On secure network coding for two unicast sessions: Studying butterflies

Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the gains that cooperation among sources and sinks can bring. Towards these goals, the capacity region of the butterfly network with arbitrary edge capacities is first derived. It is then shown that no rate can be guaranteed over this network under security considerations, when an eavesdropper wiretaps any one link. Four variations of the butterfly network, such as the case of co-located sources, are analyzed and their secure and non-secure capacity regions are characterized.

Original languageEnglish (US)
Title of host publication2016 IEEE Globecom Workshops, GC Wkshps 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509024827
DOIs
StatePublished - 2016
Event2016 IEEE Globecom Workshops, GC Wkshps 2016 - Washington, United States
Duration: Dec 4 2016Dec 8 2016

Publication series

Name2016 IEEE Globecom Workshops, GC Wkshps 2016 - Proceedings

Other

Other2016 IEEE Globecom Workshops, GC Wkshps 2016
Country/TerritoryUnited States
CityWashington
Period12/4/1612/8/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Fingerprint

Dive into the research topics of 'On secure network coding for two unicast sessions: Studying butterflies'. Together they form a unique fingerprint.

Cite this