Secure Coded Caching in Wireless Ad Hoc Networks

被引:0
|
作者
Kiskani, Mohsen Karimzadeh [1 ]
Sadjadpour, Hamid R. [1 ]
机构
[1] Univ Calif Santa Cruz, Dept Elect Engn, Santa Cruz, CA 95064 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A decentralized coded caching technique is introduced for wireless ad hoc networks in which all the existing contents are randomly combined and cached. The scaling behavior of the network is studied in terms of both capacity and security. Proactive and reactive routing techniques for coded caching are presented and the scaling capacity of the network for each case is derived. It has been shown that by using reactive routing, any content can be retrieved by selecting a random path while providing asymptotic optimum solution. The proposed coded caching significantly simplifies the routing protocol in cached networks. We further prove that asymptotic perfect secrecy can be achieved using proposed coded caching scheme.
引用
收藏
页码:387 / 391
页数:5
相关论文
共 50 条
  • [1] A Secure Approach for Caching Contents in Wireless Ad Hoc Networks
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) : 10249 - 10258
  • [2] Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
    Denko, Mieso K.
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2007, 3 (01) : 1 - 15
  • [3] ACC: Anonymous Cooperative Caching in Wireless Ad Hoc Networks
    Su, Zhaoyan
    Luo, Xiapu
    Wu, Weigang
    Cao, Jiannong
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 64 - 72
  • [4] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [5] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    [J]. PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [6] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [7] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [8] Secure data forwarding in wireless ad hoc networks
    Huang, Q
    Avramopoulos, IC
    Kobayashi, H
    Liu, B
    [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3525 - 3531
  • [9] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    [J]. JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132
  • [10] Efficient Cache Discovery for Cooperative Caching in Wireless Ad Hoc Networks
    Wu, Weigang
    Cao, Jiannong
    [J]. PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 323 - 330