Lightweight Security for WSN Based on Network Coding

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 202)

Abstract

The application of network coding has been improving the performance of Wireless Sensor Networks (WSN). Compared with previous, the security performance has been improved. But when faced with security attacks—especially eavesdroppers, the security of the WSN still needs to be improved. A Lightweight Permutation Encryption Coding (LPEC) is proposed in this chapter, which Combines with secure network coding and permutation encryption algorithm. Unlike end-to-end encryption, which encrypts the whole text, LPEC only encrypts the Local Encoding Vector (LEV), and hide it by permutation encryption. The mechanism effectively reduces the encryption complexity, and thwarts global eavesdroppers. At the same time, it improves the security performance for communication between WSN nodes.

Keywords

WSN Network coding Security performance LPEC 

Notes

Acknowledgments

This work was supported by Important National Scenes & Technology Specific Projects (2010ZX03006-006), NSFC (61171176), Scientific Research Fund of Zhejiang Provincial Education Department under Grant No. Y201225956 and Natural Science Foundation of Ningbo under Grant No. 2012A610015.

References

  1. 1.
    LI SY-R, CAI N (2003) Linear network coding. IEEE Trans Inf Theory 49(2):371–381MathSciNetMATHCrossRefGoogle Scholar
  2. 2.
    Tan J, M´edard M (2006) Secure network coding with a cost criterion.In: Proceedings of 4th international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt’06), Boston, April 2006Google Scholar
  3. 3.
    Fan Y, Jiang Y, Zhu H, Shen X (2009) An efficient privacy-preserving scheme against traffic analysis attacks in network coding. IEEE INFOCOMGoogle Scholar
  4. 4.
    Fathy A, ElBatt T (2011) SANC: source authentication using network oding. The first workshop on security in computers, networking and communicationGoogle Scholar
  5. 5.
    Zhang P, Jiang P, Lin C, Fan Y, Shen X (2010) P-coding: secure network coding against eavesdropping attacks. IEEE INFOCOMGoogle Scholar
  6. 6.
    Bhattad K, Narayanan KR (2005) Weakly secure network coding. In: Proceedings of the first workshop on network coding, theory, & applicationsGoogle Scholar
  7. 7.
    Yu Z, Wei Y, Ramkumar B, Guan Y (2008) An efficient signature-based scheme for securing network coding against pollution attacks. IEEE INFOCOMGoogle Scholar
  8. 8.
    Vilela JP, Lima L, Barros J (2008) Lightweight security for network coding. In: IEEE international conference on communications (ICC)Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Key Laboratory of Universal Wireless CommunicationMinistry of Education, Beijing University of Posts and TelecommunicationsBeijingPeople’s Republic of China

Personalised recommendations