ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks

被引:2
作者
Wang, Jin [1 ]
Lu, Kejie [2 ,3 ]
Wang, Jianping [4 ]
Zhu, Junda [5 ]
Qiao, Chunming [6 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
[2] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 200090, Peoples R China
[3] Univ Puerto Rico, Dept Elect & Comp Engn, Mayaguez, PR 00680 USA
[4] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[5] Univ Macau, Fac Sci & Technol, Macau, Peoples R China
[6] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Linear network coding (LNC); mobile device; untraceability; wireless mesh networks (WMNs); EXCHANGE; PROTOCOL; SCHEME; DESIGN; TIME;
D O I
10.1109/TVT.2015.2498551
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To protect user privacy in wireless mesh networks, it is important to address two major challenges, namely, flow untraceability and movement untraceability, which prevent malicious attackers from deducing the flow paths and the movement tracks of mobile devices. For these two privacy requirements, most existing approaches rely on encrypting the whole packet, appending random padding, and applying random delay for each message at every intermediate node, resulting in significant computational and communication overheads. Recently, linear network coding (LNC) has been introduced as an alternative, but the global encoding vectors (GEVs) of coded messages have to be encrypted by homomorphic encryption to conceal the relationships between incoming and outgoing messages. In this paper, we aim to explore the potential of LNC to ensure flow untraceability and movement untraceability. Specifically, we first determine the necessary and sufficient condition, with which the two privacy requirements can be achieved without encrypting either GEVs or message contents. We then design a deterministic untraceable LNC (ULNC) scheme to provide flow untraceability and movement untraceability when the sufficient and necessary condition is satisfied. We also provide extensive theoretical analysis on the probability that the condition is satisfied, as well as abundant discussions on the key parameters that affect the value of the probability. Finally, we discuss the effectiveness of the proposed ULNC scheme.
引用
收藏
页码:7621 / 7633
页数:13
相关论文
共 32 条
  • [11] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Shen, Xuemin
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221
  • [12] QoS provisioning in a scalable wireless mesh network for intelligent transportation systems
    Huang, Jane-Hwa
    Wang, Li-Chun
    Chang, Chung-Ju
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (05) : 3121 - 3135
  • [13] Isdal T., 2009, TECH REP
  • [14] Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes
    Kong, Jiejun
    Hong, Xiaoyan
    Wu, Dapeng Oliver
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (05) : 2406 - 2416
  • [15] Kong Jiejun., 2003, P ACM MOBIHOC, P291
  • [16] Linear network coding
    Li, SYR
    Yeung, RW
    Cai, N
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) : 371 - 381
  • [17] ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    Cao, Zhenfu
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1247 - +
  • [18] Data Dissemination With Network Coding in Two-Way Vehicle-to-Vehicle Networks
    Liu, Fang
    Chen, Zhiyong
    Xia, Bin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (04) : 2445 - 2456
  • [19] AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
    Liu, Wei
    Yu, Ming
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4585 - 4593
  • [20] Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs
    Lu, Rongxing
    Lin, Xiaodong
    Luan, Tom H.
    Liang, Xiaohui
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) : 86 - 96