Encryption scheme against eavesdropper collusion in wireless multi-user network

In order to resist eavesdropper collusion attack in wireless multi-user network, the authors propose a distributed physical layer encryption (DPLE) scheme with energy-efficient design. The encryption is embedded into rateless coding at both user nodes and relay node. Meanwhile, data frame permutation is added at the relay for increasing randomness. It is noteworthy that the secret key is used as the seed of random number generator, which controls the encoding process and permutation. At receiver, the decryption is united with decoding process without any extra cost, which makes DPLE special in the field of lightweight security. There are two cases considered in security analysis for resisting collusion attack: without error and with error. Typical results are time complexity and attack success probability, respectively. Furthermore, the evaluation for algorithm implementation is investigated. The theoretic result and simulation show that the proposed scheme can combat colluding eavesdroppers by high complexity and very low attack success probability. Moreover, lower computation cost is achieved.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Ying Huang,et al.  Concatenated physical layer encryption scheme based on rateless codes , 2018, IET Commun..

[3]  Guang Gong,et al.  XOR Encryption Versus Phase Encryption, an In-Depth Analysis , 2015, IEEE Transactions on Electromagnetic Compatibility.

[4]  Neil Smith,et al.  Practical physical-layer encryption: The marriage of optical noise with traditional cryptography , 2009, IEEE Communications Magazine.

[5]  Xiaohong Jiang,et al.  On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.

[6]  Ying Huang,et al.  Multi-dimensional encryption scheme based on physical layer for fading channel , 2018, IET Commun..

[7]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[8]  Liang Jin,et al.  Secure transmission scheme based on dual- thresholds for simultaneous wireless information and power transfer , 2017, China Communications.

[9]  Abbas El Gamal,et al.  Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.

[10]  Rui Chang,et al.  Interference coordination and cancellation for 4G networks , 2009, IEEE Communications Magazine.

[11]  Jing Lei,et al.  Joint network and fountain codes design for relay-assisted multi-user system , 2015, China Communications.

[12]  Xuemin Shen,et al.  A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  Brighten Godfrey,et al.  VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.

[14]  Zhen Li,et al.  SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels , 2018, IEEE Access.

[15]  Jiaru Lin,et al.  Optimal Secure Multicast With Simultaneous Wireless Information and Power Transfer in Presence of Multiparty Eavesdropper Collusion , 2016, IEEE Transactions on Vehicular Technology.

[16]  Wei Li,et al.  Asymmetric Physical Layer Encryption for Wireless Communications , 2019, IEEE Access.

[17]  Rong Mei Rayleigh quotient based interference alignment spectrum sharing in MIMO cognitive radio networks , 2015, China Communications.