A Generic Secure Transmission Scheme Based on Random Linear Network Coding
Unlike general routing strategies, network coding (NC) can combine encoding functions with multi-path propagation over a network. This allows network capacity to be achieved to support complex security solutions. Moreover, NC has intrinsic security advantages against passive attacks over traditional...
Uložené v:
| Vydané v: | IEEE/ACM transactions on networking Ročník 30; číslo 2; s. 855 - 866 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
IEEE
01.04.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 1063-6692, 1558-2566 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Unlike general routing strategies, network coding (NC) can combine encoding functions with multi-path propagation over a network. This allows network capacity to be achieved to support complex security solutions. Moreover, NC has intrinsic security advantages against passive attacks over traditional routing techniques. However, due to the transmission of the global encoding kernels, the system is fragile to eavesdropping attacks with multiple probes. This paper proposes a generic unicast secure transmission scheme based on random linear network coding (RLNC). Specifically, the intended receiver generates a random matrix upon receiving the request from the source node, and then transmits each row vector of this matrix over a link reversely to the source node. Each intermediate node rearranges all received vectors to form a matrix by row, and then post-multiplies its local encoding kernel by this matrix to obtain a new matrix. Similarly, each row vector of the new matrix is reversely transmitted over a link to the source node. This procedure is performed until we have the source node, where the generalized inverse of the received matrix (or part of it) can be used as its local encoding kernel. Hence, the intended receiver can use the generated matrix (or the corresponding part) to decode the received data packets directly. We also analyze the security to demonstrate that the proposed scheme is at least as secure as other methods against wiretapping attacks. We also evaluate the performance of the proposed scheme to demonstrate its utility. |
|---|---|
| AbstractList | Unlike general routing strategies, network coding (NC) can combine encoding functions with multi-path propagation over a network. This allows network capacity to be achieved to support complex security solutions. Moreover, NC has intrinsic security advantages against passive attacks over traditional routing techniques. However, due to the transmission of the global encoding kernels, the system is fragile to eavesdropping attacks with multiple probes. This paper proposes a generic unicast secure transmission scheme based on random linear network coding (RLNC). Specifically, the intended receiver generates a random matrix upon receiving the request from the source node, and then transmits each row vector of this matrix over a link reversely to the source node. Each intermediate node rearranges all received vectors to form a matrix by row, and then post-multiplies its local encoding kernel by this matrix to obtain a new matrix. Similarly, each row vector of the new matrix is reversely transmitted over a link to the source node. This procedure