ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks

被引:2
作者
Wang, Jin [1 ]
Lu, Kejie [2 ,3 ]
Wang, Jianping [4 ]
Zhu, Junda [5 ]
Qiao, Chunming [6 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
[2] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 200090, Peoples R China
[3] Univ Puerto Rico, Dept Elect & Comp Engn, Mayaguez, PR 00680 USA
[4] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[5] Univ Macau, Fac Sci & Technol, Macau, Peoples R China
[6] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Linear network coding (LNC); mobile device; untraceability; wireless mesh networks (WMNs); EXCHANGE; PROTOCOL; SCHEME; DESIGN; TIME;
D O I
10.1109/TVT.2015.2498551
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To protect user privacy in wireless mesh networks, it is important to address two major challenges, namely, flow untraceability and movement untraceability, which prevent malicious attackers from deducing the flow paths and the movement tracks of mobile devices. For these two privacy requirements, most existing approaches rely on encrypting the whole packet, appending random padding, and applying random delay for each message at every intermediate node, resulting in significant computational and communication overheads. Recently, linear network coding (LNC) has been introduced as an alternative, but the global encoding vectors (GEVs) of coded messages have to be encrypted by homomorphic encryption to conceal the relationships between incoming and outgoing messages. In this paper, we aim to explore the potential of LNC to ensure flow untraceability and movement untraceability. Specifically, we first determine the necessary and sufficient condition, with which the two privacy requirements can be achieved without encrypting either GEVs or message contents. We then design a deterministic untraceable LNC (ULNC) scheme to provide flow untraceability and movement untraceability when the sufficient and necessary condition is satisfied. We also provide extensive theoretical analysis on the probability that the condition is satisfied, as well as abundant discussions on the key parameters that affect the value of the probability. Finally, we discuss the effectiveness of the proposed ULNC scheme.
引用
收藏
页码:7621 / 7633
页数:13
相关论文
共 32 条
  • [1] Instantly Decodable Network Coding for Completion Time or Decoding Delay Reduction in Cooperative Data Exchange Systems
    Aboutorab, Neda
    Sadeghi, Parastoo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) : 1212 - 1228
  • [2] [Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
  • [3] [Anonymous], 2006, P 4 ACM WORKSHOP SEC
  • [4] [Anonymous], COMM ICC 2010 IEEE I
  • [5] Blaze M., 2010, INT J NETWORK SECURI, V8, P37
  • [6] Secure network coding
    Cai, N
    Yeung, RW
    [J]. ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 323 - 323
  • [7] IEEE 802.11s Mesh Backbone for Vehicular Communication: Fairness and Throughput
    Chakraborty, Sandip
    Nandi, Sukumar
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (05) : 2193 - 2203
  • [8] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [9] Mixminion: Design of a type III anonymous remailer protocol
    Danezis, G
    Dingledine, R
    Mathewson, N
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 2 - 15
  • [10] Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Chen, Jiming
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (03) : 834 - 843