Next Article in Journal
Improved Particle Swarm Optimization Based on Entropy and Its Application in Implicit Generalized Predictive Control
Next Article in Special Issue
Repair Rates for Multiple Descriptions on Distributed Storage
Previous Article in Journal
Fluctuation-Dissipation Theorems for Multiphase Flow in Porous Media
Previous Article in Special Issue
The Listsize Capacity of the Gaussian Channel with Decoder Assistance
Article

Secure Physical Layer Network Coding versus Secure Network Coding †

by 1,2,3,4
1
Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology, Nanshan District, Shenzhen 518055, China
2
International Quantum Academy (SIQA), Futian District, Shenzhen 518048, China
3
Guangdong Provincial Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Nanshan District, Shenzhen 518055, China
4
Graduate School of Mathematics, Nagoya University, Furocho, Chikusa-ku, Nagoya 464-8602, Japan
Parts of this paper were presented at the 2018 IEEE Information Theory Workshop (ITW), Guangzhou, China, 25–29 November 2018.
Academic Editors: Alex Dytso and Luca Barletta
Entropy 2022, 24(1), 47; https://doi.org/10.3390/e24010047
Received: 24 November 2021 / Revised: 17 December 2021 / Accepted: 23 December 2021 / Published: 27 December 2021
(This article belongs to the Special Issue Wireless Networks: Information Theoretic Perspectives Ⅱ)
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted) nodes are eavesdropped. If the channels on the network are noisy, the error correction is applied to noisy channels before the application of secure NC on an upper layer. In contrast, secure physical layer network coding (secure PLNC) is a method to securely transmit a message by a combination of coding operation on nodes when the network is composed of set of noisy channels. Since secure NC is a protocol on an upper layer, secure PLNC can be considered as a cross-layer protocol. In this paper, we compare secure PLNC with a simple combination of secure NC and error correction over several typical network models studied in secure NC. View Full-Text
Keywords: secrecy analysis; secure communication; untrusted relay; network coding; physical layer security; cross-layer protocol secrecy analysis; secure communication; untrusted relay; network coding; physical layer security; cross-layer protocol
Show Figures

Figure 1

MDPI and ACS Style

Hayashi, M. Secure Physical Layer Network Coding versus Secure Network Coding. Entropy 2022, 24, 47. https://doi.org/10.3390/e24010047

AMA Style

Hayashi M. Secure Physical Layer Network Coding versus Secure Network Coding. Entropy. 2022; 24(1):47. https://doi.org/10.3390/e24010047

Chicago/Turabian Style

Hayashi, Masahito. 2022. "Secure Physical Layer Network Coding versus Secure Network Coding" Entropy 24, no. 1: 47. https://doi.org/10.3390/e24010047

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop