LIU Guangjun and XIAO Song, “Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 191-197, 2018, doi: 10.1049/cje.2017.09.017
Citation: LIU Guangjun and XIAO Song, “Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 191-197, 2018, doi: 10.1049/cje.2017.09.017

Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission

doi: 10.1049/cje.2017.09.017
Funds:  This work is supported by the National Natural Science Foundation of China (No.61372069, No.61271174, No.61301178), the Specific Scientific Research Plan Project of Shaanxi Education Department (No.15JK2150), and the Science and Technology Innovation Foundation of Xi'an (No.2016CXWL11, No.CXY1352WL28, No.CXY1531WL11).
  • Received Date: 2015-10-27
  • Rev Recd Date: 2016-01-27
  • Publish Date: 2018-01-10
  • Network coding is promising to improve the throughput and robustness of video transmission over wireless networks. To address the security issue of network coding based Priority encoding transmission (PET), a special coding design against wiretapping is proposed with hierarchical security. The basic idea is first to randomize partial blocks of each layer and then to encode each layer with inter-layer overlapping coding. The method is characterized by quantifiable security for incremental decoding, and realizes scalability in confidentiality and video transmission, while incurring relatively low computational complexity and bandwidth overhead. A sufficient condition is also presented to design a stronger secure network coded PET system against the known-plaintext attacks. Analysis and evaluation show that the method can be efficient as a new paradigm to secure network coded PET system in realistic applications.
  • loading
  • K.K.R. Kambhatla, S. Kumar, S. Paluri, et al., "Wireless H. 264 video quality enhancement through optimal prioritized packet fragmentation", IEEE Transactions on Multimedia, Vol.14, No.5, pp.1480-1495, 2012.
    X. Shao, R. Wang, H. Huang, et al., "Load balanced coding aware multipath routing for wireless mesh networks", Chinese Journal of Electronics, Vol.24, No.1, pp.8-12, 2015.
    T. Ho, M. Médard, R. Koetter, et al., "A random linear network coding approach to multicast", IEEE Transactions on Information Theory, Vol.52, No.10, pp.4413-4430, 2006.
    E. Magli, M. Wang, P. Frossard, et al., "Network coding meets multimedia:A review", IEEE Transactions on Multimedia, Vol.15, No.5, pp.1195-1212, 2013.
    P.A. Chou, Y. Wu and K. Jain, "Practical network coding", Proc. of Allerton Conference on Communication, Control, and Computing, Monticello, IL, 2003.
    S. Xiao, H. Wang and C-C. Kuo, "Priority ordering and packetization for scalable video multicast with network coding", Proc. of the 8th Pacific Rim Conference on Multimedia:Advances in Multimedia Information Processing, Hong Kong, China, pp.520-529, 2007.
    N. Thomos, E. Kurdoglu, P. Frossard, et al., "Adaptive prioritized random linear coding and scheduling for layered data delivery from multiple servers", IEEE Transactions on Multimedia, Vol.17, No.6, pp.893-906, 2015.
    S. Xiao, H. Wang and C. Wu, "A new network coding design for reliable video multicast", Chinese Journal of Electronics, Vol.20, No.2, pp.361-364, 2011.
    H. Wang, S. Xiao and C-C. Kuo, "Random linear network coding with ladder-shaped global coding matrix for robust video transmission", Journal of Visual Communication and Image Representation, Vol.22, No.4, pp.203-212, 2011.
    S. Lian, Multimedia Content Encryption:Techniques and Applications, Auerbach Publications, Boston, MA, USA, 2008.
    N.S. Kulkarni, B. Raman and I. Gupta, "Multimedia encryption:A brief overview", Recent Advances in Multimedia Signal Processing and Communications, Studies in Computational Intelligence, Vol.231, pp.417-449, 2009.
    J. Zhang and X. Gao, "A hybrid encryption scheme for scalable video coding based on H. 264", Proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems, Xi'an, China, pp.708-711, 2013.
    L.M. Varlakshmi, G.F. Sudha and G. Jaikishan, "An efficient scalable video encryption scheme for real time applications", Procedia Engineering, Vol.30, pp.852-860, 2012.
    S. Mehdian and B. Liang, "Jointly optimal selection and scheduling for lossy transmission of dependent frames with delay constraint", Proc. of the 22nd IEEE International Symposium of Quality of Service, Hong Kong, China, pp.168-177, 2014.
    H. Yao, D. Silva, S. Jaggi, et al., "Network codes resilient to jamming and eavesdropping", IEEE/ACM Transactions on Networking (TON), Vol.22, No.6, pp.1978-1987, 2014.
    V.N. Talooki, R. Bassoli, D.E. Lucani, et al., "Security concerns and countermeasures in network coding based communication systems:A survey", Computer Networks, Vol.83, pp.422-445, 2015.
    J. Liu, Y. Liu, H. Liu, et al., "Network coding anti-eavesdropping algorithm for ad hoc networks", Chinese Journal of Electronics, Vol.24, No.3, pp.639-641, 2015.
    N. Cai and T. Chan, "Theory of secure network coding", Proceedings of the IEEE, Vol.99, No.3, pp.421-437, 2011.
    T.T. Tran, H. Li, L. Liu, et al., "Secure network-coded wireless multicast for delay-sensitive data", Proc. of the 2012 IEEE International Conference on Communications, Ottawa, ON, Canada, pp.1943-1947, 2012.
    C. Cheng, T. Jiang and Q. Zhang, "TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding", IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp.291-298, 2013.
    C-C. Wang, J-L. Li, T-Y. Wang, et al., "Robust video transmission for H. 264 scalable video coding using unequal error protection", Proc. of the 2th IEEE International Conference on Digital Information and Communication Technology and it's Applications, Bangkok, Thailand, pp.77-81, 2012.
    J. Overbey, W. Traves and J. Wojdylo, "On the keyspace of the Hill cipher", Cryptologia, Vol.29, No.1, pp.59-72, 2005.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (451) PDF downloads(163) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint