ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks

To protect user privacy in wireless mesh networks, it is important to address two major challenges, namely, flow untraceability and movement untraceability, which prevent malicious attackers from deducing the flow paths and the movement tracks of mobile devices. For these two privacy requirements, most existing approaches rely on encrypting the whole packet, appending random padding, and applying random delay for each message at every intermediate node, resulting in significant computational and communication overheads. Recently, linear network coding (LNC) has been introduced as an alternative, but the global encoding vectors (GEVs) of coded messages have to be encrypted by homomorphic encryption to conceal the relationships between incoming and outgoing messages. In this paper, we aim to explore the potential of LNC to ensure flow untraceability and movement untraceability. Specifically, we first determine the necessary and sufficient condition, with which the two privacy requirements can be achieved without encrypting either GEVs or message contents. We then design a deterministic untraceable LNC (ULNC) scheme to provide flow untraceability and movement untraceability when the sufficient and necessary condition is satisfied. We also provide extensive theoretical analysis on the probability that the condition is satisfied, as well as abundant discussions on the key parameters that affect the value of the probability. Finally, we discuss the effectiveness of the proposed ULNC scheme.

[1]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[2]  Parastoo Sadeghi,et al.  Instantly Decodable Network Coding for Completion Time or Decoding Delay Reduction in Cooperative Data Exchange Systems , 2016, IEEE Transactions on Vehicular Technology.

[3]  Ahmed Sultan,et al.  HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[4]  Ninghui Li,et al.  Achieving privacy in mesh networks , 2006, SASN '06.

[5]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[6]  Jin Wang,et al.  Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Victor C. S. Lee,et al.  On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[8]  Jin Wang,et al.  SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[9]  Fang Liu,et al.  Data Dissemination With Network Coding in Two-Way Vehicle-to-Vehicle Networks , 2016, IEEE Transactions on Vehicular Technology.

[10]  Chuan Wu,et al.  Anonymous communication with network coding against traffic analysis attack , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Xiaoyan Hong,et al.  Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes , 2009, IEEE Transactions on Vehicular Technology.

[12]  Walid Saad,et al.  Multiple Vehicles Collaborative Data Download Protocol via Network Coding , 2015, IEEE Transactions on Vehicular Technology.

[13]  Chunming Qiao,et al.  Untraceability of mobile devices in wireless mesh networks using linear network coding , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  Jin Wang,et al.  Optimal Design of Linear Network Coding for information theoretically secure unicast , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Rose Qingyang Hu,et al.  Mobile-Agent-Based Handoff in Wireless Mesh Networks: Architecture and Call Admission Control , 2009, IEEE Transactions on Vehicular Technology.

[16]  Pin-Han Ho,et al.  ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[17]  Chau Yuen,et al.  Coding-Based Data Broadcasting for Time-Critical Applications With Rate Adaptation , 2014, IEEE Transactions on Vehicular Technology.

[18]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[19]  Sandip Chakraborty,et al.  IEEE 802.11s Mesh Backbone for Vehicular Communication: Fairness and Throughput , 2013, IEEE Transactions on Vehicular Technology.

[20]  Angelos D. Keromytis,et al.  Anonymity in Wireless Broadcast Networks , 2009, Int. J. Netw. Secur..

[21]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[22]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[23]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.

[24]  Jing Ren,et al.  An optimal Cache management framework for information-centric networks with network coding , 2014, 2014 IFIP Networking Conference.

[25]  Ming Yu,et al.  AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.

[26]  Chung-Ju Chang,et al.  QoS Provisioning in a Scalable Wireless Mesh Network for Intelligent Transportation Systems , 2008, IEEE Transactions on Vehicular Technology.

[27]  Jiming Chen,et al.  Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks , 2011, IEEE Transactions on Wireless Communications.

[28]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[29]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[30]  Xuemin Shen,et al.  A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[31]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[32]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.