Abstract
This paper characterizes the secret message capacity of three networks where two unicast sessions share some of the communication resources. Each network consists of erasure channels with state feedback. A passive eavesdropper is assumed to wiretap any one of the links. The capacity achieving schemes as well as the outer bounds are formulated as linear programs. The proposed strategies are then numerically evaluated and shown to achieve higher rate performances (up to a double single- or sum-rate) with respect to alternative strategies, where the network resources are time-shared among the two sessions. These results represent a step towards the secure capacity characterization for general networks. They also show that, even in configurations for which network coding does not offer benefits in absence of security, it can become beneficial under security constraints.
Original language | English (US) |
---|---|
Title of host publication | Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 2134-2138 |
Number of pages | 5 |
ISBN (Electronic) | 9781509018062 |
DOIs | |
State | Published - Aug 10 2016 |
Event | 2016 IEEE International Symposium on Information Theory, ISIT 2016 - Barcelona, Spain Duration: Jul 10 2016 → Jul 15 2016 |
Publication series
Name | IEEE International Symposium on Information Theory - Proceedings |
---|---|
Volume | 2016-August |
ISSN (Print) | 2157-8095 |
Other
Other | 2016 IEEE International Symposium on Information Theory, ISIT 2016 |
---|---|
Country/Territory | Spain |
City | Barcelona |
Period | 7/10/16 → 7/15/16 |
Bibliographical note
Publisher Copyright:© 2016 IEEE.