is performed until we have the source node, where the generalized inverse of the received matrix (or part of it) can be used as its local encoding kernel. Hence, the intended receiver can use the generated matrix (or the corresponding part) to decode the received data packets directly. We also analyze the security to demonstrate that the proposed scheme is at least as secure as other methods against wiretapping attacks. We also evaluate the performance of the proposed scheme to demonstrate its utility. |
| Author | Ma, Jieming Wu, Renyong Li, Xiehua Tang, Zhixiang Choo, Kim-Kwang Raymond |
| Author_xml | – sequence: 1 givenname: Renyong orcidid: 0000-0003-4002-2813 surname: Wu fullname: Wu, Renyong email: wurenyong@hnu.edu.cn organization: College of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 2 givenname: Jieming orcidid: 0000-0001-5795-0400 surname: Ma fullname: Ma, Jieming email: eric07ace@hnu.edu.cn organization: College of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 3 givenname: Zhixiang orcidid: 0000-0002-7821-7010 surname: Tang fullname: Tang, Zhixiang email: tzx@hnu.edu.cn organization: College of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 4 givenname: Xiehua surname: Li fullname: Li, Xiehua email: beverly@hnu.edu.cn organization: College of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 5 givenname: Kim-Kwang Raymond orcidid: 0000-0001-9208-5336 surname: Choo fullname: Choo, Kim-Kwang Raymond email: raymond.choo@fulbrightmail.org organization: Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA |
| BookMark | eNp9kMFKAzEQhoNUsK0-gHgJeN6aSXbTzbGWWpVSwa7nkGZnNbWbrckW8e3dUvHgwdPMwP_NMN-A9HzjkZBLYCMApm6K5awYccZhJICnuWInpA9Zlic8k7LX9UyKRErFz8ggxg1jIBiXffI4oXP0GJylK7T7gLQIxsfaxegaT1f2DWuktyZiSbv52fiyqenCeTSBLrH9bMI7nTal86_n5LQy24gXP3VIXu5mxfQ-WTzNH6aTRWK5Em0yrnI0LEVYr8EgNwqAVyxTIsstsNJwKVGVIl0rCUYCgyyVrOJoLc8rACGG5Pq4dxeajz3GVm-affDdSc1lxrjKBZddCo4pG5oYA1Z6F1xtwpcGpg_K9EGZPijTP8o6ZvyHsa41bSeiDcZt_yWvjqRDxN9L3QdMAhffQxB5QQ |
| CODEN | IEANEP |
| CitedBy_id | crossref_primary_10_1109_COMST_2024_3408277 crossref_primary_10_1038_s41598_024_77510_7 crossref_primary_10_3390_s24010285 crossref_primary_10_1016_j_ijleo_2022_170252 |
| Cites_doi | 10.1109/TIFS.2019.2954742 10.1109/ISIT.2002.1023595 10.1561/0100000007I 10.1109/LCOMM.2013.062113.130478 10.1109/ISIT.2007.4557282 10.1109/NETCOD.2010.5487671 10.1109/JIOT.2019.2919743 10.1109/18.850663 10.1109/TIT.2010.2090197 10.1109/MWC.2004.1269720 10.1016/j.comnet.2018.03.013 10.1109/TIT.2002.807285 10.1109/TNET.2003.818197 10.1109/ISIT.2011.6034201 10.1109/ISIT.2003.1228459 10.1109/TIT.2005.847712 10.1109/INFCOM.2010.5462050 10.1145/777463.777464 10.1109/JPROC.2010.2094592 10.1109/TIT.2011.2173631 10.1109/TIT.2010.2090212 10.1109/TIT.2006.881746 10.1016/j.comnet.2015.12.012 10.1109/TIT.1976.1055638 10.4236/jis.2018.91007 10.1109/COMST.2016.2598968 10.1109/TrustCom.2014.35 10.1109/ICC.2008.336 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TNET.2021.3124890 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) (UW System Shared) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2566 |
| EndPage | 866 |
| ExternalDocumentID | 10_1109_TNET_2021_3124890 9610612 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Cloud Technology Endowed Professorship |
