Stefan Pfennig, Elke Franz, J. Richter, Christian Scheunert, Eduard Axel Jorswieck
{"title":"机密网络编码:物理层与网络层","authors":"Stefan Pfennig, Elke Franz, J. Richter, Christian Scheunert, Eduard Axel Jorswieck","doi":"10.1109/ICUWB.2015.7324428","DOIUrl":null,"url":null,"abstract":"In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure their confidentiality. However, incorporating novel technologies like network coding allows for more efficient solutions. Within this article, we compare different solutions for confidential communication by means of network coding at physical layer and at network layer. We discuss security, efficiency, and computational complexity of these approaches. The results allow to draw conclusions about the choice of a suited communication scheme depending on the system model and the relevant parameters.","PeriodicalId":339208,"journal":{"name":"2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Confidential Network Coding: Physical Layer vs. Network Layer\",\"authors\":\"Stefan Pfennig, Elke Franz, J. Richter, Christian Scheunert, Eduard Axel Jorswieck\",\"doi\":\"10.1109/ICUWB.2015.7324428\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure their confidentiality. However, incorporating novel technologies like network coding allows for more efficient solutions. Within this article, we compare different solutions for confidential communication by means of network coding at physical layer and at network layer. We discuss security, efficiency, and computational complexity of these approaches. The results allow to draw conclusions about the choice of a suited communication scheme depending on the system model and the relevant parameters.\",\"PeriodicalId\":339208,\"journal\":{\"name\":\"2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUWB.2015.7324428\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUWB.2015.7324428","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Confidential Network Coding: Physical Layer vs. Network Layer
In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure their confidentiality. However, incorporating novel technologies like network coding allows for more efficient solutions. Within this article, we compare different solutions for confidential communication by means of network coding at physical layer and at network layer. We discuss security, efficiency, and computational complexity of these approaches. The results allow to draw conclusions about the choice of a suited communication scheme depending on the system model and the relevant parameters.