Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

被引:4
作者
Tran, Tuan T. [1 ]
Li, Hongxiang [1 ]
Ru, Guanying [1 ]
Kerczewski, Robert J. [2 ]
Liu, Lingjia [3 ]
Khan, Samee U. [4 ]
机构
[1] Univ Louisville, JB Speed Sch Engn, Dept Elect & Comp Engn, Louisville, KY 40292 USA
[2] NASA Glenn Res Ctr, Cleveland, OH 44135 USA
[3] Univ Kansas, Dept Elect Engn & Comp Sci, Lawrence, KS 66045 USA
[4] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58102 USA
基金
美国国家科学基金会;
关键词
Wireless multicast; network coding; Markov decision process; security; denied-of-service attack;
D O I
10.1109/TWC.2013.062413.121557
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless multicast for delay-sensitive data is challenging because of the heterogeneity effect where each receiver may experience different packet losses. Fortunately, network coding, a new advanced routing protocol, offers significant advantages over the traditional Automatic Repeat reQuest (ARQ) protocols in that it mitigates the need for retransmission and has the potential to approach the min-cut capacity. Network-coded multicast would be, however, vulnerable to false packet injection attacks, in which the adversary injects bogus packets to prevent receivers from correctly decoding the original data. Without a right defense in place, even a single bogus packet can completely change the decoding outcome. Existing solutions either incur high computation cost or cannot withstand high packet loss. In this paper, we propose a novel scheme to defend against false packet injection attacks on network-coded multicast for delay-sensitive data. Specifically, we propose an efficient authentication mechanism based on null space properties of coded packets, aiming to enable receivers to detect any bogus packets with high probability. We further design an adaptive scheduling algorithm based on the Markov Decision Processes (MDP) to maximize the number of authenticated packets received within a given time constraint. Both analytical and simulation results have been provided to demonstrate the efficacy and efficiency of our proposed scheme.
引用
收藏
页码:3372 / 3387
页数:16
相关论文
共 42 条
  • [1] Homomorphic MACs: MAC-Based Integrity for Network Coding
    Agrawal, Shweta
    Boneh, Dan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 292 - +
  • [2] Alter O., P 2000 NAT AC SCI US
  • [3] [Anonymous], P 2003 ALL C COMM CO
  • [4] [Anonymous], 1997, Ieee standard for wireless lan - medium access control and physical layer specification
  • [5] [Anonymous], 2010, Elementary Linear Algebra
  • [6] [Anonymous], IEEE ACM T NETWORKIN
  • [7] Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68
  • [8] Borodin A., P 1996 ACM S THEOR C
  • [9] Cai N., 2011, IEEE T INF THEORY
  • [10] Canetti R., P 1999 IEEE INFOCOM