Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.

Slides:



Advertisements
Similar presentations
Packing Multicast Trees Philip A. Chou Sudipta Sengupta Minghua Chen Jin Li Kobayashi Workshop on Modeling and Analysis of Computer and Communication Systems,
Advertisements

On error and erasure correction coding for networks and deadlines Tracey Ho Caltech NTU, November 2011.
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
Enhancing Secrecy With Channel Knowledge
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
Deterministic Network Coding by Matrix Completion Nick Harvey David Karger Kazuo Murota.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
Energy-Efficient Broadcasting in Ad-Hoc Networks: Combining MSTs with Shortest-Path Trees Carmine Ventre Joint work with Paolo Penna Università di Salerno.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Variable-Length Codes: Huffman Codes
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
Analysis of Iterative Decoding
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Multiple Input Multiple Output
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
DIGITAL COMMUNICATIONS Linear Block Codes
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Information Theory Linear Block Codes Jalal Al Roumy.
Network Information Flow Nikhil Bhargava (2004MCS2650) Under the guidance of Prof. S.N Maheshwari (Dept. of Computer Science and Engineering) IIT, Delhi.
Basic Concepts of Information Theory Entropy for Two-dimensional Discrete Finite Probability Schemes. Conditional Entropy. Communication Network. Noise.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
20/10/ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu Institute of Network Coding Please.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.
Multicast with Network Coding in Application-Layer Overlay Networks Y. Zhu, B. Li, and J. Guo University of Toronto Present by Cheng Huang
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Double Regenerating Codes for Hierarchical Data Centers
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
EECS 290S: Network Information Flow
Information Theoretical Security
Xiaoyang Zhang1, Yuchong Hu1, Patrick P. C. Lee2, Pan Zhou1
Network Coding Rates and Edge-Cut Bounds
Design Principles of Scalable Switching Networks
Presentation transcript:

Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University

Outline Introduction to Network Coding The Max-flow Bound Secure Network Coding Concluding Remarks

Introduction to Network Coding

A Network Coding Example The Butterfly Network

b1b1 b2b2 b1b1 b1b1 b1b1 b2b2 b2b2 b2b2 b2b2 b1b1 b1b1 b2b2 b1b1 b1b1 b2b2 b2b2 b 1 +b 2

A Network Coding Example with Two Sources

b1b1 b2b2 b1b1 b2b2 b1b1 b2b2 b2b2 b1b1 b1b1 b2b2 b2b2 b1b1 b 1 +b 2

Wireless/Satellite Application b1b1 b2b2 t = 1 b1b1 t = 2 t = 3 b 1 +b 2 b2b2 50% saving for downlink bandwidth!

Two Themes of Network Coding When there is 1 source to be multicast in a network, store-and-forward may fail to optimize bandwidth. When there are 2 or more independent sources to be transmitted in a network (even for unicast), store-and-forward may fail to optimize bandwidth. In short, Information is NOT a commodity!

Model of a Point-to-Point Network A network is represented by a directed graph G = (V,E) with node set V and edge (channel) set E. A symbol from an alphabet F can be transmitted on each channel. There can be multiple edges between a pair of nodes.

Single-Source Network Coding The source node S generates an information vector x = (x 1 x 2 … x k )  F k. What is the condition for a node T to be able to receive the information vector x? Max-Flow Bound. If maxflow(T) < k, then T cannot possibly receive x.

The Basic Results If network coding is allowed, a node T can receive the information vector x iff maxflow(T) ≥k i.e., the max-flow bound can be achieved simultaneously by all such nodes T. (ACLY00) Moreover, this can be achieved by linear network coding for a sufficiently large base field. (LYC03, KM03)

Secure Network Coding Cai and Y, 2002 (discussed with Ueli Maurer, ISIT 2000)

Problem Formulation The underlying model is the same as network multicast using network coding except that some sets of channels can be wiretapped. Let A be a collection of subsets of the edge set E. A subset in A is called a wiretap set. Each wiretap set may be fully accessed by a wiretapper. No wiretapper can access more than one wiretap set. The network code needs to be designed in a way such that no matter which wiretap set the wiretapper has access to, the multicast message is information- theoretically secure.

Our Coding Scheme The multicast message is (s,w), where s is the secure message w is the randomness Both s and w are generated at the source node.

A Example of a Secure Network Code

s-ws+w s-w s+w w ww  One of the 3 red channels can be wiretapped  s is the secure message  w is the randomness

Another Example of Secure Network Coding The (1,2)-threshold Secret Sharing Scheme

w s+w s-w  One of the 3 red channels can be wiretapped  s is the secure message  w is the randomness

Construction of Secure Network Codes Let n = min T maxflow(T). We have obtained a sufficient condition under which a secure linear network code can be constructed. In particular, if A consists of all the r-subsets of E, where r < n, then we can construct a secure network code with multicast message (s,w) such that |s|=n-r and |w|=r. For this case, the condition is also necessary. Interpretation: For a sink node T, if r channels in the network are wiretapped, the number of “secure paths” from the source node to T is still at least n-r. So n-r symbols can go through securely.

Global Encoding Kernels of a Linear Network Code Recall that x = (x 1 x 2 … x k ) is the multicast message. For each channel e, assign a column vector f e such that the symbol sent on channel e is x f e. The vector f e is called the global encoding kernel of channel e. The global encoding kernel of a channel is analogous to a column in the generator matrix of a classical block code. The global encoding kernel of an output channel at a node must be a linear combination of the global encoding kernels of the input channels.

An Example k = 2, let x = (b 1, b 2 )

b1b1 b2b2 b1b1 b1b1 b2b2 b2b2 b 1 +b 2

Idea of Code Construction Start with a linear network code for multicasting n symbols. For all wiretap set A  A, let f A = { f e : e  A }, the set of global encoding kernels of the channels in A. Let dim(span(f A ))  r for all A  A. [sufficient condition] When the base field F is sufficiently large, we can find b 1, b 2, …, b n-r  F n such that b 1, b 2, …, b n-r are linearly independent of f A for all A  A.

Let the multicast message be (s,w), with |s| = n-r and |w| = r. Take a suitable linear transformation of the given linear network code to obtain the desired secure network code.

Recent Work (Cai and Y, ISIT 2007) We obtained a necessary and sufficient condition for the security of linear network codes. This condition applies in the cases when There are more than one information source nodes in the network. The random keys are not uniformly distributed. This condition also shows that the security of a linear network code does not depend on the source distribution.

Resources Network Coding Homepage R. W. Yeung, S.-Y. R. Li, N. Cai and Z. Zhang, Network Coding Theory, now Publishers, 2005 (Foundation and Trends in Communications and Information Theory). N. Cai and R. W. Yeung, “Secure network coding,” preprint.

Concluding Remarks Secure network coding is a generalization of both (regular) network coding and secret sharing. The subject is still in its infancy, and a lot of basic questions are yet to be answered.