Security Enhancement via Dynamic Fountain Code for Wireless Multicast

Harnessing the broadcast nature of wireless channels towards efficient multicast faces very challenging security issues, because reliability assurance for each multicast receiver often result vast frequent retransmissions, thus increasing the chance for eavesdropping. This paper proposes a dynamic fountain code design for security enhancement in wireless multicast against passive eavesdropping. The main features of the proposed scheme include two folds: (i) adaptive encoding structure based on legitimate receivers’ feedback, which aims at degrading the signal quality at the eavesdropper; (ii) benefit the legitimate receivers’ reception as maximally as possible, thus increasing the transmission efficiency compared with the conventional non-adaptive designs. Simulation results are presented to demonstrate that the proposed scheme can effectively decreasing intercepting probability while achieving the higher transmission efficiency, thus facilitating wireless connections in support of multicast services.

[1]  Zhi-Zhong Chen,et al.  A 3.4713-approximation algorithm for the capacitated multicast tree routing problem , 2009, Theor. Comput. Sci..

[2]  Qinghe Du,et al.  Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams , 2010, IEEE Journal on Selected Areas in Communications.

[3]  Li Sun,et al.  Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.

[4]  Song Guo,et al.  Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.

[5]  John Zahorjan,et al.  The challenges of mobile computing , 1994, Computer.

[6]  Randy Goebel,et al.  Size-constrained tree partitioning: Approximating the multicast k-tree routing problem , 2011, Theor. Comput. Sci..

[7]  Xi Liu,et al.  Fountain codes over fading relay channels , 2009, IEEE Transactions on Wireless Communications.

[8]  Qinghe Du,et al.  Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services Over Wireless Networks , 2006, IEEE Trans. Veh. Technol..

[9]  Georgios B. Giannakis,et al.  Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design , 2005, IEEE Transactions on Wireless Communications.

[10]  Michael Mitzenmacher,et al.  A digital fountain approach to asynchronous reliable multicast , 2002, IEEE J. Sel. Areas Commun..

[11]  Song Guo,et al.  A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[12]  Li Sun,et al.  Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.

[13]  Georgios B. Giannakis,et al.  Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links , 2004, IEEE Transactions on Wireless Communications.

[14]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[15]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[16]  Jianzhong Li,et al.  Capacity of wireless networks with multiple types of multicast sessions , 2014, MobiHoc '14.

[17]  Guohui Lin,et al.  Improved Approximation Algorithms for the Capacitated Multicast Routing Problem , 2005, COCOON.