Fountain Coding for Information Protection in Tactical Networks

Tactical edge networks are operated in harsh conditions where ensuring information protection is a challenging issue. An insider threat is one of the major issues that arises in such scenarios. For instance, an attacker can compromise one of the nodes and intercept information that is being relayed to other nodes. In this paper, we propose Fountain Coding for Information Protection (FCIP) to mitigate this threat. The source node encodes information from k source symbols into m messages before sending them over the network and the receiver must recover at least k messages to decipher the information. To mitigate the insider threat, we route the encoded packets along disjoint paths. However, this incurs a trade-off with information availability as the encoded packets are routed along sub-optimal paths. It is also necessary to determine the portion of traffic to encode as encoding all the traffic is resource intensive. We formulate a multi-objective optimization problem that takes into account information protection while trading-off with information availability and considers bandwidth, energy and availability constraints. We model a risk metric to determine the cost of information protection that is provided and a cost metric to quantify the cost of information availability. We demonstrate the benefit of FCIP in our performance study by comparing it against a shortest path routing solution and provide optimal results for FCIP. We analyze the trade-off between information protection and availability and provide insight on the performance and benefits of FCIP for different operational scenarios.

[1]  Mehul Motani,et al.  Exploring Performance Trade-offs in Tactical Edge Networks , 2020, IEEE Communications Magazine.

[2]  Filippo Poltronieri,et al.  Secure Multi-Domain Information Sharing in Tactical Networks , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[3]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[4]  Cesare Stefanelli,et al.  A secure group communication approach for tactical network environments , 2018, 2018 International Conference on Military Communications and Information Systems (ICMCIS).

[5]  Anders Hansson,et al.  The angloval tactical military scenario and experimentation environment , 2018, 2018 International Conference on Military Communications and Information Systems (ICMCIS).

[6]  Dijiang Huang,et al.  Attribute Based Encryption for Information Sharing on Tactical Mobile Networks , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[7]  Li Sun,et al.  Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback , 2019, IEEE Transactions on Vehicular Technology.

[8]  Qinghe Du,et al.  Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).