Abstract
Harnessing the broadcast nature of wireless channels towards efficient multicast faces very challenging security issues, because reliability assurance for each multicast receiver often result vast frequent retransmissions, thus increasing the chance for eavesdropping. This paper proposes a dynamic fountain code design for security enhancement in wireless multicast against passive eavesdropping. The main features of the proposed scheme include two folds: (i) adaptive encoding structure based on legitimate receivers’ feedback, which aims at degrading the signal quality at the eavesdropper; (ii) benefit the legitimate receivers’ reception as maximally as possible, thus increasing the transmission efficiency compared with the conventional non-adaptive designs. Simulation results are presented to demonstrate that the proposed scheme can effectively decreasing intercepting probability while achieving the higher transmission efficiency, thus facilitating wireless connections in support of multicast services.
The research work reported in this paper is supported by the National Natural Science Foundation of China under the Grant Nos. 61461136001 and 61671371, the National Science and Technology Major Project of China under Grant No. 2016ZX03001012-004, Science and Technology Program of Shaanxi Province under the Grant No. 2016KW-032, and Fundamental Research Funds for the Central Universities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Forman, H., Zahorjan, J.: The challenges of mobile computing. IEEE Comput. 27(4), 38–47 (1994)
Hui, Y., Su, Z., Guo, S.: Utility based data computing scheme to provide sensing service in internet of things. IEEE Trans. Emerg. Top. Comput., June 2017. doi:10.1109/TETC.2017.2674023
Bloch, J., Barros, M.: Physical-Layer Security, From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)
Hussain, M., Du, Q., Sun, L., Ren, P.: Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 75(9), 5345–5357 (2016)
Zhang, X., Du, Q.: Adaptive low-complexity erasure-correcting code based protocols for QoS-driven mobile multicast services over wireless networks. IEEE Trans. Veh. Technol. 55(5), 1633–1647 (2006)
Cai, Z., Lin, G., Xue, G.: Improved approximation algorithms for the capacitated multicast routing problem. In: Proceedings of the 11th International Computing and Combinatorics Conference (COCOON 2005) (2005)
Du, Q., Zhang, X.: Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams. IEEE J. Sel. Areas Commun. 28(3), 420–433 (2010)
Zheng, X., Li, J., Gao, H., Cai, Z.: Capacity of wireless networks with multiple types of multicast sessions. In: The 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2014) (2014)
Cai, Z., Chen, Z., Lin, G.: A 3.4713-approximation algorithm for the capacitated multicast tree routing problem. Theor. Comput. Sci. 410(52), 5415–5424 (2009)
Cai, Z., Goebel, R., Lin, G.: Size-constrained tree partitioning: approximating the multicast k-tree routing problem. Theor. Comput. Sci. 412(3), 240–245 (2011)
Su, Z., Xu, Q., Hui, Y., Wen, M., Guo, S.: A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans. Veh. Technol. doi:10.1109/TVT.2016.2630300
MacKay, D.J.C.: Fountain codes. IEEE Proc. Commun. 152(6), 1062–1068 (2005)
Liu, X., Lim, T.J.: Fountain codes over fading relay channels. IEEE Trans. Wireless Commun. 8(6), 3278–3287 (2009)
Niu, H., Iwai, M., Sezaki, K., et al.: Exploiting fountain codes for secure wireless delivery. IEEE Commun. Lett. 18(5), 777–780 (2014)
Sun, L., Ren, P., Du, Q., Wang, Y.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 12(1), 291–300 (2016)
Du, Q., Sun, L., Song, H., Ren, P.: Security enhancement for wireless multimedia communications by fountain code. IEEE COMSOC MMTC E-Lett. 11(2), 47–51 (2016)
Byers, J.W., Luby, M., Mitzenmacher, M.: A digital fountain approach to asynchronous reliable multicast. IEEE J. Sel. Areas Commun. 20(8), 1528–1540 (2002)
Luby, M.: LT codes. In: Proceedings of the IEEE 43rd Annual Symposium on Foundation of Computer Science, pp. 271–280, November 2002
Liu, Q., Zhou, S., Giannakis, G.B.: Queuing with adaptive modulation and coding over wireless links: cross-layer analysis and design. IEEE Trans. Wireless Commun. 4, 1142–1153 (2005)
Liu, Q., Zhou, S., Giannakis, G.B.: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Trans. Wireless Commun. 2(5), 1746–1775 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Du, Q., Li, W., Song, H. (2017). Security Enhancement via Dynamic Fountain Code for Wireless Multicast. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)