\":\"10.1109/WCSP.2009.5371549\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.\",\"PeriodicalId\":244652,\"journal\":{\"name\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSP.2009.5371549\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Wireless Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP.2009.5371549","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network
We consider a multiple path wireless network and address the problem of coding and routing a message in a manner that guarantees both robustness and security. Each path in the network is assumed to be a wiretap channel that includes both a main channel and a wiretap monitored by an eavesdropper. We then show that Raptor codes can be used to achieve both perfect secrecy and zero error probability. This work is an extension of recent work by Thangaraj, Dihidar, Calderbank, McLaughlin, and Merolla in which they show the efficacy of using LDPC codes for similar purposes over a wiretap channel. We show how to simultaneously construct the parameters of the code and robustly route the codeword while minimizing information flow to the adversary.