基于有效载荷数据和控制信息交叉锁定的喷泉编码辅助安全传输

Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren
{"title":"基于有效载荷数据和控制信息交叉锁定的喷泉编码辅助安全传输","authors":"Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162910","DOIUrl":null,"url":null,"abstract":"The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information\",\"authors\":\"Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren\",\"doi\":\"10.1109/INFOCOMWKSHPS50562.2020.9162910\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.\",\"PeriodicalId\":104136,\"journal\":{\"name\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162910\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162910","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

传统的源编码辅助策略通过保证合法用户比窃听者接收到足够数量的源编码数据包来实现传输保密,强调整个文件的安全性。然而,在通信过程中,窃听者会对截获的数据包进行部分正确解码,从而恢复一部分机密信息,这在某些对安全要求严格的场景中是不允许的。为了解决上述问题,我们提出了一种通过喷泉编码数据与码本信息交叉锁定的安全传输方案,该方案将喷泉码的生成矩阵隐式地在合法对之间传输,从而保护了数据间的码本信息。具体来说,发送端利用合法用户收到的源编码数据包对生成矩阵关联的密钥进行加密,防止窃听者对任何编码的数据包进行解码,从而保证了传输的安全。在软件无线电平台上开发了基于该方案的无线安全传输系统,并在实际场景中对其安全性能进行了评估。实验结果表明,该方案在拦截概率和窃听恢复比例方面都优于比较方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information
The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Framework for Bandwidth and Latency Guaranteed Service in New IP Network Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource Scheduling A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple Access
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1