A Numerical Study on the Wiretap Network With a Simple Network Topology
From MaRDI portal
Publication:2976834
DOI10.1109/TIT.2016.2539280zbMATH Open1359.94946arXiv1505.02862MaRDI QIDQ2976834FDOQ2976834
Publication date: 28 April 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: In this paper, we study a security problem on a simple wiretap network, consisting of a source node S, a destination node D, and an intermediate node R. The intermediate node connects the source and the destination nodes via a set of noiseless parallel channels, with sizes and , respectively. A message is to be sent from S to D. The information in the network may be eavesdropped by a set of wiretappers. The wiretappers cannot communicate with one another. Each wiretapper can access a subset of channels, called a wiretap set. All the chosen wiretap sets form a wiretap pattern. A random key is generated at S and a coding scheme on is employed to protect . We define two decoding classes at D: In Class-I, only is required to be recovered and in Class-II, both and are required to be recovered. The objective is to minimize {for a given wiretap pattern} under the perfect secrecy constraint. The first question we address is whether routing is optimal on this simple network. By enumerating all the wiretap patterns on the Class-I/II networks and harnessing the power of Shannon-type inequalities, we find that gaps exist between the bounds implied by routing and the bounds implied by Shannon-type inequalities for a small fraction~() of all the wiretap patterns. The second question we investigate is the following: What is for the remaining wiretap patterns where gaps exist? We study some simple wiretap patterns and find that their Shannon bounds (i.e., the lower bound induced by Shannon-type inequalities) can be achieved by linear codes, which means routing is not sufficient even for the (, ) network. For some complicated wiretap patterns, we study the structures of linear coding schemes under the assumption that they can achieve the corresponding Shannon bounds....
Full work available at URL: https://arxiv.org/abs/1505.02862
This page was built for publication: A Numerical Study on the Wiretap Network With a Simple Network Topology
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2976834)