This paper considers a network comprising a transmitter, which employs random linear network coding to encode a message, a legitimate receiver, which can recover the message if it gathers a sufficient number of linearly independent coded packets, and an eavesdropper. Closed-form expressions for the probability of the eavesdropper intercepting enough coded packets to recover the message are derived. Transmission with and without feedback is studied. Furthermore, an optimization model that minimizes the intercept probability under delay and reliability constraints is presented. Results validate the proposed analysis and quantify the secrecy gain offered by a feedback link from the legitimate receiver
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
We focus on a network where $n$ sources send data to $k$ destinations, through $m\geq n$ relay nod...
We investigate the problem of information theoretically secure communication in a line network with ...
Abstract—This letter considers a network comprising a trans-mitter, which employs random linear netw...
In the literature, there exist analytical expressions for the probability of a receiver decoding a t...
In the literature there exists analytical expressions for the probability of a receiver decoding a t...
This paper considers a source, which employs random linear coding (RLC) to encode a message, a legit...
Opportunistic relaying has the potential to achieve full diversity gain, while random linear network...
In this letter, we compute the exact probability that a receiver obtains N linearly independent pack...
International audienceIn this letter, we compute the exact probability that a receiver obtains N lin...
This paper considers a network of source nodes that transmit data packets to a destination node via ...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Characterization of the delay profile of systems employing random linear network coding is important...
We investigate physical layer security design, which employs random linear network coding with oppor...
We focus on a network where $n$ sources send data to $k$ destinations, through $m\geq n$ relay nodes...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
We focus on a network where $n$ sources send data to $k$ destinations, through $m\geq n$ relay nod...
We investigate the problem of information theoretically secure communication in a line network with ...
Abstract—This letter considers a network comprising a trans-mitter, which employs random linear netw...
In the literature, there exist analytical expressions for the probability of a receiver decoding a t...
In the literature there exists analytical expressions for the probability of a receiver decoding a t...
This paper considers a source, which employs random linear coding (RLC) to encode a message, a legit...
Opportunistic relaying has the potential to achieve full diversity gain, while random linear network...
In this letter, we compute the exact probability that a receiver obtains N linearly independent pack...
International audienceIn this letter, we compute the exact probability that a receiver obtains N lin...
This paper considers a network of source nodes that transmit data packets to a destination node via ...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Characterization of the delay profile of systems employing random linear network coding is important...
We investigate physical layer security design, which employs random linear network coding with oppor...
We focus on a network where $n$ sources send data to $k$ destinations, through $m\geq n$ relay nodes...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
We focus on a network where $n$ sources send data to $k$ destinations, through $m\geq n$ relay nod...
We investigate the problem of information theoretically secure communication in a line network with ...