Skip to main content

Security Enhancement via Dynamic Fountain Code for Wireless Multicast

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

Harnessing the broadcast nature of wireless channels towards efficient multicast faces very challenging security issues, because reliability assurance for each multicast receiver often result vast frequent retransmissions, thus increasing the chance for eavesdropping. This paper proposes a dynamic fountain code design for security enhancement in wireless multicast against passive eavesdropping. The main features of the proposed scheme include two folds: (i) adaptive encoding structure based on legitimate receivers’ feedback, which aims at degrading the signal quality at the eavesdropper; (ii) benefit the legitimate receivers’ reception as maximally as possible, thus increasing the transmission efficiency compared with the conventional non-adaptive designs. Simulation results are presented to demonstrate that the proposed scheme can effectively decreasing intercepting probability while achieving the higher transmission efficiency, thus facilitating wireless connections in support of multicast services.

The research work reported in this paper is supported by the National Natural Science Foundation of China under the Grant Nos. 61461136001 and 61671371, the National Science and Technology Major Project of China under Grant No. 2016ZX03001012-004, Science and Technology Program of Shaanxi Province under the Grant No. 2016KW-032, and Fundamental Research Funds for the Central Universities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Forman, H., Zahorjan, J.: The challenges of mobile computing. IEEE Comput. 27(4), 38–47 (1994)

    Article  Google Scholar 

  2. Hui, Y., Su, Z., Guo, S.: Utility based data computing scheme to provide sensing service in internet of things. IEEE Trans. Emerg. Top. Comput., June 2017. doi:10.1109/TETC.2017.2674023

  3. Bloch, J., Barros, M.: Physical-Layer Security, From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

  4. Hussain, M., Du, Q., Sun, L., Ren, P.: Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 75(9), 5345–5357 (2016)

    Article  Google Scholar 

  5. Zhang, X., Du, Q.: Adaptive low-complexity erasure-correcting code based protocols for QoS-driven mobile multicast services over wireless networks. IEEE Trans. Veh. Technol. 55(5), 1633–1647 (2006)

    Article  Google Scholar 

  6. Cai, Z., Lin, G., Xue, G.: Improved approximation algorithms for the capacitated multicast routing problem. In: Proceedings of the 11th International Computing and Combinatorics Conference (COCOON 2005) (2005)

    Google Scholar 

  7. Du, Q., Zhang, X.: Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams. IEEE J. Sel. Areas Commun. 28(3), 420–433 (2010)

    Article  Google Scholar 

  8. Zheng, X., Li, J., Gao, H., Cai, Z.: Capacity of wireless networks with multiple types of multicast sessions. In: The 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2014) (2014)

    Google Scholar 

  9. Cai, Z., Chen, Z., Lin, G.: A 3.4713-approximation algorithm for the capacitated multicast tree routing problem. Theor. Comput. Sci. 410(52), 5415–5424 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  10. Cai, Z., Goebel, R., Lin, G.: Size-constrained tree partitioning: approximating the multicast k-tree routing problem. Theor. Comput. Sci. 412(3), 240–245 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  11. Su, Z., Xu, Q., Hui, Y., Wen, M., Guo, S.: A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans. Veh. Technol. doi:10.1109/TVT.2016.2630300

  12. MacKay, D.J.C.: Fountain codes. IEEE Proc. Commun. 152(6), 1062–1068 (2005)

    Article  Google Scholar 

  13. Liu, X., Lim, T.J.: Fountain codes over fading relay channels. IEEE Trans. Wireless Commun. 8(6), 3278–3287 (2009)

    Article  Google Scholar 

  14. Niu, H., Iwai, M., Sezaki, K., et al.: Exploiting fountain codes for secure wireless delivery. IEEE Commun. Lett. 18(5), 777–780 (2014)

    Article  Google Scholar 

  15. Sun, L., Ren, P., Du, Q., Wang, Y.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 12(1), 291–300 (2016)

    Article  Google Scholar 

  16. Du, Q., Sun, L., Song, H., Ren, P.: Security enhancement for wireless multimedia communications by fountain code. IEEE COMSOC MMTC E-Lett. 11(2), 47–51 (2016)

    Google Scholar 

  17. Byers, J.W., Luby, M., Mitzenmacher, M.: A digital fountain approach to asynchronous reliable multicast. IEEE J. Sel. Areas Commun. 20(8), 1528–1540 (2002)

    Article  Google Scholar 

  18. Luby, M.: LT codes. In: Proceedings of the IEEE 43rd Annual Symposium on Foundation of Computer Science, pp. 271–280, November 2002

    Google Scholar 

  19. Liu, Q., Zhou, S., Giannakis, G.B.: Queuing with adaptive modulation and coding over wireless links: cross-layer analysis and design. IEEE Trans. Wireless Commun. 4, 1142–1153 (2005)

    Article  Google Scholar 

  20. Liu, Q., Zhou, S., Giannakis, G.B.: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Trans. Wireless Commun. 2(5), 1746–1775 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qinghe Du .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Du, Q., Li, W., Song, H. (2017). Security Enhancement via Dynamic Fountain Code for Wireless Multicast. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics