NETWORK CODING COMBINED WITH ONION ROUTING FOR ANONYMOUS AND SECURE COMMUNICATION IN A W IRELESS MESH NETWORK

This paper presents a novel scheme that provides high level of security and privacy in a Wireless Mesh Network (WMN). We combine an approach of Network Coding with multiple layered encryption of onion routing for a WMN. An added superior feature provides higher level of security and privacy. Sensitive network information is confined to 1-hop neighborhood which is available anyways in a wireless medium with nodes using a bivariate polynomial. The only routing information divulged to a relay node is about next hop. No plain text is ever transmitted and all data can only be decrypted by its source and destination. Prior work finds it difficult to enforce encryption with network coding without divulging in complete routing information,hence losing privacy and anonymity. We compare our scheme with other existing approach for several networks. The preliminary results show this work to provide superior security and anonymity at low overhead cost.

[1]  E. Merzari,et al.  Large-Scale Simulations on Thermal-Hydraulics in Fuel Bundles of Advanced Nuclear Reactors , 2007 .

[2]  Chuang Lin,et al.  ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Tracey Ho,et al.  Energy Efficient Opportunistic Network Coding for Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Sadiq M. Sait,et al.  International Journal of Computer Networks & Communications (IJCNC) , 2011 .

[5]  Ninghui Li,et al.  Achieving privacy in mesh networks , 2006, SASN '06.

[6]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[7]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[8]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[10]  Nagesh Nandiraju,et al.  Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky , 2007, IEEE Wireless Communications.

[11]  Tomoaki Ohtsuki,et al.  XOR network coding pollution prevention without homomorphic functions , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[12]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[13]  Yuguang Fang,et al.  Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[14]  Dharma P. Agrawal,et al.  Optimizing sensor networks for autonomous unmanned ground vehicles , 2008, Security + Defence.

[15]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[16]  Bo Zhu,et al.  Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.

[17]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[18]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Dharma P. Agrawal,et al.  Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks , 2010, J. Parallel Distributed Comput..

[20]  Chuan Wu,et al.  Anonymous communication with network coding against traffic analysis attack , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[22]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[23]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[24]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.