- Title
- RA-inspired codes for efficient information theoretic multi-path network security
- Creator
- Ye, Tao; Veitch, Darryl; Johnson, Sarah
- Relation
- 2014 International Symposium on Information Theory and Its Applications (ISITA2014). Proceedings of the 2014 International Symposium on Information Theory and its Applications (Melbourne 21-26 October, 2014) p. 408-412
- Relation
- http://www.isita.ieice.org/2014/index.html
- Publisher
- Institute of Electrical and Electronics Engineers (IEEE)
- Resource Type
- conference paper
- Date
- 2014
- Description
- Mobile devices have multiple network interfaces, some of which have security weaknesses, yet are used for sensitive data despite the risk of eavesdropping. We describe a data-splitting approach which, by design, maps exactly to a wiretap channel, thereby offering information theoretic security. Being based on the deletion channel, it perfectly hides block boundaries from the eavesdropper, which enhances security further. We provide an efficient Repeat Accumulate inspired code design, which satisfies the security criterion, and explore its security rate as a function block size and other parameters.
- Subject
- Repeat Accumulate code; security; mobile devices
- Identifier
- http://hdl.handle.net/1959.13/1297524
- Identifier
- uon:19472
- Language
- eng
- Reviewed
- Hits: 2050
- Visitors: 2012
- Downloads: 1
Thumbnail | File | Description | Size | Format |
---|