This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the methods of linear algebra and combinatorics, an analytic solution of the probability was obtained. Performance of subspace code was compared to several secure network coding schemes from the perspective of security, flexibility, complexity, and independence, etc. The comparison showed subspace code did not have perfect security, but it achieved probabilistic security with low complexity. As a result, subspace code was suitable to the applications with limited computation and moderate security requirement.
References
[1]
Li, S.Y.R., Yeung, R.W. and Cai, N. (2003) Linear Network Coding. IEEE Transactions on Information Theory, 49, 371-381. https://doi.org/10.1109/TIT.2002.807285
[2]
Cai, N. and Yeung, R.W. (2002) Secure Network Coding. 2002 IEEE International Symposium on Information Theory (ISIT’02), Lausanne, 30 June-5 July 2002, 323.
https://doi.org/10.1109/ISIT.2002.1023595
[3]
Feldman, J., Malkin, T., Stein, C. and Servedio, R.A. (2004) On the Capacity of Secure Network Coding. Proceeding of the 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, VA, 29 Sep-1 Oct 2004, 1-10.
[4]
Bhattad, K. and Narayanan, K.R. (2005) Weakly Secure Network Coding. Proceeding of the First Workshop on Network Coding (NetCod’05), Riva del Garda, April 2005, 281-285.
[5]
Adeli, M. and Liu, H. (2013) On the Inherent Security of Linear Network Coding. IEEE Communications Letters, 17, 1668-1671.
https://doi.org/10.1109/LCOMM.2013.062113.130478
[6]
Vilela, J.P., Lima, L. and Barros, J. (2008) Lightweight Security for Network Coding. 2008 IEEE International Conference on Communications, Beijing, 19-23 May 2008, 1750-1754. https://doi.org/10.1109/ICC.2008.336
[7]
Adeli, M. and Liu, H. (2009) Secure Network Coding with Minimum Overhead Based on Hash Functions. IEEE Communications Letters, 13, 956-958.
https://doi.org/10.1109/LCOMM.2009.12.091648
[8]
Zhang, P., Jiang, Y.X., Lin, C., Fan, Y.F. and Shen, X.M. (2010) P-Coding: Secure Network Coding against Eavesdropping Attacks. Proceeding of 2010 IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.
https://doi.org/10.1109/INFCOM.2010.5462050
[9]
Yawen, W., Zhen, Y. and Guan, Y. (2010) Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks. 2010 IEEE International Symposium on Network Coding (NetCod), Toronto, 9-11 June 2010, 1-6.
https://doi.org/10.1109/NETCOD.2010.5487671
[10]
Cao, Z., Zhang, S., Ji, X. and Zhang, L. (2015) Secure Random Linear Network Coding on a Wiretap Network. International Journal of Electronics and Communications, 69, 467-472. https://doi.org/10.1016/j.aeue.2014.10.018
[11]
Liu, G., Liu, B., Liu, X., Li. F. and Guo, W. (2016) Low-Complexity Secure Network Coding against Wiretapping Using Intra Inter-Generation Coding. China Communications, 12, 116-125. https://doi.org/10.1109/CC.2015.7122470
[12]
Cai, N. and Yeung, R.W. (2011) Secure Network Coding on a Wiretap Network. IEEE Transactions on Information Theory, 57, 424-435.
https://doi.org/10.1109/TIT.2010.2090197
[13]
Rouayheb, S.Y.E. and Soljanin, E. (2007) On Wiretap Networks II. 2007 IEEE International Symposium on Information Theory, Nice, 24-29 June 2007, 551-555.
https://doi.org/10.1109/ISIT.2007.4557098
[14]
Silva, D. and Kschsiischang, F.R. (2008) Security for Wiretap Networks via Rank-Metric Codes. 2008 IEEE International Symposium on Information Theory, Toronto, 6-11 July 2008, 176-180. https://doi.org/10.1109/ISIT.2008.4594971
[15]
Harada, K. and Yamamoto, H. (2008) Strongly Secure Linear Network Coding. IEICE Transactions Fundamental, E91-A, 2720-2728.
[16]
Köetter, R. and Kschsiischang, F.R. (2008) Coding for Errors and Erasures in Random Network Coding. IEEE Transactions on Information Theory, 54, 3579-3591.
https://doi.org/10.1109/TIT.2008.926449
[17]
Roth, R.M. (1991) Maximum-Rank Array Codes and Their Application to Crisscross Error Correction. IEEE Transactions on Information Theory, 37, 328-336.
https://doi.org/10.1109/18.75248
[18]
Chou, P.A., Wu, Y. and Jain, K. (2003) Practical Network Coding. Proceeding of the 41th Annual Allerton Conference on Communications, Controls and Computations, Monticello, 2-4 October 2003, 1-10.
[19]
Van, L.J.H. and Wilson, R.M. (2001) A Course in Combinatorics. 2nd Edition, Cambridge University Press, Cambridge.