Security-Enhanced Wireless Multicast via Adaptive Fountain Codes over Distributed Caching Network

With the kept-increasing interconnecting capability over Internet, distributed caching techniques can be applied for secure data storage. In particular, the entire data file of interests is stored in multiple distributed servers with each caching only a random part of the file. In this scenario, an attacker needs to intrude multiple servers to steal the whole file. If the legitimate receivers typically use mobile terminals such as smart phones, the attacker inclines to eavesdrop on open wireless channels to steal the file more easily. To protect the data from overheard by eavesdroppers, we propose a dynamic fountain coding scheme for wireless access point, adapting to the cached contents in the current server and data-reception states. Our proposal focuses on the challenging wireless multicast transmission as it costs at more redundancy transmissions for error control. Besides the adaptive encoding design, we design an efficient server selection strategy to decrease the transmission delay and reduce the probability of successfully overhearing by eavesdroppers. The simulation results show that our proposed scheme can efficiently achieve low eavesdropping probability and high transmission efficiency with a bit accredited complexity for distributed wireless caching network.

[1]  Xi Zhang,et al.  Distributed mobile devices caching over edge computing wireless networks , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[2]  Nirwan Ansari,et al.  Content Caching and Distribution in Smart Grid Enabled Wireless Networks , 2016, IEEE Internet of Things Journal.

[3]  Meixia Tao,et al.  Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[4]  Vincent W. S. Wong,et al.  Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks , 2017, IEEE Transactions on Wireless Communications.

[5]  Chintha Tellambura,et al.  Study of Mobility in Cache-Enabled Wireless Heterogeneous Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[6]  Zhenyu Yang,et al.  LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  Dong Liu,et al.  Caching at the wireless edge: design aspects, challenges, and future directions , 2016, IEEE Communications Magazine.

[8]  Li Sun,et al.  Physical layer security with its applications in 5G networks: A review , 2017, China Communications.

[9]  Valerio Bioglio,et al.  On edge caching with secrecy constraints , 2016, 2016 IEEE International Conference on Communications (ICC).

[10]  Shree Krishna Sharma Distributed Caching Enabled Peak Traffic Reduction in Ultra-Dense IoT Networks , 2018, IEEE Communications Letters.

[11]  Qianbin Chen,et al.  Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges , 2018, IEEE Communications Surveys & Tutorials.

[12]  Dongqing Xie,et al.  Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks , 2018, IEEE Access.

[13]  Xiaohu You,et al.  Clustered small base stations for cache-enabled wireless networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[14]  Xiao Ma,et al.  Enhancement for content delivery with proximity communications in caching enabled wireless networks: architecture and challenges , 2016, IEEE Communications Magazine.

[15]  Qinghe Du,et al.  Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services Over Wireless Networks , 2006, IEEE Trans. Veh. Technol..

[16]  Zhong Fan,et al.  Distributed Caching in Wireless Cellular Networks Incorporating Parallel Processing , 2018, IEEE Internet Computing.

[17]  Ying Cui,et al.  Analysis and Optimization of Caching and Multicasting in Large-Scale Cache-Enabled Heterogeneous Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[18]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Houbing Song,et al.  Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes , 2018, Wirel. Commun. Mob. Comput..