{"title":"基于有效载荷数据和控制信息交叉锁定的喷泉编码辅助安全传输","authors":"Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162910","DOIUrl":null,"url":null,"abstract":"The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information\",\"authors\":\"Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren\",\"doi\":\"10.1109/INFOCOMWKSHPS50562.2020.9162910\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.\",\"PeriodicalId\":104136,\"journal\":{\"name\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162910\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162910","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information
The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.