| GroupedDBID | -DZ -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 85S 8US 97E 9M8 AAJGR AAKMM AALFJ AARMG AASAJ AAWTH AAWTV ABAZT ABPPZ ABQJQ ABVLG ACGFS ACGOD ACIWK ACM ADBCU ADL AEBYY AEFXT AEJOY AENSD AETEA AETIX AFWIH AFWXC AGQYO AGSQL AHBIQ AI. AIBXA AIKLT AKJIK AKQYR AKRVB ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BDXCO BEFXN BFFAM BGNUA BKEBE BPEOZ CCLIF CS3 D0L EBS EJD FEDTE GUFHI HF~ HGAVV HZ~ H~9 I07 ICLAB IEDLZ IES IFIPE IFJZH IPLJI JAVBF LAI LHSKQ M43 MVM O9- OCL P1C P2P PQQKQ RIA RIE RNS ROL TN5 UPT UQL VH1 XOL YR2 ZCA AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-7f8ea04e1bb1ae2a9112f059358c10da266e9d34b961a61015460f2ecc28f1133 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000732276100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1063-6692 |
| IngestDate | Sun Jun 29 12:32:10 EDT 2025 Tue Nov 18 22:36:05 EST 2025 Sat Nov 29 03:05:25 EST 2025 Wed Aug 27 02:40:44 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-7f8ea04e1bb1ae2a9112f059358c10da266e9d34b961a61015460f2ecc28f1133 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-7821-7010 0000-0001-5795-0400 0000-0003-4002-2813 0000-0001-9208-5336 |
| PQID | 2650298326 |
| PQPubID | 32020 |
| PageCount | 12 |
| ParticipantIDs | proquest_journals_2650298326 crossref_primary_10_1109_TNET_2021_3124890 ieee_primary_9610612 crossref_citationtrail_10_1109_TNET_2021_3124890 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-April 2022-4-00 20220401 |
| PublicationDateYYYYMMDD | 2022-04-01 |
| PublicationDate_xml | – month: 04 year: 2022 text: 2022-April |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE/ACM transactions on networking |
| PublicationTitleAbbrev | TNET |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 Wischik (ref29) ref12 ref15 ref14 ref31 ref30 ref11 ref10 ref32 ref2 ref1 ref17 ref16 ref19 Liang (ref5) 2010 ref24 ref26 ref25 ref20 ref22 ref21 Feldman (ref23) ref28 ref27 ref8 Bhattad (ref18) ref7 ref9 ref4 ref3 ref6 |
| References_xml | – ident: ref2 doi: 10.1109/TIFS.2019.2954742 – ident: ref6 doi: 10.1109/ISIT.2002.1023595 – ident: ref14 doi: 10.1561/0100000007I – ident: ref20 doi: 10.1109/LCOMM.2013.062113.130478 – ident: ref15 doi: 10.1109/ISIT.2007.4557282 – ident: ref21 doi: 10.1109/NETCOD.2010.5487671 – ident: ref3 doi: 10.1109/JIOT.2019.2919743 – start-page: 1 volume-title: Proc. 1st Workshop Netw. Coding, Theory, Appl. ident: ref18 article-title: Weakly secure network coding – start-page: 99 volume-title: Proc. 8th USENIX Conf. Netw. Syst. Design Implement. ident: ref29 article-title: Design, implementation and evaluation of congestion control for multipath TCP – ident: ref10 doi: 10.1109/18.850663 – ident: ref22 doi: 10.1109/TIT.2010.2090197 – ident: ref28 doi: 10.1109/MWC.2004.1269720 – ident: ref9 doi: 10.1016/j.comnet.2018.03.013 – ident: ref11 doi: 10.1109/TIT.2002.807285 – ident: ref31 doi: 10.1109/TNET.2003.818197 – ident: ref17 doi: 10.1109/ISIT.2011.6034201 – ident: ref16 doi: 10.1109/ISIT.2003.1228459 – ident: ref12 doi: 10.1109/TIT.2005.847712 – ident: ref26 doi: 10.1109/INFCOM.2010.5462050 – ident: ref30 doi: 10.1145/777463.777464 – ident: ref7 doi: 10.1109/JPROC.2010.2094592 – ident: ref24 doi: 10.1109/TIT.2011.2173631 – ident: ref25 doi: 10.1109/TIT.2010.2090212 – start-page: 355 volume-title: Information Theoretic