Information theory deals with the theory to generate replica of symbols at source nodes to sink nodes which defines the efficiency of the communication system.
Network coding theory deals with reliable transmission of symbol to sink nodes with reduced contamination and avoiding malicious tempering, spoofing and jamming by adversaries in the network.
Three approaches of security:
Network coding theory deals with reliable transmission of symbol to sink nodes with reduced contamination and avoiding malicious tempering, spoofing and jamming by adversaries in the network.
Three approaches of security:
- computational security
- physical security
- information theoretic security
Secure Network coding deals with information theoretic security with no information gained by the wiretapper about the transmitting messages out of eavesdropped message.
Shannon Ciphar system models sending of secrete key to destination through private channel without access of adversaries and message to sink node through the public channel, where without knowing secret key, adversaries gain no information about the source message.
Another wiretap model sends secret message to sink nodes after encoding to code-word via noiseless channel and message symbol via public channels which could be tapped by adversaries.
Secret sharing model shares random secret symbols among the legitimate users and coded user message will be decoded with the secret symbol received by legitimate users and illegitimate user get no knowledge about the message transmitted over public channel without knowledge of secret message.