A Secure Approach for Caching Contents in Wireless Ad Hoc Networks

被引:18
|
作者
Kiskani, Mohsen Karimzadeh [1 ]
Sadjadpour, Hamid R. [1 ]
机构
[1] Univ Calif Santa Cruz, Dept Elect Engn, Santa Cruz, CA 95064 USA
关键词
Physical layer security; secure caching; wireless ad hoc networks; DISTRIBUTED STORAGE; CELLULAR NETWORKS; FOUNTAIN CODES; COMMUNICATION; SYSTEMS;
D O I
10.1109/TVT.2017.2756623
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Caching aims to store data locally in some nodes within the network to be able to retrieve the contents in shorter time periods. However, caching in the network did not always consider secure storage (due to the compromise between time performance and security). In this paper, a novel decentralized secure coded caching approach is proposed. In this solution, nodes only transmit coded files to avoid eavesdropper wiretappings and protect the user contents. In this technique random vectors are used to combine the contents using XOR operation. We modeled the proposed coded caching scheme by a Shannon cipher system to show that coded caching achieves asymptotic perfect secrecy. The proposed coded caching scheme significantly simplifies the routing protocol in cached networks while it reduces overcaching and achieves a higher throughput capacity compared to uncoded caching in reactive routing. It is shown that with the proposed coded caching scheme any content can be retrieved by selecting a random path while achieving asymptotic optimum solution. We have also studied the cache hit probability and shown that the coded cache hit probability is significantly higher than uncoded caching. A secure caching update algorithm is also presented.
引用
收藏
页码:10249 / 10258
页数:10
相关论文
共 50 条
  • [1] Secure Coded Caching in Wireless Ad Hoc Networks
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 387 - 391
  • [2] Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
    Denko, Mieso K.
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2007, 3 (01) : 1 - 15
  • [3] ACC: Anonymous Cooperative Caching in Wireless Ad Hoc Networks
    Su, Zhaoyan
    Luo, Xiapu
    Wu, Weigang
    Cao, Jiannong
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 64 - 72
  • [4] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [5] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    [J]. PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [6] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [7] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [8] Secure data forwarding in wireless ad hoc networks
    Huang, Q
    Avramopoulos, IC
    Kobayashi, H
    Liu, B
    [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3525 - 3531
  • [9] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    [J]. JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132
  • [10] A Role-Based Approach to Secure Routing in Wireless Ad-Hoc Networks
    Shcherba, E. V.
    Nikonov, V. I.
    [J]. 2016 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2016,