Security year: 2010 ident: ref5 – ident: ref13 doi: 10.1109/TIT.2006.881746 – ident: ref19 doi: 10.1016/j.comnet.2015.12.012 – start-page: 63 volume-title: Proc. 42nd Annu. Allerton Conf. Commun. Control Comput. ident: ref23 article-title: On the capacity of secure network coding – ident: ref1 doi: 10.1109/TIT.1976.1055638 – ident: ref32 doi: 10.4236/jis.2018.91007 – ident: ref4 doi: 10.1109/COMST.2016.2598968 – ident: ref8 doi: 10.1109/TrustCom.2014.35 – ident: ref27 doi: 10.1109/ICC.2008.336 |
| SSID | ssj0013026 |
| Score | 2.4037664 |
| Snippet | Unlike general routing strategies, network coding (NC) can combine encoding functions with multi-path propagation over a network. This allows network capacity... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 855 |
| SubjectTerms | Codes Coding Eavesdropping eavesdropping attack Encoding Generalized inverse Kernel Kernels Mathematical analysis Matrices (mathematics) multi-path propagation Network coding Nodes Packets (communication) random linear network coding Receivers Routing Secure network coding Security Unicast Wiretapping |
| Title | A Generic Secure Transmission Scheme Based on Random Linear Network Coding |
| URI | https://ieeexplore.ieee.org/document/9610612 https://www.proquest.com/docview/2650298326 |
| Volume | 30 |
| WOSCitedRecordID | wos000732276100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore customDbUrl: eissn: 1558-2566 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0013026 issn: 1063-6692 databaseCode: RIE dateStart: 19930101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8aAHX1WsVsnBk7g2m-4rx1paxMMiWqG3JckmULC70oe_30l2WwuK4G0XEhhmkvnmSyYzADe6J42SgfDCGLlqEIrQs1XiPKUiIWlPJlwlrtlEnKbJZMKfG3C3eQujtXbJZ_refrq7_LxUK3tU1uWRJTDocHfiOKrean3fGFDXWg0H9Lwo4qy-wfQp747T4RiZIPORoLIgse53C4NcU5UfntjBy-jwf4IdwUEdRpJ-ZfdjaOjiBPa3igu24KlPXE3pqSLuUF0Th0toV3tARl7RWjNNHhDFcoL_L6LIyxlBboprn6RVdjgZlBbbTuFtNBwPHr26c4KnEL6XXmwSLWigfSl9oZlAj8aMbd4XJsqnuUBU1jzvBRIFFyg7xlERNQzNyRLjI209g2ZRFvociGQ8MTygwucGAS-WGJAgJ5SxiaShgWkDXesyU3VZcdvd4j1z9ILyzKo_s-rPavW34XYz5aOqqfHX4JbV92Zgreo2dNYGy-pdt8gYhpsoLkakF7_PuoQ9Zp8vuMybDjSX85W-gl31uZwu5tduQX0BHv7Fxg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB6KCurBt1itmoMncW02zT5y1FKpWhfRCr0tSTaBgm2lVn-_k3RbC4rgbRcSGGaS-eZLJjMAZ6ahrFZcBlGCXJVHMgpclbhA61gq2lCp0KlvNpFkWdrriccKXMzfwhhjfPKZuXSf_i6_GOkPd1RWF7EjMOhwlyPOGZ2-1vq-M6C-uRoOaQRxLFh5hxlSUe9mrS5yQRYiRWU8dQ54AYV8W5UfvtgDzM3m_0Tbgo0ykCRXU8tvQ8UMd2B9obzgLtxdEV9Vuq-JP1Y3xCMTWtYdkZFntNfAkGvEsYLg_5McFqMBQXaKq59k0_xw0hw5dNuDl5tWt9kOyt4JgUYAnwSJTY2k3IRKhdIwiT6NWde-L0p1SAuJuGxE0eAKBZcoO0ZSMbUMDcpSGyJx3Yel4WhoDoAoJlIrOJWhsAh5icKQBFmhSmysLOW2CnSmy1yXhcVdf4vX3BMMKnKn_typPy_VX4Xz-ZS3aVWNvwbvOn3PB5aqrkJtZrC83HfvOcOAE8XFmPTw91mnsNruPnTyzm12fwRrzD1m8Hk4NViajD_MMazoz0n_fXziF9cXlufJDQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Generic+Secure+Transmission+Scheme+Based+on+Random+Linear+Network+Coding&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Wu%2C+Renyong&rft.au=Ma%2C+Jieming&rft.au=Tang%2C+Zhixiang&rft.au=Li%2C+Xiehua&rft.date=2022-04-01&rft.issn=1063-6692&rft.eissn=1558-2566&rft.volume=30&rft.issue=2&rft.spage=855&rft.epage=866&rft_id=info:doi/10.1109%2FTNET.2021.3124890&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNET_2021_3124890 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon |