Preventing Traffic Explosion and Achieving Source Unobservability in Multi-hop Wireless Networks using Network Coding

被引:0
作者
Fan, Yanfei [1 ]
Chen, Jiming [1 ]
Lin, Xiaodong [2 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Ontario, Inst Technol, Fac Business & Informat Technol, London, ON N6A 3K7, Canada
来源
2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010 | 2010年
关键词
traffic explosion; source unobservability; network coding; dummy messages; homomorphic encryption; PRIVACY-PRESERVING SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy threat is a very serious issue in multi-hop wireless networks (MWNs) since open wireless channels are vulnerable to malicious attacks. Source unobservability is an attractive and desirable security property for many privacy-sensitive applications, and dummy messages are most commonly used to achieve this property. However, dummy messages may incur severe performance degradation or even service denial due to the explosion of network traffic. In this paper, we propose a novel scheme, called SUNC (Source Unobservability by Network Coding), to prevent traffic explosion while achieving source unobservability. With SUNC, specially designed dummy messages can be absorbed at intermediate nodes, and, thus, traffic explosion can be naturally prevented. In addition, SUNC can offer forwarder blindness, which is an important privacy property for thwarting internal attackers. Security analysis and performance evaluation demonstrate the efficacy and efficiency of the proposed SUNC.
引用
收藏
页数:5
相关论文
共 14 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[3]   An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding [J].
Fan, Yanfei ;
Jiang, Yixin ;
Zhu, Haojin ;
Shen, Xuemin .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :2213-2221
[4]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430
[5]  
JOTTEN CA, 2008, P IEEE 68 VEH TECHN, P1
[6]   Enhancing source-location privacy in sensor network routing [J].
Kamat, P ;
Zhang, YY ;
Trappe, W ;
Ozturk, C .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :599-608
[7]   ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks [J].
Lin, Xiaodong ;
Lu, Rongxing ;
Zhu, Haojin ;
Ho, Pin-Han ;
Shen, Xuemin ;
Cao, Zhenfu .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1247-+
[8]   SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems [J].
Lin, Xiaodong ;
Lu, Rongxing ;
Shen, Xuemin ;
Nemoto, Yoshiaki ;
Kato, Nei .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) :365-378
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223