Towards Network Coding for Cyber-Physical Systems : Security Challenges and Applications

This survey summarizes the research on the applications and security challenges of network coding in wireless networks and Cyber-Physical Systems. Network coding technique generalizes the store-and-forward routing by mixing the received packets at the intermediate nodes to a single packet before forwarding them. Network coding has received a lot of attention from the community, and researchers has widely studied its application in increasing the throughput and transmissions reliability of networks and cyber-physical systems. Applying network coding can be a challenge to the security of the networks. However, network coding can also provide a natural way to conceal the transmitted data from eavesdroppers. As a result of mixing the received packets at the intermediate nodes, the transmission protocols in network coding are more vulnerable against some attacks, such as pollution and Byzantine attacks. A single polluted packet can easily pollute many packets. Also, because of encoding at the intermediate nodes, the security mechanisms that are proposed for the traditional transmission protocols might not be appropriate for the protocols with network coding. On the other hand, since the transmitted packets are encoded, an eavesdropper cannot get meaningful data by overhearing a single encoded packet, which makes the transmissions more robust against eavesdropping attack. In this survey, in addition to discussing the security challenges in network coding protocols, we explain the applications of network coding in providing security. Our main focus in this paper is on the applications of network coding in providing security.

[1]  Yang Guo,et al.  A survey on peer-to-peer video streaming systems , 2008, Peer-to-Peer Netw. Appl..

[2]  João Barros,et al.  Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.

[3]  Tetsuya Takine,et al.  Survey of Network Coding and Its Applications , 2011, IEICE Trans. Commun..

[4]  Rahim Tafazolli,et al.  Security concerns and countermeasures in network coding based communication systems: A survey , 2015, Comput. Networks.

[5]  Steven McCanne,et al.  Receiver-driven layered multicast , 2001 .

[6]  Xuemin Shen,et al.  A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[8]  Muriel Médard,et al.  Coding for Trusted Storage in Untrusted Networks , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Chau Yuen,et al.  A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Muriel Medard,et al.  On network coding for security , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[11]  Ming Xiao,et al.  Relay-Aided Broadcasting with Instantaneously Decodable Binary Network Codes , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[12]  Dimitrios Koutsonikolas,et al.  CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Marco Grangetto,et al.  Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming , 2015, IEEE Transactions on Multimedia.

[14]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[15]  Matthew C. Valenti,et al.  Practical relay networks: a generalization of hybrid-ARQ , 2005 .

[16]  Jianwei Liu,et al.  A Deep Detection Scheme against Pollution Attacks in Wireless Inter-flow Network Coding , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[17]  Dong Nguyen,et al.  Wireless Broadcast Using Network Coding , 2009, IEEE Transactions on Vehicular Technology.

[18]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[19]  Fang Zhao,et al.  Network Coding for Multi-Resolution Multicast , 2010, 2010 Proceedings IEEE INFOCOM.

[20]  Jianlong Tan,et al.  Secure Network Coding with a Cost Criterion , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[21]  H. Djandji An efficient hybrid ARQ protocol for point-to-multipoint communication and its throughput performance , 1999 .

[22]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[23]  J. Bibb Cain,et al.  Error-Correction Coding for Digital Communications , 1981 .

[24]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[25]  Nachum Shacham,et al.  Multipoint communication by hierarchically encoded data , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[26]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.

[27]  Muriel Médard,et al.  Trusted Storage over Untrusted Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[28]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[29]  Kannan Ramchandran,et al.  Secure network coding for distributed secret sharing with low communication cost , 2013, 2013 IEEE International Symposium on Information Theory.

[30]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[31]  Michelle Effros Universal multiresolution source codes , 2001, IEEE Trans. Inf. Theory.

[32]  R. Koetter,et al.  An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[33]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[34]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[35]  Wentao Huang,et al.  Rateless and pollution-attack-resilient network coding , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[36]  João Barros,et al.  Network Coding Security: Attacks and Countermeasures , 2008, ArXiv.

[37]  Muriel Médard,et al.  Secure network coding for multi-resolution wireless video streaming , 2010, IEEE Journal on Selected Areas in Communications.

[38]  João Barros,et al.  Mobile Secret Key Distribution with Network Coding , 2007, SECRYPT.

[39]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[40]  Bo Li,et al.  Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast , 2008, Proceedings of the IEEE.

[41]  Giuseppe Caire,et al.  The throughput of hybrid-ARQ protocols for the Gaussian collision channel , 2001, IEEE Trans. Inf. Theory.

[42]  Christina Fragouli,et al.  A Network Coding Approach to Overlay Network Monitoring , 2005 .

[43]  Jie Wu,et al.  Fault-tolerant and secure distributed data storage using random linear network coding , 2016, 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[44]  Christian Schlegel,et al.  Error Control Coding in Low-Power Wireless Sensor Networks: When Is ECC Energy-Efficient? , 2006, EURASIP J. Wirel. Commun. Netw..

[45]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[46]  Sorina Dumitrescu,et al.  Layered Multicast With Inter-Layer Network Coding for Multimedia Streaming , 2011, IEEE Transactions on Multimedia.

[47]  Pouya Ostovari,et al.  Network Coding Techniques for Wireless and Sensor Networks , 2014 .

[48]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[49]  Shu Lin,et al.  Channel Codes: Classical and Modern , 2009 .

[50]  Xuemin Shen,et al.  P-Coding: Secure Network Coding against Eavesdropping Attacks , 2010, 2010 Proceedings IEEE INFOCOM.

[51]  Kannan Ramchandran,et al.  Codes for a distributed caching based Video-on-Demand system , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[52]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[53]  Sukumar Ghosh Peer-to-Peer Networks , 2006 .

[54]  Chuang Lin,et al.  ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation , 2012, IEEE Journal on Selected Areas in Communications.

[55]  Minghua Chen,et al.  A distributed multichannel demand-adaptive P2P VoD system with optimized caching and neighbor-selection , 2011, Optical Engineering + Applications.

[56]  Ian F. Akyildiz,et al.  Error Control in Wireless Sensor Networks: A Cross Layer Analysis , 2009, IEEE/ACM Transactions on Networking.

[57]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[58]  Kannan Ramchandran,et al.  Distributed Secret Dissemination Across a Network , 2012, IEEE Journal of Selected Topics in Signal Processing.

[59]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[60]  Muriel Médard,et al.  Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.

[61]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[62]  Ming Xiao,et al.  Efficient Network Coding for Wireless Broadcasting , 2010, 2010 IEEE Wireless Communication and Networking Conference.